Sei sulla pagina 1di 35

Part IV: Local Area Network(LAN)

LAN Technology What is LAN?, Its purpose? The LAN market has seen several technologies Ethernet, Token Ring, Token Bus, FDDI, and ATM. Ethernet is the dominant technology. IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802. to set standards to enable intercommunication among equipment from a variety of manufacturers and between different LANs. Ethernet The standard doesnt replace any part of OSI or TCP/IP model, instead specify functions of the physical and the data link layer of major LAN protocols.

The standard was adopted by the American National Standards Institute (ANSI). 1987, ISO also approved it as an international standard under the designation ISO 8802. The IEEE has subdivided the data link layer into two sublayers: logical link control (LLC) and media access control (MAC). also created several physical layer standards for different LAN protocols.

The lowest layer of the IEEE 802 reference model corresponds to the physical layer of the OSI model, and includes such functions as:
Encoding/decoding of signals Preamble generation/removal (for synchronization) Bit transmission/reception

in addition it includes a specification of the transmission medium and the topology. Data link layer: Medium Access Control (MAC)
LAN consist of collections of devices that must share the networks transmission capacity. controlling access to the transmission medium is needed

Medium Access Control (MAC)


All LANs consist of collections of devices that must share the networks transmission capacity. For an orderly and efficient use of that capacity. Key parameters in MAC technique are: Where and How Where refers: Weather control is exercised in a centralized or distributed fashion In centralized scheme, a controller is designed that has the authority to grant access to the network A station wishing to transmit must wait until it receives permission from the controller.

In decentralized network, the stations collectively perform a medium access control function to dynamically determine the order in which stations transmit

A centralized scheme has advantages:


may afford greater control over access for providing: priorities, overrides, and guaranteed capacity Enables the use of relatively simple access logic at each station Avoids problems of distributed coordination among peer entities

Disadvantages:
Creates a single point of failure Act as bottleneck, reducing performance

How refers: access control techniques


Synchronous or Asynchronous

Synchronous technique:
A specific capacity is dedicated to a connection; as in case of circuit switching, frequency division multiplexing (FDM) and synchronous TDM not optimal , why?

asynchronous technique:
allocate capacity in dynamic fashion, more or less in response to immediate demand.

Asynchronous approach can be subdivided:


Round robin Reservation Contention

Round robin:
Each station in turn is giving the opportunity to transmit Very efficient when many stations have data to transmit over an extended period of time Control of sequence may be centralized or distributed Reservation: Well suited for stream traffic (lengthy and fairly continuous transmissions; Ex. Voice communication) Time on medium is divided into slots

A station wishing to transmit reserves future slots for an


extended or even an indefinite period May be centralized or decentralized fashion

Contention:
Appropriate for bursty traffic No control is exercised to determine whose turn it is Are distributed by nature Principal advantage is they are simple to implement and efficient Round robin and contention techniques are the most commonly implemented in LANs

MAC Frame Format


The exact format of the MAC frame differs somewhat for the various MAC protocols in use

MAC control: contains any protocol information needed for the functioning of the MAC protocol. EX. Priority level could be indicated here Destination MAC address: the destination physical attachment point on the LAN for this frame Source MAC address: the source physical attachment point on the LAN for this frame

LLC: the LLC data from the next higher layer CRC: the cyclic redundancy check field (known as the frame check sequence, FCS, field)

Logical Link Control (LLC)


Flow control, error control, and part of the framing duties are done. Framing: LLC defines a protocol data unit (PDU) The header contains a control field used for flow and error control. Other header fields define the upper-layer protocol at the source and destination that uses LLC Destination service access point (DSAP) and the source service access point (SSAP)

LLC specifies the mechanisms for addressing stations and for controlling the exchange of data between two users.

LLC Service:
Unacknowledged connectionless No attempt to recover lost frame Suited for low error rate networks or for fault tolerant applications
Acknowledged connectionless Each frame is acknowledged by the receiver Suited for unreliable channels Acknowledged connection-oriented Ensures that All frames are received Each is received exactly once The service is accomplished using SIMPLEX, HALF DUPLEX OR FULL DUPLEX channels.

LAN Systems
ETHERNET: Ethernet is a local-area network (LAN) architecture developed by Xerox in 1976. The Ethernet specification served as the basis for the IEEE 802.3 standard, which specifies the medium access control layer and a physical layer. It is one of the most widely implemented LAN standards.

Standard Ethernet
MAC Sublayer: governs access method Packets in Ethernet networks are referred to as frames.
Preamble SFD 7 bytes DA SA 6 bytes Length 2 bytes Data FCS

1 byte 6 bytes

46-1500 bytes 4 bytes

Preamble: enables the receiving system to synchronize its input timing. SFD- start frame delimiter beginning of the frame next is DA DA destination address define the upper-layer protocol or number of bytes in the data field SA source address FCS- frame check sequence
Frame length from upper layer
Minimum ==46 byte Maximum ==1500 byte

Addressing

Each station on an Ethernet network (such as a PC, or printer) has its own (NIC) 6-byte physical address.
A source address is always a unicast address the frame comes from only one station. The destination address, however, can be unicast, multicast, or broadcast a) Unicast: If the least significant bit of the first byte in a destination address is 0 b) Multicast: all except this c) Broadcast: all 1s FF:FF:FF:FF:FF:FF The address is sent left-to-right, byte by byte the bit that defines an address as unicast or multicast arrives first at the receiver Ethernet uses the CSMA/CD access method to handle simultaneous demands. I-persistent CSMA/CD

Categories of standard Ethernet physical layer 10Base5 Topology bus Cable type thicknet coaxial Communication type - Half duplex Manchester encoding Uses DIX or AUI connector Max. segment length = 500 m

10Base2 Topology Bus Cable type thinnet coaxial Communication type - Half duplex Manchester encoding Uses BNC connector Max. segment length = 185 m

10BaseT
Topology star-bus Cable type UTP (cat 3 or higher) Communication type - Half duplex Uses RJ45 connector Max. segment length = 100 m
A number of standard existed for use with fibre-optic cabling, namely 10BaseFL, point-to-point link, connect stations or repeaters at up to 2 km

10BaseFB , point-to-point link that can be used to connect repeaters at up to 2 km


stations and repeaters with up to 1 km per segment

10BaseFP. A passive-star topology for interconnecting

Fast Ethernet IEEE 802.3u

increased transmission speed up to 100Mbps. Fast Ethernet is probably the most common standard in use today. The goals of Fast Ethernet
Upgrade the data rate to 100 Mbps. Make it compatible with Standard Ethernet. Keep the same 48-bit address. Keep the same frame format. Keep the same minimum and maximum frame lengths.

Autonegotiation: allows two devices to negotiate the mode or data rate operation

Since it uses full-duplex it doesnt use CSMA/CD, but its

implementation keep CSMA/CD Why ?

Categories of Fast Ethernet


100BaseT4
Topology star bus Cable type UTP (cat 3 or higher) Uses RJ45 connector Communication type - Half duplex Max. segment length = 100 m 100BaseFX Topology star bus Cable type fiber optics Uses SC, ST or FDDI MIC connector Communication type full duplex Max. segment length = 2000 m

100BaseTX
Topology star bus Cable type UTP (cat 5 or higher) Uses RJ45 connector Communication type full duplex Max. segment length = 100 m

Gigabit Ethernet
The need for higher data rate creates this. The goals of the Gigabit Ethernet :
Upgrade the data rate to 1 Gbps1000Mps Make it compatible with Standard or Fast Ethernet. Use the same 48-bit address. Use the same frame format. Keep the same minimum and maximum frame lengths. To support autonegotiation as defined in Fast Ethernet.

Categories of Gigabit Ethernet


1000BaseCX
Topology star bus Cable type Twinax (shielded copper wire) Uses HSSC connector Communication type full duplex Max. segment length = 25 m

1000BaseSX
Topology star bus Cable type fiber optics Uses SC connector Communication type full duplex Max. segment length = 275 m

1000BaseT
Topology star bus Cable type UTP (cat 5 or higher) Uses RJ45 connector Communication type full duplex Max. segment length = 100 m

1000BaseLX
Topology star bus Cable type fiber optic Uses SC connector Communication type full duplex Max. segment length = 316-550 m

No CSMA/CD, but its implementation incorporate it

WIRELESS LAN
One of the fastest-growing technologies. The demand for connecting devices without the use of cables is increasing everywhere. IEEE has defined the specifications for a wireless LAN, called IEEE 802.11 Wireless LAN wireless Ethernet Architecture : two kinds of services: the basic service set (BSS) and the extended service set (ESS). Basic Service Set IEEE 802.11 defines the basic service set (BSS) as the building block of a wireless LAN.

central base station

A BSS without an AP is called an ad hoc network(stand alone);


Consists number of stations executing the same MAC protocol and competing for access to the same shared medium. they can locate one another and agree to be part of a BSS

can not connect to any other basic service set a BSS with an AP is called an infrastructure network. AP provide the wireless clients with a point of access into a network. Extended Service Set An extended service set (ESS) is made up of two or more BSSs with APs.
here the BSSs are connected through a distribution system wired LAN Uses CSMA/CA

Wireless Standards
802.11b
Max. speed = 11Mbps Ave. speed = 4.5Mbps Max. distance outdoors = 120m Max. distance indoors = 60m Broadcast frequency = 2.4 GHz

802.11a
Max. speed = 54Mbps Ave. speed = 20Mbps Max. distance outdoors = 30m Max. distance indoors = 12m Broadcast frequency = 5 GHz

802.11g
Max. speed = 54Mbps Ave. speed = 4.5Mbps Max. distance outdoors = 30m Max. distance indoors = 20m Broadcast frequency = 2.4 GHz

Detail Wireless network

Ethernet Advantages
Relatively inexpensive Easy to implement Faster speeds (100MB and Gigabit) CSMA/CD (Carrier Sense Multiple Access / Collision Detection)

Read more

Access methods
The set of rules that defines how a computer puts data onto the network cable and takes data from the cable .

If data is to be sent, or accessed from a server, should without


running into other data (a collision). receiving computer must have assurance that the data has not been destroyed in a data collision during transmission. If different computers use different access methods, the network would fail be consistent.

prevent computers from gaining simultaneous access to the cable.

There are three major access methods: 1. carrier-sense multiple-access (CSMD), 2. token passing 3. demand priority

CSMA can be divided into two subtypes:


carrier sense multiple access with collision detection (CSMA/CD) and carrier sense multiple access with collision avoidance (CSMA/CA).

In CSMA/CD, each computer on the network, checks the cable


for network traffic. Only when a computer "senses" that the cable is free and that there is no traffic on the cable can it send data. Once the computer has transmitted data on the cable, no other

computer can transmit data until the original data has reached
its destination and the cable is free again. If two or more computers happen to send data at exactly the same time, there will be a data collision drop data stop transmitting for a random period of time and then attempt to retransmit.

E.g.

Each computer determines its own waiting period; this reduces the chance that the computers will once again transmit simultaneously. exponential backoff algorithm If more computers are on the network, the more network traffic. With more traffic, collisions tend to increase, which slows the network down. If the network is busy retransmission also cause collision this cause the network slow till to idle The collision-detection capability is determined by distance is not effective beyond 2500 meters CSMA/CD is known as a contention method

CSMA/CA: is the least popular of the major access methods Used for wireless networks. three strategies: the inter frame space(IFS)
First sense the channel, if idle does not send immediately Waits a paired of time IFS It also used to prioritize stations shorter IFS higher priority.

the contention window amount of time divided into slots.


A station chooses a random number of slots as its wait time. number of slots change based on exponential back-off strategy

Acknowledgments
The positive acknowledgment and the time-out timer can help guarantee that the receiver has received the frame.

Token passing: used by Token ring LANs round robin Demand priority Hubs or repeaters manage network access by searching for requests to send data from all nodes on the network. The hub is responsible for verifying that they are all functioning. Like CSMA/CD two Pcs cause contention by transmitting at exactly the same time the highest priority request is serviced first same priority, both requests are serviced by alternating between the two Communication is only between the sending computer, the hub, and the destination computer.

Collision Domains(CD)
collision domain is a logical area where the data packets collide with each other.

When two or more devices access the network at a time , a collision occurs
The collision domain's diameter is limited primarily by this timing issue. the distance between the two furthest nodes. maximum diameter is total time it takes for the smallest packet to travel round trip between the two furthest nodes.

Which device extends collision domain and which device segments it?

Hub and Repeater extends CD, they simply broadcast all packets to all ports, so their ports are in the same collision domain. Router, switch and bridge segments CD, the different ports of these devices operate in different collision domains.

R Repeater

How many collisions are there in the following LAN

CD= ?

128.143.71.21 is Argon to Neon on Sending a packet fromnotsendmy local network. Therefore, I need to the packet to my 128.143.71.21 is on my local network. default gateway with address 128.143.137.1 DNS: What IPis the MAC address DNS: What the IP address Therefore, I can send the packet directly. ARP: The is address of
of 128.143.137.1? ofneon.tcpip-lab.eduisof neon.tcpip-lab.edu ARP: The MAC address? 128.143.71.21 is 00:e0:f9:23:a8:20 128.143.137.1
argon.tcpip-lab.edu "Argon" 128.143.137.144

ARP: What is the MAC address ARP: The MAC address of of 128.143.71.21? neon.tcpip-lab.edu 128.143.137.1 is 00:20:af:03:98:28 "Neon"
128.143.71.21

router137.tcpip-lab.edu "Router137" 128.143.137.1 Router

router71.tcpip-lab.edu "Router71" 128.143.71.1

frame

frame

Ethernet Network

Ethernet Network

Potrebbero piacerti anche