Presentation is loading. Please wait.

Presentation is loading. Please wait.

Chapter 10: Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach Third.

Similar presentations


Presentation on theme: "Chapter 10: Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach Third."— Presentation transcript:

1 Chapter 10: Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach Third Edition

2 Data Communications & Computer Networks: A Business User's Approach, Third Edition2 Objectives Distinguish local area networks, metropolitan area networks, and wide area networks from each other Identify the characteristics of metropolitan area networks, and explain how they compare and contrast with wide area and local area networks Describe how circuit-switched, datagram packet- switched, and virtual circuit packet-switched networks work

3 Data Communications & Computer Networks: A Business User's Approach, Third Edition3 Objectives (continued) Identify the differences between a connection- oriented network and a connectionless network, and give an example of each Describe the differences between centralized routing and distributed routing, and cite the advantages and disadvantages of each Describe the differences between static routing and adaptive routing, and cite the advantages and disadvantages of each

4 Data Communications & Computer Networks: A Business User's Approach, Third Edition4 Objectives (continued) Document the main characteristics of flooding, and use hop count and hop limit in a simple example Discuss the basic concepts of network congestion, including quality of service

5 Data Communications & Computer Networks: A Business User's Approach, Third Edition5 Introduction As we have seen, a local area network covers a room, a building or a campus A metropolitan area network (MAN) covers a city or a region of a city A wide area network (WAN) covers multiple cities, states, countries, and even the solar system

6 Data Communications & Computer Networks: A Business User's Approach, Third Edition6 Metropolitan Area Network Basics MANs: Borrow technologies from LANs and WANs Support high-speed disaster recovery systems, real-time transaction backup systems, interconnections between corporate data centers and Internet service providers, and government, business, medicine, and education high- speed interconnections Almost exclusively fiber optic systems

7 Data Communications & Computer Networks: A Business User's Approach, Third Edition7 Metropolitan Area Network Basics (continued) MANs: Have very high transfer speeds Can recover from network faults very quickly (failover time) Are very often a ring topology (not a star-wired ring) Some can be provisioned dynamically

8 Data Communications & Computer Networks: A Business User's Approach, Third Edition8 Metropolitan Area Network Basics (continued)

9 Data Communications & Computer Networks: A Business User's Approach, Third Edition9 SONET vs. Ethernet Most MANs are SONET network built of multiple rings (for failover purposes) SONET: Well-proven but complex, fairly expensive, and cannot be provisioned dynamically Based upon T-1 rates and does not fit nicely into 1 Mbps, 10 Mbps, 100 Mbps, 1000 Mbps chunks, like Ethernet systems do Ethernet MANs generally have high failover times

10 Data Communications & Computer Networks: A Business User's Approach, Third Edition10 SONET vs. Ethernet (continued)

11 Data Communications & Computer Networks: A Business User's Approach, Third Edition11 SONET vs. Ethernet (continued)

12 Data Communications & Computer Networks: A Business User's Approach, Third Edition12 Wide Area Network Basics WANs used to be characterized with slow, noisy lines Today WANs are very high speed with very low error rates WANs often follow a mesh topology

13 Data Communications & Computer Networks: A Business User's Approach, Third Edition13 Wide Area Network Basics (continued)

14 Data Communications & Computer Networks: A Business User's Approach, Third Edition14 Wide Area Network Basics (continued) Station: device that interfaces a user to a network Node: device that allows one or more stations to access the physical network A transfer point for passing information through a network Is often a computer, router, or telephone switch Communications network, or physical network: underlying connection of nodes and telecommunication links

15 Data Communications & Computer Networks: A Business User's Approach, Third Edition15 Wide Area Networks (continued)

16 Data Communications & Computer Networks: A Business User's Approach, Third Edition16 Types of Communications Networks Circuit switched network: Network in which a dedicated circuit is established between sender and receiver All data passes over this circuit Telephone system is a common example Connection is dedicated until one party or another terminates the connection

17 Data Communications & Computer Networks: A Business User's Approach, Third Edition17 Circuit-Switched Network

18 Data Communications & Computer Networks: A Business User's Approach, Third Edition18 Packet-Switched Network Packet switched network: Network in which all data messages are transmitted using fixed-sized packages, called packets More efficient use of a telecommunications line since packets from multiple sources can share the medium. One form of packet switched network is the datagram With a datagram, each packet is on its own and may follow its own path Virtual circuit creates a logical path through the subnet All packets from one connection follow this path

19 Data Communications & Computer Networks: A Business User's Approach, Third Edition19 Broadcast Network Broadcast network: Network typically found in local area networks but occasionally found in wide area networks A workstation transmits its data and all other workstations “connected” to the network hear the data Only the workstation(s) with the proper address will accept the data

20 Data Communications & Computer Networks: A Business User's Approach, Third Edition20 Summary of Network Structures

21 Data Communications & Computer Networks: A Business User's Approach, Third Edition21 Connection-Oriented vs. Connectionless Network Applications The network structure is the underlying physical component of a network What about the software or application that uses the network? A network application can be either connection- oriented or connectionless

22 Data Communications & Computer Networks: A Business User's Approach, Third Edition22 Connection-Oriented vs. Connectionless Network Applications (continued) A connection-oriented application requires both sender and receiver to create a connection before any data is transferred Applications (such as large file transfers) and sensitive transactions (such as banking and business) are typically connection-oriented A connectionless application does not create a connection first but simply sends the data Electronic mail is a common example

23 Data Communications & Computer Networks: A Business User's Approach, Third Edition23 Connection-Oriented vs. Connectionless Network Applications (continued)

24 Data Communications & Computer Networks: A Business User's Approach, Third Edition24 Connection-Oriented vs. Connectionless Network Applications (continued)

25 Data Communications & Computer Networks: A Business User's Approach, Third Edition25 Connection-Oriented vs. Connectionless Network Applications (continued) A connection-oriented application can operate over both a circuit switched network or a packet switched network A connectionless application can also operate over both a circuit switched network or a packet switched network However, a packet switched network may be more efficient

26 Data Communications & Computer Networks: A Business User's Approach, Third Edition26 Routing Each node in a WAN is a router that: 1.Accepts an input packet 2.Examines the destination address 3.Forwards the packet on to a particular telecommunications line How does a router decide which line to transmit on? Router must select one transmission line that will best provide a path to the destination in an optimal manner Often many possible routes exist between sender and receiver

27 Data Communications & Computer Networks: A Business User's Approach, Third Edition27 Routing (continued)

28 Data Communications & Computer Networks: A Business User's Approach, Third Edition28 Routing (continued) The communications network with its nodes and telecommunication links is essentially a weighted network graph The edges, or telecommunication links, between nodes, have a cost associated with them Could be a delay cost, queue size cost, limiting speed, or simply a dollar amount for using that link

29 Data Communications & Computer Networks: A Business User's Approach, Third Edition29 Routing (continued)

30 Data Communications & Computer Networks: A Business User's Approach, Third Edition30 Routing (continued) Routing method, or algorithm, chosen to move packets through a network should be: Optimal, so the least cost can be found Fair, so all packets are treated equally Robust, in case link or node failures occur and the network has to reroute traffic Not too robust so that the chosen paths do not oscillate too quickly between troubled spots

31 Data Communications & Computer Networks: A Business User's Approach, Third Edition31 Dijkstra’s Least-Cost Algorithm Dijkstra’s least-cost algorithm finds all possible paths between two locations By identifying all possible paths, it also identifies the least cost path Can be applied to determine the least cost path between any pair of nodes

32 Data Communications & Computer Networks: A Business User's Approach, Third Edition32 Dijkstra’s Least-Cost Algorithm (continued)

33 Data Communications & Computer Networks: A Business User's Approach, Third Edition33 Flooding When a packet arrives at a node, the node sends a copy of the packet out to every link except the link the packet arrived on Traffic grows very quickly when every node floods the packet To limit uncontrolled growth, each packet has a hop count Every time a packet hops, its hop count is incremented When a packet’s hop count equals a global hop limit, the packet is discarded

34 Data Communications & Computer Networks: A Business User's Approach, Third Edition34 Flooding (continued)

35 Data Communications & Computer Networks: A Business User's Approach, Third Edition35 Flooding (continued)

36 Data Communications & Computer Networks: A Business User's Approach, Third Edition36 Centralized Routing One routing table is kept at a “central” node Whenever a node needs a routing decision, the central node is consulted To survive central node failure, the routing table should be kept at a backup location The central node should be designed to support a high amount of traffic consisting of routing requests

37 Data Communications & Computer Networks: A Business User's Approach, Third Edition37 Centralized Routing (continued)

38 Data Communications & Computer Networks: A Business User's Approach, Third Edition38 Distributed Routing Each node maintains its own routing table No central site holds a global table Somehow each node has to share information with other nodes so that the individual routing tables can be created Possible problem: individual routing tables holding inaccurate information

39 Data Communications & Computer Networks: A Business User's Approach, Third Edition39 Distributed Routing (continued)

40 Data Communications & Computer Networks: A Business User's Approach, Third Edition40 Adaptive Routing versus Static Routing With adaptive routing, routing tables can change to reflect changes in the network Static routing: Does not allow the routing tables to change Is simpler but does not adapt to network congestion or failures

41 Data Communications & Computer Networks: A Business User's Approach, Third Edition41 Routing Examples Routing Information Protocol (RIP): First routing protocol used on the Internet Form of distance vector routing Was adaptive and distributed Each node kept its own table and exchanged routing information with its neighbors

42 Data Communications & Computer Networks: A Business User's Approach, Third Edition42 Routing Examples Open Shortest Path First (OSPF): Second routing protocol used on the Internet A form of link state routing It too was adaptive and distributed However, more complicated and performed much better than RIP

43 Data Communications & Computer Networks: A Business User's Approach, Third Edition43 Network Congestion When a network or a part of a network becomes so saturated with data packets that packet transfer is noticeably impeded, network congestion occurs What can cause network congestion? Node and link failures High amounts of traffic Improper network planning When serious congestion occurs, buffers overflow and packets are lost

44 Data Communications & Computer Networks: A Business User's Approach, Third Edition44 Network Congestion (continued) What can we do to reduce or eliminate network congestion? An application can observe its own traffic and notice if packets are disappearing If so, there may be congestion This is called implicit congestion control The network can inform its applications that congestion has occurred and the applications can take action This is called explicit congestion control

45 Data Communications & Computer Networks: A Business User's Approach, Third Edition45 Congestion Avoidance Before making a connection, user requests how much bandwidth is needed, or if connection needs to be real-time Network checks to see if it can satisfy user request If user request can be satisfied, connection is established If a user does not need a high bandwidth or real- time, a simpler, cheaper connection is created Asynchronous transfer mode is a very good example of this (Chapter Twelve)

46 Data Communications & Computer Networks: A Business User's Approach, Third Edition46 WANs in Action: Making Internet Connections Home to Internet connection: Modem and dial-up telephone provide circuit switched subnet, while connection through the Internet is a packet- switched subnet The application can be either a connection-oriented application or a connectionless application

47 Data Communications & Computer Networks: A Business User's Approach, Third Edition47 A Home-to-Internet Connection

48 Data Communications & Computer Networks: A Business User's Approach, Third Edition48 A Work-to-Internet Connection A work to Internet connection would most likely require a broadcast subnet (LAN) with a connection to the Internet (packet switched subnet)

49 Data Communications & Computer Networks: A Business User's Approach, Third Edition49 A Work-to-Internet Connection (continued)

50 Data Communications & Computer Networks: A Business User's Approach, Third Edition50 Summary LANs, MANs, and WANs Circuit-switched, datagram packet-switched, and virtual circuit packet-switched networks Connection-oriented vs. connectionless networks Centralized vs. distributed routing Static vs. adaptive routing Flooding, hop count and hop limit Network congestion


Download ppt "Chapter 10: Introduction to Metropolitan Area Networks and Wide Area Networks Data Communications and Computer Networks: A Business User’s Approach Third."

Similar presentations


Ads by Google