07rev5.ppt
-
Upload
networksguy -
Category
Documents
-
view
499 -
download
0
description
Transcript of 07rev5.ppt
Chapter 7:
Local Area Networks: The Basics
Data Communications andComputer Networks: A Business User’s ApproachFifth Edition
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 2
Introduction
•Local area network - communication network
•Interconnects a variety of data communicating devices within a small geographic area
•Broadcasts data at high data transfer rates with very low error rates
•Since the local area network first appeared in the 1970s, its use has become widespread in commercial and academic environments
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 3
Primary Function of a LAN
•To provide access to hardware and software resources that will allow users to perform one or more of the following activities:
•File serving, Print serving, Video transfers, Manufacturing support, Academic support , E-mail support, Interconnection between multiple systems
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 4
Advantages of Local Area Networks
•Ability to share hardware and software resources
•Component and system evolution (upgrades) are possible and easier to implement
•Support for heterogeneous forms of hardware and software
•Access to other LANs and WANs (Figure 7-1)
•Private ownership (is this always a plus?)
•Secure transfers at high speeds with low error rates
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 5
Interconnection of Local Area NetworksRouters!
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 6
Disadvantages of Local Area Networks
•Equipment and support can be costly•Level of maintenance continues to grow•Private ownership?•Some types of hardware may not interoperate•Just because a LAN can support two different kinds of packages does not mean their data can be interchanged easily•A LAN is only as strong as it weakest link, and there are many links…Security!!!
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 7
Basic Local Area Network Topologies
Local area networks are interconnected using one of four basic configurations:
1. Bus/tree
2. Star-wired bus
3. Star-wired ring
4. Wireless
(physical implementation!)
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 8
Bus/Tree Topology
•The original topology
•Workstation has a network interface card (NIC) that attaches to the bus (a coaxial cable) via a tap
•Data can be transferred using either
•Baseband digital signals
•Broadband analog signals
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 9
Bus/Tree Topology (continued)
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 10
Bus/Tree Topology (continued)
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 11
Bus/Tree Topology (continued)
•Baseband signals (digital) •Bidirectional
•Move outward from the workstation transmitting in both directions
•Broadband signals (analog)•Usually unidirectional
•Transmit in only one direction (due to amplifiers!)
•Buses can be split and joined, creating trees
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 12
Bus/Tree Topology (continued)
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 13
Bus/Tree Topology (continued)If transmission is one way, how does pc #b transmit to #a?
PC #A
PC #B
data
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 14
Star-Wired Bus Topology
•Logically operates as a bus - physically looks like a star
•Star design based on hub
•All workstations attach to hub
•Unshielded twisted pair usually used to connect workstation to hub•Hub takes incoming signal and immediately broadcasts it out all connected links•Hubs can be interconnected to extend network size
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 15
Star-Wired Bus Topology (continued)
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 16
Star-Wired Bus Topology (continued)
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 17
Star-Wired Bus Topology (continued)
•Modular connectors (RJ-45) and twisted pair make installation and maintenance of star-wired bus easier than a standard bus
•Hubs can be interconnected with twisted pair, coaxial cable, or fiber optic cable
•Biggest disadvantage: when one station talks, everyone
hears it (contention based: Ethernet!) called a shared network
•All devices are sharing the network medium
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 18
Star-Wired Ring Topology
•Logically operates as a ring but physically appears as a star
•Based on MAU (multi-station access unit) which functions similarly to a hub
•Where a hub immediately broadcasts all incoming signals onto all connected links, the MAU passes the signal around in a ring fashion
•Like hubs, MAUs can be interconnected to increase network size
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 19
Star-Wired Ring Topology (continued)
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 20
Star-Wired Ring Topology (continued)
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 21
Wireless LANs
•Not really a specific topology
•Workstation in wireless LAN can be anywhere as long as within transmitting distance to access point
•Several versions of IEEE 802.11 standard defines various forms of wireless LAN connections
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 22
Wireless LANs (continued)
•Two basic components necessary: •Client Radio - usually PC card with integrated antenna installed in a laptop or workstation
•Access Point (AP) - Ethernet port plus transceiver
•AP acts as bridge between wired and wireless networks
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 23
Wireless LANs (continued)
Basic Service Set:
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 24
Wireless LANs (continued)Extended Service Set:
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 25
Wireless LANs (continued)
•IEEE 802.11 – The original wireless standard, capable of transmitting data at 2 Mbps (freq. hopping or direct sequence spread spectrum)
•IEEE 802.11b – The second wireless standard, capable of transmitting data at 11 Mbps (direct sequence spread spectrum – chip codes – code division)
•In actual tests, 11 Mbps 802.11b devices managed 5.5 Mbps (from July 2000 test by Network Computing)
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 26
DSSS:Acronym for direct-sequence spread spectrum. DSSS is one of two types of spread spectrum radio, the other being frequency-hopping spread spectrum. DSSS is a transmission technology used in LAWN transmissions where a data signal at the sending station is combined with a higher data rate bit sequence, or chipping code, that divides the user data according to a spreading ratio. The chipping code is a redundant bit pattern for each bit that is transmitted, which increases the signal's resistance to interference. If one or more bits in the pattern are damaged during transmission, the original data can be recovered due to the redundancy of the transmission.
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 27
FHSS:Acronym for frequency-hopping spread spectrum. FHSS is one of two types of spread spectrum radio, the other being direct-sequence spread spectrum. FHSS is a transmission technology used in LAWN transmissions where the data signal is modulated with a narrowband carrier signal that "hops" in a random but predictable sequence from frequency to frequency as a function of time over a wide band of frequencies. The signal energy is spread in time domain rather than chopping each bit into small pieces in the frequency domain. This technique reduces interference because a signal from a narrowband system will only affect the spread spectrum signal if both are transmitting at the same frequency at the same time. If synchronized properly, a single logical channel is maintained. The transmission frequencies are determined by a spreading, or hopping, code. The receiver must be set to the same hopping code and must listen to the incoming signal at the right time and correct frequency in order to properly receive the signal. Current FCC regulations require manufacturers to use 75 or more frequencies per transmission channel with a maximum dwell time (the time spent at a particular frequency during any single hop) of 400 ms.
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 28
Wireless LANs (continued)
•With directional antennae designed for point-to-point transmission (rare), 802.11b can transmit for more than 10 miles
•With an omni-directional antenna on a typical AP, range may drop to as little as 100 feet
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 29
Wireless LANs (continued)
•IEEE 802.11a –Capable of transmitting data at 54 Mbps using 5 GHz frequency range (FDM similar to ADSL bits sent out over 48 sub-bands)
•IEEE 802.11g –Capable of transmitting data at 54 Mbps but using the same frequencies as 802.11b (2.4 GHz) (same as a but more complex modulation technique) Backwards compatible with 802.11b
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 30
Wireless LANs (continued)
•To provide security, most systems use either Wired Equivalent Privacy (WEP)
•Provides either 40- or 128-bit key protection
•Or a more advanced standard such as WPA (more on security in Chapter Thirteen)•Wireless LANs may also be configured without access point
•These configurations are called “ad-hoc”
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 31
Wireless LANs (continued)
Ad Hoc:
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 32
Comparison of Bus, Star-Wired Bus, Star-Wired Ring, and Wireless Topologies
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 33
Medium Access Control Protocols
• How does a workstation get its data onto the LAN medium?
• Medium access control protocol – software/firmware that allows workstations to “take turns” at transmitting data
• Two basic categories:
1. Contention-based protocols
2. Round robin protocols
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 34
Contention-Based Protocols
•Essentially first come first served
•Most common example:
•Carrier sense multiple access with collision detection (CSMA/CD)
•If no one is transmitting, a workstation can transmit but keeps listening for a collision
•If someone else is transmitting, workstation “backs off” and waits
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 35
CSMA/CD Persistence Algorithms (details section)
• Non-persistent- listen, back off, and listen again.
• 1-persistent- always listen, transmit immediately
• P-persistent- listen always, back off with probability p-1 (or transmit immediately with probability p!)
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 36
Contention-Based Protocols (continued)
•If two workstations transmit at the same time •Collision occurs
•When a workstation hears a collision•Stop transmitting immediately and issue a jam signal
•All workstations back off a random amount of time and try again
•Hopefully, workstations do not try again at the exact same time
•CSMA/CD: example of non-deterministic protocol
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 37
Contention-Based Protocols (continued)
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 38
Round Robin Protocols
•Each workstation takes turn transmitting turn is passed around the network from workstation to workstation•Most common example is token ring LAN:
•Software token is passed from workstation to workstation
•Token ring: example of deterministic protocol•Token ring more complex than CSMA/CD. What happens if token is lost? Duplicated? Hogged?•Token ring LANs are losing the battle with CSMA/CD LANs
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 39
Token Ring
Token
B has token soTransmits data
M takes data, sets rec. bits andSends message on.
B sees that M received dataAnd releases token
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 40
IEEE 802
• To better support local area networks, data link (DLC) layer of the OSI model was broken into two sublayers:1. Logical link control sublayer (LLC-layer)
2. Medium access control sublayer (MAC-layer)
• Medium access control sublayer defines the frame layout • More closely tied to specific medium/protocol at physical
layer
• Thus, when people refer to LANs they often refer to its MAC sublayer name, such as 10BaseT (10Mbps, twisted pair)
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 41
IEEE 802
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 42
IEEE 802.3 and 802.5 Frame Formats
•IEEE 802 suite of protocols defines frame formats for CSMA/CD (IEEE 802.3) and token ring (IEEE 802.5)
•Each frame format describes how data package is formed
•Note that the two frame formats are different
•If a CSMA/CD network connects to a token ring network, frames have to be converted from one to another
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 43
IEEE 802.3 and 802.5 Frame Formats
Why do some frames have toBe padded to reach a minimumLength?
CRC
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 44
IEEE 802.3 and 802.5 Frame Formats
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 45
Local Area Network Systems
•Ethernet or CSMA/CD
•Most common form of LAN today
•Star-wired bus is most common topology but bus topology also available
•Ethernet comes in many forms depending on:
•Medium used
•Transmission speed
•Technology
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 46
Ethernet
•Originally, CSMA/CD was 10 Mbps
•Then 100 Mbps was introduced
•Most NICs sold today are 10/100 Mbps
•Then 1000 Mbps (1 Gbps) was introduced
•10 Gbps is now beginning to appear
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 47
Ethernet (continued)
•Cabling can be either UTP or optical
•10 Gbps Ethernet may not work over UTP due to radio frequency interference
•Where 10 Mbps Ethernet has less than 30% utilization due to collisions
•1000 Mbps is limited only by traffic queuing
•Distance with 10 Mbps is limited by CSMA/CD propagation time
•1000 Mbps limited only by medium
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 48
Ethernet (continued)
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 49
IBM Token Ring
•Deterministic LAN offered at speeds of 4, 16 and 100 Mbps
•Very good throughput under heavy loads
•More expensive components than CSMA/CD
•Losing ground quickly to CSMA/CD
•May be extinct soon
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 50
Fiber Distributed Data Interface (FDDI)
•Based on token ring design using 100 Mbps fiber connections
•Allows for two concentric rings
•Inner ring can support data travel in opposite direction or work as backup
•Token is attached to outgoing packet, rather than waiting for outgoing packet to circle entire ring
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 51
Fiber Distributed Data Interface (FDDI)
Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 52
Homework For Chapter 7