Presentation is loading. Please wait.

Presentation is loading. Please wait.

Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE802.3 8.4:Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast.

Similar presentations


Presentation on theme: "Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE802.3 8.4:Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast."— Presentation transcript:

1 Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE802.3 8.4:Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast LAN interconnect technologies

2 8.1:Introduction PSTN ISDN PBX (private branch exchange)

3 8.2:LANs LANs are used to interconnect distributed communities of end systems To ensure the transmission bandwidth is shared fairly between all of the attached stations, a number of different medium access control (MAC) methods are used. These include (CSMA/CD) and Token ring

4 8.3:Ethernet / IEEE802.3 Ethernet networks – and the more recent derivative IEEE802.3 – are used extensively in technical and office environment CSMA/CD –All the stations are attached directly to the same cable/bus,it is said to operate in a multiple access mode –The bus operates in the broadcast mode which means that every frames transmitted is received by all the other stations that are attached to the bus –Because of the broadcast mode,this will result in the contents of the two frames being corrupted and a collision is said to have occurred

5 CSMA/CD Protocol Carrier Sense before transmission Carrier Sense while transmission Collision: Two or more stations transmitting simultaneously Backoff: Random delay after collision Deference: Defers transmission if channel is sensed busy Collision Window (Slot time): Round-trip propagation delay time plus some carrier sense time. In IEEE 802.3, this value is defined to be 51.2 us.

6 CSMA/CD Collision Handling Collision Signal is generated by Physical layer. Jam signal (collision enforcement): To make sure that all stations involved in the collision will detect collision. A pattern of 32 bits. Collision backoff and retransmission method (Truncated Binary Exponential Backoff Algorithm, BEBA): – n : number of collisions experienced (n <= 16) – k : Min (n,10) -- Truncation – r : Random delay time (unit: slot time) between 0 <= r < 2 k

7 CSMA/CD worse-case collision detection

8 Hub configuration principles

9 IEEE 802.3 Frame Format

10

11 8.4:Token ring All the stations are connected together by a set of unidirectional links in the form of a ring and all frame transmissions between any of the stations take place over it by circulating the frame around the ring Only one frame transfer can be in progress over the ring at a time Fig 8.5

12 Token ring network operation

13 Token ring wiring configuration

14 Token ring Frame Format

15

16

17

18 8.5:Bridges There are two types of bridges, the one are used with Ethernet LANs, knows as transparent bridges, and the others with token ring LANs, known as source routing bridges.

19 Bridge vs Repeater

20 8.5.1:Transparent bridges With a transparent bridge, as with a repeater,the presence of one (or more) bridges in a route between two communicating stations is transparent to the two stations. All routing decisions are made exclusively by the bridge(s) Fig 8.12 A bridge maintains a forwarding database Bridge learning –Forwarding database to be created in advanced

21 Transparent bridges(cont.)

22

23

24

25 8.5.2:Source routing bridges The major difference between a LAN base on source routing bridges and one base on spanning tree bridges is that with the latter the bridges collectively perform the routing operation in a way that is transparent to the end stations. Conversely, with source routing, the end stations perform the routing function. Fig 8.15

26

27 Token ring Frame Format

28 Example

29 8.6:FDDI FDDI is an optical fiber-based ring network that supports a bit rate of 100 Mbps. It can used for the interconnection of segments spread over a wider geographical area than a single building, such as a university campus or manufacturing plant. Fig 8.18 Use two counter-rotating rings to enhance reliability:primary ring and secondary ring Two type of station: DAS and SAS Fig 8.19

30

31

32

33

34 Physical interface

35 FDDI Frame Format

36

37

38 8.7:High-speed LANs 8.7.1:Fast Ethernet 8.7.2:Switched Fast Ethernet 8.7.3:Gigabit Ethernet

39 8.7.1:Fast Ethernet Fast Ethernet was to use the same shared, half- duplex transmission mode as Ethernet but to obtain a*10 increase in operational bit rate over 10BaseT while at the same time retaining the same wiring systems, MAC method, and frame format. The major technological hurdle to overcome with Fast Ethernet was how to achieve a bit rate of 100Mbps over 100m of UTP cable. Fig 8.26

40

41

42 Collision detection Fig 8.28 Detect a collision by detecting a signal on pair 2 while it is transmitting and, the hub detects a collision by the presence of a signal on pair 1

43

44 8.7.2:Switched Fast Ethernet In order to allow multiple access/transfers to be in progress concurrently, two developments have been made: –Switch hub architecture –Duplex working over the circuits that connect the stations to the hub. Fig 8.29

45

46

47 8.8:LAN protocol

48 8.8.1:Physical layer

49 8.8.2:MAC sublayer

50 8.8.3:LLC sublayer

51

52 8.8.4:Network layer IPX –connectionless TCP/IP

53 8.9:Multicast LAN interconnect technologies 8.9.1:Intersite gateways 8.9.2:ISDN switched connection 8.9.3:Frame relay 8.9.4:High bit rate leased lines

54 8.9.1:Intersite gateways

55 8.9.2:ISDN switched connection

56 8.9.3:Frame relay

57

58 8.9.4:High bit rate leased lines

59 Summary


Download ppt "Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE802.3 8.4:Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast."

Similar presentations


Ads by Google