Introduction to Computer Networks Introduction to Computer Networks.

Slides:



Advertisements
Similar presentations
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Advertisements

Chapter 7 Data Link Layer
Multiple access What if multiple machines are sharing the same link?
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
LECTURE 11 CT1303 LAN. DYNAMIC MAC PROTOCOL No fixed assignment for transmission media or any network resources.. It allows transmission when needed.
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit,
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
1 Fall 2005 Extending LANs Qutaibah Malluhi CSE Department Qatar University Repeaters, Hubs, Bridges, Fiber Modems, and Switches.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Internetworking Fundamentals (Lecture #4) Andres Rengifo Copyright 2008.
CSCI 4550/8556 Computer Networks Comer, Chapter 11: Extending LANs: Fiber Modems, Repeaters, Bridges and Switches.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
Computer Network 實踐資管 Wang-Jiunn Cheng 2004 PART IV-1 Local Area Networks (LANs) Topology.
5-1 Data Link Layer r Today, we will study the data link layer… r This is the last layer in the network protocol stack we will study in this class…
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Module 6 Chapter 5. Ethernet Ethernet is now the dominant LAN technology in the world. Ethernet is not one technology but a family of LAN technologies.
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
Chapter 8 LAN Technologies and Network Topology Direct Point-to-Point Communication Local Area Networks (LANs) LAN Topologies Ethernet Token Ring FDDI.
COMPUTER NETWORKS.
CHAPTER Protocols and IEEE Standards. Chapter Objectives Discuss different media level protocols including their functioning The major protocols chosen.
1 Chapter Overview Ethernet FDDI Wireless Networking.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Topologies An introduction to Network Topologies and the Link Layer.
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Switching CE
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
C HAPTER 6 ACCESS METHODS. T YPES OF LINKS Data communication may involve single transmitter with 1 or more receivers, or multiple receivers with 1 or.
Ethernet Two nodes transmit at the same time
Basic network concepts (Part 5)
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Fundamentals CE
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
Introduction network Protocol
Internetworking An internetwork is typically comprised of many physical networks over which data travels There are many different types of physical networks:
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
LAN Topologies and Standards Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
Lesson 3—Networking BASICS1 Networking BASICS Network Design Unit 2 Lesson 3.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
Networks and Protocols CE Week 2b. Topologies, CSMA/CD, CSMA/CA.
Chapter Six The Data Link Layer. Objectives Learn about physical addressing on the network. Explore the MAC and LLC sublayers of Data Link. Get introduced.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
Lesson 4—Networking BASICS1 Networking BASICS Network Architectures Unit 2 Lesson 4.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
Understanding Network Architecture CHAPTER FOUR. The Function of Access Methods The set of rules that defines how a computer puts data onto the network.
Extending LANs using Repeaters, Bridges, and Switches.
LECTURE9 NET301 11/5/2015Lect 9 NET DYNAMIC MAC PROTOCOL: CONTENTION PROTOCOL Carrier Sense Multiple Access (CSMA): A protocol in which a node verifies.
1 Chapter Overview Ethernet Token Ring FDDI Wireless Networking.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
2016/3/11 1 Data Link Layer. 2016/3/11 2 Two basic services of Data Link Allows the upper layers to access the media using techniques such as framing.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
CIS 173 Networking Week #9 OBJECTIVES Chapter #6 Network Communications Protocols.
Local Area Networks: Topologies. 2 Packet Identification & MAC Addresses Each packet specifies an intended recipient with an identifier. – Demultiplexing.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
Mr C Johnston ICT Teacher BTEC IT Unit 09 - Lesson 03 Standards and Technologies.
COMPUTER NETWORKS CS610 Lecture-13 Hammad Khalid Khan.
Multiple Access Methods
IEEE standards.
Packetizing Error Detection
Local Area Networks: Topologies
Net301 lecture9 11/5/2015 Lect 9 NET301.
Multiple Access Methods
Network Topologies & Standards
Lecture 5- Data Link Layer
Multiple Access Methods
Presentation transcript:

Introduction to Computer Networks Introduction to Computer Networks

Understanding Network Architecture In this lecture, we explore the three principal methods used to access the wires: Contention, Polling, and Switching.

Access Methods In networking, to access a resource is to be able to use that resource.In networking, to access a resource is to be able to use that resource. We will focus on the following access methods:We will focus on the following access methods: Carrier-sense multiple-access with collision detection (CSMA/CD)Carrier-sense multiple-access with collision detection (CSMA/CD) Carrier-sense multiple-access with collision avoidance (CSMA/CA)Carrier-sense multiple-access with collision avoidance (CSMA/CA) Token passingToken passing Demand priorityDemand priority

The Function of Access Methods The set of rules that defines how a computer puts data onto the network cable and takes data from the cable is called an access method.The set of rules that defines how a computer puts data onto the network cable and takes data from the cable is called an access method. Once data is moving on the network, access methods help to regulate the flow of network traffic.Once data is moving on the network, access methods help to regulate the flow of network traffic. In computer network, the computers take turns accessing the network for brief periods of time.In computer network, the computers take turns accessing the network for brief periods of time. Multiple computers must share access to the cable that connects them.Multiple computers must share access to the cable that connects them.

Collision If two computers were to put data onto the cable at the same time, the data packets from one computer would collide with the packets from the other computer, and both sets of data packets would be destroyed.If two computers were to put data onto the cable at the same time, the data packets from one computer would collide with the packets from the other computer, and both sets of data packets would be destroyed.

The Function of Access Methods Access methods prevent computers from gaining simultaneous access to the cable.Access methods prevent computers from gaining simultaneous access to the cable. By making sure that only one computer at a time can put data on the network cable, access methods ensure that the sending and receiving of network data is an orderly process :By making sure that only one computer at a time can put data on the network cable, access methods ensure that the sending and receiving of network data is an orderly process : “Traffic Control on the Cable”“Traffic Control on the Cable”

CSMA/CD Access Methods Using CSMA/CD, each computer on the network, checks the cable for network traffic.Using CSMA/CD, each computer on the network, checks the cable for network traffic.

CSMA/CD Access Methods If two or more computers happen to send data at exactly the same time, there will be a data collision.If two or more computers happen to send data at exactly the same time, there will be a data collision. When collision happens, the two computers involved stop transmitting for a random period of time and then attempt to retransmit.When collision happens, the two computers involved stop transmitting for a random period of time and then attempt to retransmit. The collision-detection capability is the parameter that imposes a distance limitation on CSMA/CD.The collision-detection capability is the parameter that imposes a distance limitation on CSMA/CD. The collision detection mechanism is not effective beyond 2500 meters (1.5 miles).The collision detection mechanism is not effective beyond 2500 meters (1.5 miles).

The more computers there are on the network, the more network traffic there will be. With more traffic, collision avoidance and collisions tend to increase, which slows the network down.The more computers there are on the network, the more network traffic there will be. With more traffic, collision avoidance and collisions tend to increase, which slows the network down. After each collision, both computers will have to try to retransmit their data.After each collision, both computers will have to try to retransmit their data. If the network is very busy, there is a chance that the attempts by both computers will result in collisions with packets from other computers on the network. If the network is very busy, there is a chance that the attempts by both computers will result in collisions with packets from other computers on the network. CSMA/CD Considerations So, CSMA/CD can be a slow-access method.So, CSMA/CD can be a slow-access method.

In CSMA/CA, each computer signals its intent to transmit before it actually transmits data.In CSMA/CA, each computer signals its intent to transmit before it actually transmits data. In this way, computers sense when a collision might occur; this allows them to avoid transmission collisions.In this way, computers sense when a collision might occur; this allows them to avoid transmission collisions. Unfortunately, broadcasting the intent to transmit data increases the amount of traffic on the cable and slows down network performance.Unfortunately, broadcasting the intent to transmit data increases the amount of traffic on the cable and slows down network performance. CSMA/CA Access Method

In token-ring access method, a special type of packet, called a token, circulates around a cable ring from computer to computer.In token-ring access method, a special type of packet, called a token, circulates around a cable ring from computer to computer. When any computer on the ring needs to send data across the network, it must wait for a free token.When any computer on the ring needs to send data across the network, it must wait for a free token. When a free token is detected, the computer will take control of it if the computer has data to send.When a free token is detected, the computer will take control of it if the computer has data to send. Token-Passing Access Method

Data is transmitted in frames, and additional information, such as addressing, is attached to the frame in the form of headers and trailers.Data is transmitted in frames, and additional information, such as addressing, is attached to the frame in the form of headers and trailers. When a free token is detected, the computer will take control of it if the computer has data to send.When a free token is detected, the computer will take control of it if the computer has data to send. Token-Passing Access Method

Demand priority is designed for the 100-Mbps Ethernet standard, known as 100VG-AnyLAN.Demand priority is designed for the 100-Mbps Ethernet standard, known as 100VG-AnyLAN. It has been sanctioned and standardized by the Institute of Electrical and Electronic Engineers (IEEE) in its specification.It has been sanctioned and standardized by the Institute of Electrical and Electronic Engineers (IEEE) in its specification. This access method is based on the fact that repeaters and end nodes are the two components that make up all 100VG-AnyLAN networks.This access method is based on the fact that repeaters and end nodes are the two components that make up all 100VG-AnyLAN networks. Demand Priority Access Method

The repeaters manage network access by doing round-robin searches for requests to send from all nodes on the network.The repeaters manage network access by doing round-robin searches for requests to send from all nodes on the network. The repeater, or hub, is responsible for noting all addresses, links, and end nodes and verifying that they are all functioning.The repeater, or hub, is responsible for noting all addresses, links, and end nodes and verifying that they are all functioning. Demand Priority Access Method

As in CSMA/CD, two computers using the demand- priority access method can cause contention by transmitting at exactly the same time.As in CSMA/CD, two computers using the demand- priority access method can cause contention by transmitting at exactly the same time. However, with demand priority, it is possible to implement a scheme in which certain types of data will be given priority if there is contention.However, with demand priority, it is possible to implement a scheme in which certain types of data will be given priority if there is contention. If the hub or repeater receives two requests at the same time, the highest priority request is serviced first.If the hub or repeater receives two requests at the same time, the highest priority request is serviced first. Demand-Priority Contention If the two requests are of the same priority, both requests are serviced by alternating between the two.If the two requests are of the same priority, both requests are serviced by alternating between the two.

In a demand-priority network, computers can receive and transmit at the same time because of the cabling scheme defined for this access method.In a demand-priority network, computers can receive and transmit at the same time because of the cabling scheme defined for this access method. In this method, four pairs of wires are used. In this method, four pairs of wires are used. In a demand-priority network, there is communication only between the sending computer, the hub, and the destination computer.In a demand-priority network, there is communication only between the sending computer, the hub, and the destination computer. Demand-Priority Considerations This is more efficient than CSMA/CD, which broadcasts transmissions to the entire network.This is more efficient than CSMA/CD, which broadcasts transmissions to the entire network.

Access Methods in Summary CSMA/CD CSMA/CA Token passing Demand priorityCSMA/CD CSMA/CA Token passing Demand priority Broadcast Broadcast Token Hub-basedBroadcast Broadcast Token Hub-based Contention Contention Round-Robin Demand Detection Avoidance /PriorityContention Contention Round-Robin Demand Detection Avoidance /Priority Ethernet LocalTalk Token Ring 100VG-AnyLan Wireless FDDI, ArcNet SwitchesEthernet LocalTalk Token Ring 100VG-AnyLan Wireless FDDI, ArcNet Switches