Packet Transmission (Part III) Local Area Networks (LANs)

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

CS Direct Link Networks (Continued) Slide Set 6.
Repeaters can Mix PHY Standards Repeater NIC BNC AUI Connectors RJ-45 UTPDrop Cables 10Base5 Trunk Cable 10Base2 10Base-T.
CS4550: Computer Networks II high speed networks, part 1 : FDDI & 100baseTX.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
1 Fall 2005 Hardware Addressing and Frame Identification Qutaibah Malluhi CSE Department Qatar University.
Token Ring and Fiber Distributed Data Interface (FDDI)
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI)
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-2 Local Area Networks (LANs) Frame.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
EECC694 - Shaaban #1 lec #6 Spring Point-to-Point Vs. Shared Channel Communication In LANs Point-to-point: –Computers connected by communication.
Token Ring and FDDI.
Chapter 9 Hardware Addressing & Frame Type Identification EE 526 Presentation by Ryan Star.
Review on Networking Technologies Linda Wu (CMPT )
CS335 Networking & Network Administration Tuesday, April 13, 2010.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
SIMS-201 LAN Basics, MANs, WANs.
Ethernet, MAC podvrstva
Chapter 13 Wired LANs: Ethernet
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
8-Oct-154/598N: Computer Networks Shared Access Networks Token Ring ATM Fibre channel Myrinet.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
FDDI (Fiber Distributed Data Interface) Standardized by ASI and ITU-T (ITU-T X.3.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
1 Ch 9 Hardware Addressing and Frame Type Identification.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
1 Part IV Local Area Networks (LANs). 2 Classification Terminology  Network technologies classified into three broad categories  Local Area Network.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Fiber Distributed Data Interface (FDDI)
1 Chapter 8-10 Local Area Networks (LANs). Comparison 4e and 5e  Ch 7, 4eCh 8, 5e Ch 10, Forouzan  Ch 8, 4eCh 14, 5e Ch 13, Forouzan  Ch 9, 4eCh 13,
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
IEEE STANDARDS IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication.
IEEE l IEEE has had the greatest impact on Layer 2 standards. l IEEE divided Layer 2 into two sublayers.
FDDI Network Security.
1 Hardware Addressing and Frame Type Identification.
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Local Area Networks: Topologies. 2 Packet Identification & MAC Addresses Each packet specifies an intended recipient with an identifier. – Demultiplexing.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
LAN Topologies Part 1. What is topology? Topology is the physical or logical interconnection of communicating devices Physical Topology: LANtopology,
ETHERNET Yash Vaidya. Introduction Ethernet is a family of computer networking technologies for local area networks (LANs). Ethernet was commercially.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
1 Ch 8 LAN Technologies and Network Topology. 2 Scope  Describes the concepts underlying local network technologies  Describes basic network topology.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D.
CS4470 Computer Networking Protocols
Part III Datalink Layer.
Local Area Networks: Topologies
Data Networking via LANs Packets and Frames
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif
TOKEN BUS & TOKEN RING.
Medium Access Control (MAC) Sub-layer
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
Ethernet and Token Ring LAN Networks
Data Link Issues Relates to Lab 2.
COMPUTER NETWORKS CS610 Lecture-10 Hammad Khalid Khan.
Data-link Layer Computer Networks.
FDDI.
Part III Datalink Layer.
Local Area Networks (LANs)
Chaithra Ashwin Sanjana
Ethernet and Token Ring LAN Networks
Presentation transcript:

Packet Transmission (Part III) Local Area Networks (LANs)

Identifying A Destination All stations on shared-media LAN receive all transmissions To allow sender to specify destination –Each station assigned unique number –Known as station’s address –Each frame contains address of identical recipient

Ethernet Addressing Standardized by IEEE Each station assigned unique 48-bit address Address assigned when network interface card (NIC) manufactured

NIC Cards Internal NIC

Ethernet Addressing Ethernet addresses are MAC addresses They are station (NIC) address at the MAC layer Usually expressed for humans in hexadecimal –Base 16: Each Symbol Represents 4 bits (for example, 0101=5 hex) –Convert each four bits to a hex symbol between 0 and F –Put dashes between each pair –Example: A1-34-CD-7B-DF-89

Ethernet Address Recognition Each frame contains destination address All stations receive a transmission Station discards any frame addressed to another station Important: interface hardware, not software, checks address

Possible Destinations Packet can be sent to: –Single destination (unicast) –All stations on network (broadcast) –Subset of stations (multicast) Address used to distinguish

Advantages Of Address Alternatives Unicast –Efficient for interaction between two computers Broadcast –Efficient for transmitting to all computers Multicast –Efficient for transmitting to a subnet of computers

Broadcast On Ethernet All 1s address specifies broadcast Sender –Places broadcast address in frame –Transmits one copy on shared network –All stations receive copy Receiver –Station’s unicast address –The broadcast address

Multicast On Ethernet Half of address reserved for multicast Network interface card –Always accepts unicast and broadcast –Can accept zero or more multicast address Software –Determine multicast address to accept –Informs network interface card

Identifying Frame Contents Integer type field tells recipient the type of data being carried Two possibilities –Self-identifying or explicit type (hardware records type) –Implicit type (application sending data must handle type).

Conceptual Frame Format Header –Contains address and type information –layout fixed Payload –Contains data being sent

Illustration Of Ethernet Frame Sender places –Sender’s address in source –Recipient’s address in destination –Type of data in frame type –Cyclic redundancy check in CRC

Octet A collection of 8 bits Called a byte in computer science The term “Octet” is widely used in networking Octet = group of 8 bits

Ethernet Frame Preamble (7 Octets) … Begins synchronization Start of Frame Delimiter (1 Octet) Ends synchronization Signals start of content of frame FieldDescription … Synchronizes the receiver’s clock with the sender’s clock

Ethernet Frame Destination Address (6 Octets) 48 Bits Expressed for humans in Hexadecimal Example: A1-34-CD-7B-DF-34 Unique value set at factory FieldDescription Source Address (6 Octets) 48 Bits Expressed for humans in Hexadecimal Example: C7-66-3B-AC Unique value set at factory

Ethernet Frame FieldDescription Length (2 Octets) Length of Data Field in octets 1,500 (decimal) maximum Data (variable)LLC Frame PAD (Needed if Data Field is less than 46 octet minimum; Data Field plus Pad will be 46 Octets)

Ethernet Frame FieldDescription CRC (4 Octets) Error detection field; If error is detected, frame is discarded The CRC field is for error checking Both sender and receiver compute it from the other bits in the frame. If the two computed values are different, there has been an error. In case of error, the receiver discards the frame; there is no request for retransmission.

Example Ethernet Types

When Network Hardware Does Not Include Types Sending and receiving computers must agree –To only send one type of data –To put type information in first few octets of payload Most system need type information

Illustration Of Type Information Added to Data In practice –Type information small compared to data carried –Format of type information standardized

A Standard For Type Information Defined by IEEE Used when hardware does not include type field Called LLC/SNAP header

Demultiplexing On Type Network interface hardware –Received copy of each transmitted frame –Examines address and either discards or accepts –Passes accepted frames to system software Network device software –Examines frame type –Passes frames to correct software module

Ring Topology Second most popular LAN topology Bits flow in single direction Several technologies exist

Used with ring topology Guarantees fair access: IEEE standards Token –Special (reserved) message –Small (a few bits) Frame formats: Token Passing

Frame Formats SD, ED: mark start, end of frame AC: Access Control Byte: token bit: value 0 means token can be seized, value 1 means data packet to follow access control byte priority bits: priority level of this packet reservation bits: station can write these bits to prevent stations with lower priority packet from seizing the token next time it becomes free FC: Frame Control: used for monitoring and maintenance, distinguish control frames and information frames

Frame Formats (cont’d) source and destination address: as in Ethernet data: packet from network layer checksum: error detection FS: Frame Status: set by destination, read by receiver set to indicate that destination is up, packet copied OK from ring

Token Passing Paradigm Station –Waits for token to arrive –Transmits one packet around ring –Transmits token around ring When no station has data to send –Token circulates continuously

Token Passing Ring Transmission Station waits for token before sending Signal travels around entire ring Sender receives its own transmission

Token Release Mechanisms Release After Reception (RAR): –Each station reissues the free token only after it receives the transmitted frame. –Used on lower speed token rings ( <= 4Mbps). Release After Transmission (RAT): –Each station attaches a free token at the end of its frame –Possible multiple frames propagate in a ring –Used on higher speed token rings (>= 16Mbps)

Strengths Of Token Ring Approach Easy detection of –Broken ring –Hardware failures –Interference

Weaknesses Of Token Ring Approach Broken wire disables entire ring Point-to-point wiring –Awkward in office environment –Difficult to add/remove stations

Token Passing Ring Technologies IBM Token Ring –Originally operated at 4 Mbps –Later version operated at 16 Mbps Fiber Distributed Data Interface (FDDI) –Operates at 100 Mbps

FDDI Fiber Distributed Data Interface A high-speed (100 Mbps) LAN (token ring) technology Suitable also for MAN It uses fiber as its transmission medium Can attach 1000 stations, can be up to 200 km Based on two counter-rotating (independent) fiber rings. Only one is used Maximum frame size = 4500 bytes

FDDI (cont’d) Using RAT mechanisms Modes of data transfer –Support synchronous (periodic) traffic: voice and video Highest priority Useless if it is late Allocated a maximum amount of time to transmit sync data at each station –Support asynchronous data: normal data

FDDI Terminology FDDI –Uses optical fibers –High reliability –Immune to interference CDDI –FDDI over copper –Same frame format –Same data rate –Less noise immunity

FDDI Hub Technology Part of FDDI standard Stations attach to hub Same frame format and data rate as FDDI Called star-shaped ring

FDDI Failure Recovery Uses two rings. Automatic failure recovery Terminology –DAS: Dual Attachment Stations –Concentrator: allow for multiple stations on the ring –SAS: Single Attachment Stations

The two counter-rotating provide fault- tolerance, i.e., self-healing ring FDDI Failure Recovery (cont’d)

FDDI Timers and Data Transmission THT (Token Holding Time): upper bound on how long a station can hold the token TRT (Token Rotation Time): interval between two successive arrivals of the token –TRT = ActiveNodes THT + RingLatency TTRT (Target Token Rotation Time): the maximum limit that a given station can hold the token (could differ between stations)

Timed Token Protocol Each station measures its TRT Upon receiving the Token, transmits any waiting sync data (up to some limit) If measured TRT > TTRT, token is too late, station can not transmit If TRT < TTRT, token is early, station can send data up to THT (THT < TTRT-TRT).

Timed Token Protocol See example in class