Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)

Slides:



Advertisements
Similar presentations
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit,
Advertisements

Chapter 8: Local Area Networks: Internetworking. 2 Objectives List the reasons for interconnecting multiple local area network segments and interconnecting.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Wide Area Networks School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 11, Thursday 3/22/2007)
Chapter 7 Local Area Networks: The Basics
Networks & telecommunications Part 2 July 2, 2012.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
1 NETWORKING TECHNOLOGIES (II) BUS Abdou Illia, Fall 2010 (October 20, 2010)
1 NETWORKING TECHNOLOGIES (II) BUS Abdou Illia, Spring 2007 (Week 9, Thursday 3/8/2007)
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
1 Chapter 8 Local Area Networks - Internetworking.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
1 Chapter 8 Local Area Networks - Internetworking Data Communications and Computer Networks: A Business User’s Approach.
Local Area Networks Part II. 2 Introduction Many times it is necessary to connect a local area network to another local area network or to a wide area.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
COMPUTER NETWORKS.
Chapter 2 Review of Computer Network Technology
Network Topologies An introduction to Network Topologies and the Link Layer.
Networks. Bus Network Terminator‘Workstation’ ‘Client’ ‘Terminal’ ‘Node’ Computer Terminator Backbone Server (optional)
Network Devices 1.
Module 4 - Networking MIS5122: Enterprise Architecture for the IT Auditor.
Chapter 6 High-Speed LANs Chapter 6 High-Speed LANs.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
Chapter 2 The Infrastructure. Copyright © 2003, Addison Wesley Understand the structure & elements As a business student, it is important that you understand.
© NOKIADEFAULT.PPT / / AO page: 1 IP in LANs.
Chapter 7 Local Area Networks: The Basics. Topics Definition of LAN Primary function, advantage and disadvantage Difference between Client/Server network.
20 LAN Hardware Overview Version A.01 H3065S Module 2 Slides.
Section 4 : The OSI Network Layer CSIS 479R Fall 1999 “Network +” George D. Hickman, CNI, CNE.
Common Devices Used In Computer Networks
The Infrastructure Technologies. Communication All communications require: Transmitters/Senders and receivers Transmission medium Rules of communication.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
Computer Networks NYUS FCSIT Spring 2008 Igor TRAJKOVSKI, Ph.D. Associate Professor
Topologies The structure of the network –Physical topology Actual layout of the media –Logical topology How the hosts access the media.
Chapter 8 Local Area Networks: Internetworking Data Communications and Computer Networks: A Business User’s Approach.
Local Area Networks: Internetworking
 Network Segments  NICs  Repeaters  Hubs  Bridges  Switches  Routers and Brouters  Gateways 2.
Review For Exam 2 School of Business Eastern Illinois University © Abdou Illia, Spring 2006 Wednesday 2/22/2006)
Lesson 3—Networking BASICS1 Networking BASICS Network Design Unit 2 Lesson 3.
Chapter 6 – Connectivity Devices
Networks and Protocols CE Week 2a. Network hardware.
15.1 Chapter 15 Connecting LANs, Backbone Networks, and Virtual LANs Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or.
Computer Networks 15-1 Connecting Devices. Connecting Device We divide connecting devices into five different categories based on the layer in which they.
PRESENTATION ON:- INTER NETWORK Guided by: Presented by:- Prof. Ekta Agrwal Dhananjay Mishra Prafull Jain Vinod Kumawat.
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
NETWORK HARDWARE CABLES NETWORK INTERFACE CARD (NIC)
1 Chapter 8 Local Area Networks - Internetworking.
NET 324 D Networks and Communication Department Lec1 : Network Devices.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
CCNA Guide to Cisco Networking Chapter 2: Network Devices.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
Data Communications & Computer Networks, Second Edition1 Chapter 8 Local Area Networks: Internetworking.
Local Area Networks: Monil Adhikari. Primary Function of a LAN File serving – large storage disk drive acts as a central storage repository Print serving.
Local Area Networks Honolulu Community College
Review For Exam 2 School of Business Eastern Illinois University © Abdou Illia, Spring 2005 Tuesday 2/22/2005)
Review For Exam 2 School of Business Eastern Illinois University © Abdou Illia, Spring 2003 (Week 7, Monday 2/24/2003)
Simple LAN Topologies  Terminators stop signals after they have reached their destination  Signal bounce –Phenomenon in which signals travel endlessly.
Computer Networks. Understand the rationale for the existence of networks. Distinguish between the three types of networks: LANs, MANs, and WANs. After.
Lec # 25 Computer Network Muhammad Waseem Iqbal. Learn about the Internetworking Devices – Repeaters – Hubs – Switches – Bridges – Routers.
1 NETWORKING TECHNOLOGIES (II) BUS Abdou Illia, Fall 2008 (November 4, 2008)
CN2668 Routers and Switches Kemtis Kunanuraksapong MSIS with Distinction MCTS, MCDST, MCP, A+
Internetworking (Part II)
Local Area Networks Honolulu Community College
Networking Devices.
NETWORKING TECHNOLOGIES (II)
CS4470 Computer Networking Protocols
Internetworking (Part II)
Presentation transcript:

Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)

2 Learning Objectives n Understand reasons for internetworking n Describe types of LANs based on access methods n Distinguish between internetworking devices

3 Internetworking ? n Connecting separate networks using internetworking devices (bridges, routers, hubs, switches, etc.) n Reasons for internetworking: – LAN performance decrease due to growth => Break & Interconnect – Need to access resources available on another network – Need to share software & hardware between networks n Will focus on – Interconnecting LANs to LANs – Interconnecting LANs to WANs

4 Different kinds of LANs n In terms of their topology (logical design -How data moves around the network from station to station): – Bus topology – Star-Bus topology – Ring topology

5 Bus topology Usually, use a linear coaxial cable (called a BUS) that multiple devices or workstations tap into.

6 Bus topology Connecting to the BUS cable requires: a patch cable, and a simple device called a Tap (a passive device). Patch cable

7 Star-Bus topology Most popular topology for LANs Looks physically like a star, but acts logically like a bus Star design built around a central collection device called Hub or Switch. All workstations attach to hub/Switch

8 Ring topology Circular connection of workstations One channel of information Information flows in one direction around the ring

9 Ring topology Implemented using a (physical) star design. Star design built around a central collection point called a MAU (Multistation Access Unit) MAU passes the signal around in a ring fashion (logical ring)

10 Media Access Control Protocols used in LANs n Ethernet or CSMA/CD – Most common form of LAN today. – Star-Bus is most common topology – Many standards (10Base2, 100BaseT, 1000BaseT, etc.) n Token Ring – For LAN that use Ring topology – Offered at speeds of 4, 16 Mbps. – More expensive components than CSMA/CD – Losing ground quickly to CSMA/CD.

11 Why Ethernet and Token ring? n Created to answer two questions: – How to identify sending & receiving computers in LANs? – Which computer should send? At what time? n Ethernet answer: – Adding Sender’s & Receiver’s MAC address to packets – Implement a rule known as CSMA/CD n Token ring answer: – Adding Sender’s & Receiver’s MAC address to packets – Implement a Token passing method: n a single token circulates in the ring. n Only the computer that gets the token will send. - All computers (“carriers”) listen (“sense”) for traffic on the LAN - If no traffic, computer that wishes to transmit may transmit - If collision occurs, computers must wait a random amount of time - The computer with smallest random number send again first. Carrier Sense Multiple Access / Collision Detection

12 Internetworking n Need to connect Networks using different protocols – e.g.: Ethernet LANs and Token Ring LANs – e.g.: LANs (Ethernet or Token Ring) and WANs n Need to connect Networks using same protocols n Need to break a LAN into segments to relieve traffic congestion

13 Internetworking n Categories of devices used to interconnect networks: – Bridges – Routers – Hubs – Switches

14 Bridges n A bridge can be used to connect two similar LANs, such as two CSMA/CD LANs or two Token ring LANs

15 Bridges n A bridge can also be used to connect a CSMA/CD LAN and a Token Ting LAN

16 How Bridges operate ? n The answer depends on the type of bridge. n Three basic types: – Transparent Bridges – Source-routing Bridges – Remote Bridges

Figure Transparent Bridges Each bridge has two connections (ports), and there is a routing table associated with each port The transparent bridge observes all traffic and builds routing tables from this observation ( This observation is called Backward learning)  A transparent bridge is found with CSMA/CD LANs (Filtering & Forwarding functions).

Figure A transparent Bridge Observes each frame that arrives at a port Extracts the source address from the frame Places that address in the port’s routing table.

19 Recap: Transparent Bridges  A transparent bridge observes all traffic and builds routing tables from this observation.  This observation is called Backward learning.  Each bridge has two connections (ports) and there is a routing table associated with each port.  A bridge observes each frame that arrives at a port, extracts the source address from the frame, and places that address in the port’s routing table.

20 Transparent Bridges 1. The bridge removes the headers and trailers from one frame format 2. Encapsulates the headers and trailers for the second frame format. Notice that a bridge is a 2- layer device A transparent bridge can connect a CSMA/CD to a Token Ring LAN  Convert one frame format to another  Forward frames  Filtering

21 Summary Questions 1. Name the two most known Medium Access Control protocols found in LANs. How they differ? 2. (a) What are the primary reasons for internetworking two or more networks ? (b) What are the basic functions of a bridge ? 3. How does a Transparent bridge operate? 4.Exercise # 4 on page 260 of book.

22 Summary Questions n Consider the local area network shown below Suppose that the only traffic generated on the network since it has been physically set up is as follow: - Workstation 1 has sent a message to workstation 3 - Workstation 2 has sent a message to Server 1 - Server 1 has sent a message to workstation 3 What would be the content of the bridging tables? Port A TablePort B Table

23 Summary Questions (Cont) n Now, suppose that Workstation 1 sends another message. This time the message is sent to Workstation 2. What would happen? (Circle all correct answers) a) The hub will send a copy of the message to the bridge b) The bridge will forward the message to the switch c) The switch will discard the received message d) The bridge will check its Port A bridging table and will discard the received message.

24 Ethernet n Uses CSMA/CD access method for data transmission on a network n CSMA/CD* : 1) All computers (“carriers”) listen (“sense”) for traffic on the LAN 2) If no traffic, computer that wishes to transmit may transmit 3) If collision occurs, computers must wait a random amount of time 4) The computer with smallest random number send again first. * Carrier Sense Multiple Access with Collision Detection