Module 2. Computer Networking

Size: px
Start display at page:

Download "Module 2. Computer Networking"

Transcription

1 Module 2 Computer Networking A specific and very important application of data communications is computer networking. We need to examine what topologies and protocols a computer network may employ. CCN: Lecture Notes Computer Comm. & Networking 1

2 Local Area Networks (LAN)-Topologies Many nodes usually require high data transfer rates, and ability to connect to any other node within close proximity of each other. How do we connect the nodes together? What kinds of topologies we can use? Star Ring Bus Hub/Tree CCN: Lecture Notes Computer Comm. & Networking 2

3 Star Uses large amount of cable Outage of node connection does not affect others Center or hub failure -> all nodes outage CCN: Lecture Notes Computer Comm. & Networking 3

4 Ring Reduces cabling costs One node or line down and network dies Cable route must be circular CCN: Lecture Notes Computer Comm. & Networking 4

5 Bus Further reduced cabling costs Non circular route One node down, rest still work Interconnected via bridges CCN: Lecture Notes Computer Comm. & Networking 5

6 Hub/Tree Hub is bus/ring with all wiring inside one box Cross between star and bus/ring Can be combined into trees CCN: Lecture Notes Computer Comm. & Networking 6

7 Baseband systems LAN-Media A baseband system sends digital signals straight to line. They may be encoded (e.g. Manchester code) but they are not modulated. What is Baseband? The original frequency band of the message signal, usually from (near) dc to a few megahertz. Examples of Baseband transmission systems LANS (ethernet, token ring) RS232C Magnetic discs and tapes CCN: Lecture Notes Computer Comm. & Networking 7

8 A Typical Baseband System Digital Information Source Analog Information Format Sampler Coder Quantizer Waveform Encoder (modulator) Transmitter Format Binary Digits Pulse Waveforms Channel Analog Information Destination Digital Information Low-pass filter Decoder Waveform Detector Receiver CCN: Lecture Notes Computer Comm. & Networking 8

9 Typical Baseband waveforms +V -V +V -V NRZ-L NRZ-M +V -V NRZ-S +V 0 +V 0 -V +V 0 -V Unipolar RZ Bipolar RZ RZ-AMI +V -V Bi- φ -L +V -V Bi- φ -M +V -V Bi- φ -S +V -V DM CCN: Lecture Notes Computer Comm. & Networking 9

10 When selecting a coding scheme, one should consider the following: 1. DC component System which requires AC coupling cannot use those schemes that contain DC component. E.g. Unipolar NRZ 2. Self-clocking Some schemes have inherent clocking features which permit clock recovery at the receiving end. E.g. Manchester, bipolar- RZ 3. Error detection Some schemes provide error correction capabilities without additional parity bits. 4. Bandwidth Communication channels are usually band limited. One has to consider the bandwidth efficiency of the coding scheme. 5. Noise immunity Some schemes are more immune to noise than others. CCN: Lecture Notes Computer Comm. & Networking 10

11 Twisted wire Shielded and unshielded Flexible, i.e., easy to install Normally used for Low grade star networks Hub-DTE connections Network drop* Low to medium data rates CCN: Lecture Notes Computer Comm. & Networking 11

12 Thin wire 0.25 coaxial cable, i.e., RG58 Less flexible High data rates Used as bus or ring cable Used as drop* from network CCN: Lecture Notes Computer Comm. & Networking 12

13 Thick wire 0.5 coaxial cable Rigid, i.e., hard to run High data rates Used as bus, ring or backbone cable CCN: Lecture Notes Computer Comm. & Networking 13

14 Optical Fibre Rigid Very high data rates Used as bus, ring or backbone Wireless Infrared at 850 and 950nm Spread spectrum modulated on 2.4 GHz ISM band Mainly office networks, store inventory etc. Generally moderate bit rates but portable CCN: Lecture Notes Computer Comm. & Networking 14

15 *Network drops Because of the frequency of the signals used, care must be taken to avoid reflections due to impedance mismatches. Cable ends must be terminated Attach resistor across last node Tees must be avoided Problem when DTE is not close to cable Use a transceiver to connect onto the cable Receives and transmits signal onto cable directly Converts signal into a form suitable for drop cable and DTE connection (Ethernet card in PC) Transceivers and DTE connections may connect via same signals as main cable or via twisted pairs through an Attachment Unit Interface (AUI) CCN: Lecture Notes Computer Comm. & Networking 15

16 Broadband Systems Almost exclusively coaxial cable systems. A popular system is an adaptation of the Community Antenna Television System (CATV). The system is very similar to using a modem on a PSTN (Public Switched Telephone Network) line except the carrier may be 100 s MHz with a B/W of MHz s CCN: Lecture Notes Computer Comm. & Networking 16

17 Broadband Systems (Cont d) Forward and reverse directions may be accomplished by different frequencies on a single cable or by using dual cables Using a single cable Headend amplifiers retransmit the received signal onto the transmit frequency or onto the transmit cable CCN: Lecture Notes Computer Comm. & Networking 17

18 Broadband Systems (Cont d) Using dual cables Data rates are normally between 0.25 and 1 bps/hz of cable B/W CCN: Lecture Notes Computer Comm. & Networking 18

19 Cable B/W s of up to 400MHz are common. Connection are either Dedicated Frequency band assigned to 2 nodes permanently 20 Mbps Switched Frequency agile modems switch to a designated frequency Frequencies assigned from a common frequency 56 Mbps Multiple Access Time division access Each node gets the entire B/W for a short time and addresses a packet to another node. Most popular CCN: Lecture Notes Computer Comm. & Networking 19

20 How do the different mediums perform under the different topologies? Ring CCN: Lecture Notes Computer Comm. & Networking 20

21 How do the different mediums perform under the different topologies? Bus/Tree CCN: Lecture Notes Computer Comm. & Networking 21

22 How do the different mediums perform under the different topologies? Star CCN: Lecture Notes Computer Comm. & Networking 22

23 How is access of each node to the media controlled? Common Medium Access Control (MAC) protocols Will see later that MAC forms bottom half of Link Layer Carrier Sense Multiple Access/Collision Detect (CSMA/CD) Control token CCN: Lecture Notes Computer Comm. & Networking 23

24 CSMA/CD Sole application to bus networks All nodes connected together onto bus Multiple access (MA) Data is broadcast onto the bus in a packet with a header containing the destination address Packet also contains source address Before a frame is sent, the node listens to see if the bus is busy (Carrier Sense CS) When the bus is quiet, the node will transmit Even though the bus is quiet at the listening node, a data frame may still be on its way When it arrives a collision will occur CCN: Lecture Notes Computer Comm. & Networking 24

25 CSMA/CD (Cont d) A collision may be detected by listening to your own transmission (Collision detect CD). When what you hear on the bus is not the same as what you are sending, a collision may be in progress. When a collision occurs, the transmitting node sends a jam sequence of some bit sequence to ensure the other node involved in the collision detects the collision. Both nodes then cease transmission and back-off for a random time. Either one of these nodes or another node may attempt to transmit again. Collision rate is purely probabilistic. CCN: Lecture Notes Computer Comm. & Networking 25

26 CSMA/CD (Cont d) Concept of collision window CCN: Lecture Notes Computer Comm. & Networking 26

27 How is access of each node to the media controlled? Common Medium Access Control (MAC) protocols Will see later that MAC forms bottom half of Link Layer Carrier Sense Multiple Access/Collision Detect (CSMA/CD) Control token CCN: Lecture Notes Computer Comm. & Networking 27

28 Control token The token is just a special frame that gives a node permission to transmit when it receives it. All nodes are placed in a logical ring Not necessarily a physical ring All nodes are placed in a sequence The token is passed from node to node around the logical ring A node may transmit a frame when it receives the token. The node then sends the token to the next logical node One node is generally designated to attend to initialisation of the token and regeneration of a lost token A physical ring may be employed in which case the nodes will be 2 port devices. CCN: Lecture Notes Computer Comm. & Networking 28

29 Slotted ring A physical ring contains normal nodes plus a monitor node. The monitor node ensures there are a fixed number of empty frames being circulated around the ring. The frames contain a full/empty bit to indicate their status. CCN: Lecture Notes Computer Comm. & Networking 29

30 Slotted ring (cont d) When a node wishes to transmit, it fills an empty frame with source and destination address and data, and it switches the full/empty bit. The now full frame will circulate around the ring and will be absorbed by the destination node who will modify the response bits to indicate it has read the frame. The frame will continue around the ring until it reaches the source node who will check the response bits and mark the frame as empty (full/empty bit). The monitor also checks a passed bit which it resets each time a full frame passes. If a node fails to mark an old frame as empty, the monitor will detect this and mark the frame empty. CCN: Lecture Notes Computer Comm. & Networking 30

31 Slotted ring (cont d) Normally these frames are smaller than a link layer frame, therefore many are required to transmit a full LL frame. A special node (monitor) is required which may bring the whole network down due to failure. Each node may only have one frame on the ring at any one time. Sharing is therefore even. CCN: Lecture Notes Computer Comm. & Networking 31

32 Ring network problem Timing jitter The received signal will contain clocking information (e.g., Manchester encoding) Effects such as delay distortion, noise and receiver imperfections will cause the clock extraction to be less than perfect. The node may received the data correctly but it will retransmit the data with the imperfections. The next node will add more imperfections. Errors may eventually occur due to this additive timing jitter Robustness and installation If the cable is broken, the whole network fails. Adjacent nodes may need to be physically identified during installation. A physical ring must be cabled. CCN: Lecture Notes Computer Comm. & Networking 32

33 Bus vs. Ring For large installations and high capacity, a bus system will be most suited. For moderate capacity and size, the particular application must be examined. Bus is simple, i.e., passive taps. Ring uses point to point communications Data regenerated at each node Therefore grater distances at lower P ε Bus has cascaded amps Can do same distance at greater P ε Ring may use optical fibre Very high data rates Low electromagnetic interference (EMI) CCN: Lecture Notes Computer Comm. & Networking 33

34 Network Standards in Use Today The closed system standards were examined by IEEE who developed a set of standards which were adopted by ISO. The common networking standards are IEEE 802 series. CCN: Lecture Notes Computer Comm. & Networking 34

35 IEEE CSMA/CD (up to 10 Mbps) CCN: Lecture Notes Computer Comm. & Networking 35

36 IEEE CSMA/CD (Fast Ethernet) NRZI NRZ but transition at beginning of bit time indicates a 1 4B5B 8B6T 100BASET4 4 bits are encoded as 5 bit code to ensure transitions at least every 2 bits 8 bits 6 trits, each 8 binary bits are converted into 6 trinary bits (3 levels) Transmits on 3 pairs and receives on 4 (33.3 Mbps data rate) CCN: Lecture Notes Computer Comm. & Networking 36

37 IEEE Token Bus CCN: Lecture Notes Computer Comm. & Networking 37

38 IEEE Token Ring Fibre Distributed Data Interface-FDDI (variation on 802.5) CCN: Lecture Notes Computer Comm. & Networking 38

39 IEEE CSMA/CD Commonly called Ethernet (Thick wire) or Cheapernet (Thin wire). A tap connects the DTE onto the cable. Transceiver is integrated with tap for thick wire. Transceiver is found in DTE for thin wire. A twisted wire drop interface connects to the DTE controller board. A transceiver Sends and receives the baseband signal. Detects collisions Provides electrical isolation Prevents transmission malfunctions (jabber) CCN: Lecture Notes Computer Comm. & Networking 39

40 IEEE CSMA/CD (cont d) Jabber control prevents the transmitter from transmitting onto the cable due to a fault condition. CCN: Lecture Notes Computer Comm. & Networking 40

41 IEEE CSMA/CD (cont d) A CSMA/CD coaxial Ethernet may be accessed via a twisted wire hub (10BASE-T). [Experiment] MAC The hub combines a number of DTE s connected with 10BASE- T (2 twisted wire pairs, IN and OUT) to the coaxial cable. Collisions now occur at the point where the hub connects to the coax. The collision is detected still at the DTE. Adaptive echo cancellation techniques are required to prevent crosstalk problems due to the unshielded twisted pair. CCN: Lecture Notes Computer Comm. & Networking 41

42 Frame format The MAC unit encapsulates the data into a frame. 46~1500 Transmission of frames is as per CSMA/CD Listen prior to transmission Jam after collision detected and back-off CCN: Lecture Notes Computer Comm. & Networking 42

43 IEEE frame (cont d) uses truncated binary exponential backoff A certain number of retries are allowed, called the attempt limit (16) Collisions occur in the collision window which is the period for a frame to reach the farthest part of the network and return. This period (TP) has a safety margin added and becomes the slot time. Slot time = 2 T P + safety margin The backoff time for the nth retry is calculated as R where 0 R 2 k and k = min(n, backoff limit) (backoff limit = 10) CCN: Lecture Notes Computer Comm. & Networking 43

44 IEEE frame (cont d) CCN: Lecture Notes Computer Comm. & Networking 44

45 IEEE Token Ring A token ring network is a LAN technique based on a token passing protocol for media access control It can be a logical ring using a physical ring or a physical star topology CCN: Lecture Notes Computer Comm. & Networking 45

46 IEEE Token Ring Operation has been examined already, two variations exist. Normal token release When a node transmits a frame it waits until the frame comes back around the ring and removes the frame from the ring. It then transmit the token pass it to the next node. Early token release Instead of waiting for the frame to return and be stripped from the ring, the node retransmits the token straight after the frame is transmitted. This allows much greater throughput. Connection to the medium is via a Trunk Coupling Network (TCN) by either direct connection or through a concentrator. CCN: Lecture Notes Computer Comm. & Networking 46

47 IEEE Token Ring (cont d) Connection to the medium is via a Trunk Coupling Network (TCN) by either direct connection or through a concentrator. Concentrator (Repeater) regenerate and propagate a signal. It is used to extend the length of the LAN CCN: Lecture Notes Computer Comm. & Networking 47

48 IEEE Token Ring (cont d) The TCU contains relays to allow the unit to go into bypass mode when the DTE is off. This allows the remaining network to function. CCN: Lecture Notes Computer Comm. & Networking 48

49 IEEE Token Ring (cont d) When the node is connected, it may be in either listen or transmit mode. The former will normally produce a one bit delay through the device. MAC functions Frame encapsulation and de-encapsulation FCS generation Error detection Implementation of MAC algorithm Clock extraction CCN: Lecture Notes Computer Comm. & Networking 49

50 IEEE Token Ring (cont d) Latency of the ring is the time for a token to do one lap of an idle ring. The ring must have a minimum latency of at least the time to transmit the token (24 bits). Otherwise the head of the token will overlap the tail. The monitor node has a buffer to ensure this. The node may very the size of this buffer to increase or decrease bit rates due to errored clock extraction. For 24 bit token, the buffer is set 27 so it may very up and down. CCN: Lecture Notes Computer Comm. & Networking 50

51 IEEE Token Ring Frame formats Token frame At the data link layer, a token frame circulates around the ring when all nodes are idle SD and ED have bit violations (J,K) in Manchester code to make them unique as delimiter. In token, I and E are both 0. AC contains P priority bits describing tokens priority T token identification bit M monitor bit so monitor can detect old frames R reservation bits so node may request a high priority token E set by DTE if it detects an error I indicates first or intermediate frame (1=first/inter, 0=last) CCN: Lecture Notes Computer Comm. & Networking 51

52 IEEE Token Ring Frame formats Data frame If the node possesses the token has data to transmit, it set AC s T=1 and augments the token frame by including FC, DA, SA, INFO,FCS and FS FC contains frame control information. All DTE s perform function as per Z bits. SA Source and DA destination addresses. FCS frame check CRC FS status, DTE acknowledges receipts CCN: Lecture Notes Computer Comm. & Networking 52

53 IEEE Token Ring (priority) Token and frames are assigned 8 levels of priority to speed up important frame transmission (P bits in AC) Pr = received priority Pm = priority of message to be transmitted Rr = received reservation A node wish to transmit must wait for a free token with Pr Pm. While waiting, a node may reserve a future token at level Pm To do this, it sets Rr Pm in a passing data frame if Rr < Pm, or sets Rr Pm in a passing token frame if Rr < Pm and Pm < Pr After transmission, the token is passed on with priority set the max of Rr, Pm and Pr. Reservation is set to the max of Rr, Pm. This forces priority higher and higher. To cure this the node that upgraded the priority must downgrade it when high priority traffic is finished. CCN: Lecture Notes Computer Comm. & Networking 53

54 IEEE Token Bus A token bus network has a logical ring on a physical bus Example A token bus network physically resembles a bus topology; logically, it is a ring. A token is transmitted from lobe to lobe using network addresses and occurs in descending order. The lobe that possesses the token is permitted to transmit data. The lobe order in the figure is CCN: Lecture Notes Computer Comm. & Networking 54

55 IEEE Token Bus Node 44 has the token and want to send data to 70. It places the data frame on the bus, broadcasts to all nodes to hear. Only 70 reads and processes the data. After transmission, 44 pass the token to 32 Data transmission similar to IEEE802.3 (broadcasting) MAC similar to IEEE802.5 (ring) CCN: Lecture Notes Computer Comm. & Networking 55

56 Protocol Performance (CSMA/CD) Utilization of the network U = Throughput/Data Rate Throughput = The actual amount of dada transmitted between 2 nodes in a give period. (< data rate because of collision, no transmission, etc.) Propagation time (Tp): The time it takes for a bit to travel end to end Transmission time (Tix): The time it takes for a station to transmit a frame a = (Propagation time)/(transmission time) A Probability that only 1 of N stations wishes to transmit. U a(1 = N 1 A) / A where A = (1 1 ) N CCN: Lecture Notes Computer Comm. & Networking 56

57 Protocol Performance (Token Ring) U = Tpacket/( Tpacket+ Ttoken) 1 = 1+ a / N For simplification, Tix is normalized to 1. Thus Tp = a. When a < 1 A packet is sent at t0 It receives the leading edge of its own packet at t0 +a Transmission is completed at t0 +1 A token is emitted which then takes a/n to reach the next node. (N is the number of stations) One cycle takes 1+a/N and transmission time is 1, so CCN: Lecture Notes Computer Comm. & Networking 57

58 Protocol Performance (Token Ring) U = a 1 + a / N When a > 1 A packet is sent at t0 Transmission is completed at t0 +1 Receives the leading edge of this packet at t0 +a A token is emitted which takes a/n to reach the next node. (N is the number of stations) One cycle takes a+a/n and transmission time is 1, so CCN: Lecture Notes Computer Comm. & Networking 58

59 Protocol Performance (Comparison) From the equations for throughput, we see they are all dependent on a Throughput declines for both protocols as a increases CCN: Lecture Notes Computer Comm. & Networking 59

60 Protocol Performance (Comparison) a = Tp/Tix An increase in Tp, i.e., separate the nodes further Or a decrease in Tix, i.e., smaller packet will decrease throughput CCN: Lecture Notes Computer Comm. & Networking 60

61 Protocol Performance (Comparison) The throughput expressions are also dependant on N The performance of a token ring improves as N increase as less time is spend passing tokens. The performance of a CSMA/CD decreases as N increase as the likelihood of a collisions CCN: Lecture Notes Computer Comm. & Networking 61

62 Protocol Performance (Comparison) The Asymptotes for each curve for large N are Token ring CSMA/ CD 1 a < 1 lim U = 1 a > 1 a N 1 lim U = N a Examination of a real network is much more complex and requires the use of a simulation system Let us examine the 3 protocols for variations in packet size, active stations and data rate to ascertain the effective data transfer rate. In all cases, the network is being fully occupied by the stated number of stations. CCN: Lecture Notes Computer Comm. & Networking 62

63 Protocol Performance (Comparison) 2000 bits/packet 100 active stations out of 100 station total Ideal is straight line As data rate increases, Tix decreases, thus a increase (a = Tp/Tix) CSMA/CD is very dependent on a Token control is not as dependant on a CCN: Lecture Notes Computer Comm. & Networking 63

64 Protocol Performance (Comparison) 500 bits/packet 100 active stations out of 100 station total As packet size decreases, Tix decreases, thus a increase (a = Tp/Tix) Overall efficiency is reduced when max pocket size is small CSMA/CD is very dependant on a and is virtually useless for small packet sizes when a large number of stations are trying to transmit. Throughput actually decrease when the load gets very high Token ring is not as dependant on a, but has much reduced throughput due to small packets (see equation) CCN: Lecture Notes Computer Comm. & Networking 64

65 Protocol Performance (Comparison) 2000 bits/packet 1 active stations out of 100 station total As the load is reduced CSMA/CD jumps up in efficiency Token bus performs very poorly when load is low For token bus, the time to pass a token becomes much greater than the propagation delay. And when the load is low, many empty tokens are passed Token ring and CSMA/CD perform equally CCN: Lecture Notes Computer Comm. & Networking 65

66 Protocol Performance (Comparison) 500 bits/packet 1 active stations out of 100 station total If the packet size is reduced, CSMA/CD declines Token bus performs even more poorly due to more packets to receive and retransmit. CCN: Lecture Notes Computer Comm. & Networking 66

67 Protocol Performance (Summary) If frames get small, more must be sent and the probability of collision is greater, thus CSMA/CD throughput falls. Small frames also increase the overheads. CSMA/CD is good for low to medium loads Most LAN s operate predominantly with low to medium loads CSMA/CD is not suited to very high bit rates Problems with a If Tix<2Tp, initial station may not detect collision Token ring is good for high load CSMA/CD is easily implemented Token ring is harder to cable and prone to disruption. CCN: Lecture Notes Computer Comm. & Networking 67

68 LAN link layer In LAN s, the link layer is normally subdivided into 2 sub layers Logical Link Control (LLC) sublayer Medium Access Control (MAC) sublayer Any of the LAN protocols (802 series) may be utilised as the MAC protocol. CCN: Lecture Notes Computer Comm. & Networking 68

69 Fiber Distributed Data Interface (FDDI) FDDI employs Ring topology Fiber-optic cabling as its physical medium 100Mbps CCN: Lecture Notes Computer Comm. & Networking 69

70 FDDI--architecture FDDI s counter rotating ring architecture. The primary ring is active in normal operation. The secondary ring provides redundancy. All devices on the ring are dualattachment stations (Class A nodes) or dual-attachment hubs. CCN: Lecture Notes Computer Comm. & Networking 70

71 FDDI self heal FDDI has the ability to self-heal if the ring topology is cut in a single spot. This is called autowrapping. In the event of a fiber cut or an inoperative node, FDDI automatically wrap the ring at the point of failure. interconnecting the primary and secondary rings into a single functional ring. CCN: Lecture Notes Computer Comm. & Networking 71

72 FDDI data In FDDI, the data around the ring is not phase locked. Each station receives the bit stream and extracts the clock to decode the data then transmits the data using its own clock. Clocking information is included in the bit stream with a 4B/5B code and a NRZI line code. CCN: Lecture Notes Computer Comm. & Networking 72

73 FDDI data In FDDI, the frames and tokens are similar to those used in token ring. A 10 bit buffer (latency buffer) is used to store 2 nibbles to identify the start delimiter. The local clock runs at 125 MHz. This gives a bit rate of 100 Mbps (4 bits code into 5 bits) CCN: Lecture Notes Computer Comm. & Networking 73

74 FDDI receiving/transmission CCN: Lecture Notes Computer Comm. & Networking 74

75 FDDI FDDI uses early token release. The latency of an FDDI ring is large as each station has a 10 bit buffer and there could be 1000 stations. Priorities are handled similarly to token bus. The Token Rotation Time (TRT) increases as the ring becomes more heavily loaded. Each station measures the TRT and will only transmit a frame when the TRT becomes lower than the TRT target (TRTT) for that frame. High priority frames have high TRTT s. The system has the ability to send synchronous data, i.e., real time data like digitized speech. These frames have maximum priority. CCN: Lecture Notes Computer Comm. & Networking 75

76 Bridges, Repeaters and Switches--Repeater We often wish to join LAN s together, a repeater will simply relay data from one segment to another. It is simply a dumb physical layer device. CCN: Lecture Notes Computer Comm. & Networking 76

77 Bridges, Repeaters and Switches--Bridge A bridge however normally has up to link layer intelligence. So it receives, check and retransmits the data. Advantages Removes LAN physical restrains, i.e., number of stations may be increased Isolation between LAN s of different MAC protocol. Bridges only look at MAC sub addresses so may isolate LAN s using different high level protocols. Performance monitoring, security and management of the LAN may be improved. Small LAN segments are more reliable and serviceable. CCN: Lecture Notes Computer Comm. & Networking 77

78 Bridges, Repeaters and Switches--Bridge Disadvantages Bridges introduce store and forward delay The MAC layer has no provision for flow control so the bridge may overflow its buffers during heavy traffic. When placed between LAN s of different protocol, the bridge must generate a new FCS. Errors introduced in the bridge will go undetected. Often networks of different types need to be connected. Because of the difficulties involved between differing network types often a layer 3 relay device is used. These are called Routers. Their function is similar to a bridge. CCN: Lecture Notes Computer Comm. & Networking 78

79 Bridges, Repeaters and Switches Switches Switches are now more commonly used for lower level route control and network segmentation. Ethernet switches are a layer 2 device. They are different to bridges in that they can implement multiple switched connections between ports on the switch. Switches may be : Store and forward switches work like a bridge where they store the packet before retransmission. They therefore have high latency. (1 ms or more) Cut through switches divert the packet out the appropriate port as soon as they read the MAC address. Latency for these switches is very low (20µs) Hybrid switches can do both and will change from one method to the other as traffic demands. CCN: Lecture Notes Computer Comm. & Networking 79

80 Switches Transparent routing A routing device such as a bridge is connected to a LAN via a port. Each port contains the required hardware to suit the MAC protocol. CCN: Lecture Notes Computer Comm. & Networking 80

81 Switches Transparent routing All frames received on a port are stored in memory. The frame must then be transmitted on the appropriate port, according to the destination address of the frame, when that port is free. Every bridge must know which port to send a frame out on to access each station. This information is called the forwarding database (FDB) and is usually learnt by the bridge. A bridge will discard a frame if it should transmit it on the port it received it on. CCN: Lecture Notes Computer Comm. & Networking 81

82 Transparent routing Learning The FDB is initially empty. As a frame is received on a port, the bridge stores the source address against the port number. The frame is then transmitted on all ports as the correct port is not known. Eventually the bridge learns the correct port for all stations as it receives a frame from them. A timer is run for each entry in the FDB. If no frames are received from that station on that port then that FDB entry is removed. CCN: Lecture Notes Computer Comm. & Networking 82

83 Transparent routing A spanning tree algorithm is a common transparent routing solution The network dynamically allocates costs to all paths through the network. A bridge is assigned the root bridge to another LAN if it has the lowest cost. For each packet to be sent, the path of lowest cost to the route bridge is chosen This system is transparent to nodes as all routing is done by the bridges CCN: Lecture Notes Computer Comm. & Networking 83

84 Source routing The routing may be done a the source (node). Source routing requires the nodes to contain information about the network (Common in token ring) The frame header is modified to contain routing information and a bit to indicate whether routing information is included. The route designators indicate the path by containing segment and bridge identifier. CCN: Lecture Notes Computer Comm. & Networking 84

85 Source routing Routing table for A: B = Seg 1 C = Seg 1, B1, Seg 2, B2, Seg 3 D = Seg 1, B1, Seg 2, B3, Seg 4 E = Seg 1, B1, Seg 2, B4, Seg 5 CCN: Lecture Notes Computer Comm. & Networking 85

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1 Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber

More information

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations

More information

Ring Local Area Network. Ring LANs

Ring Local Area Network. Ring LANs Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving

More information

Controlled Random Access Methods

Controlled Random Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation

More information

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

More information

Introduction to Ethernet

Introduction to Ethernet Technical Tutorial 2002 12-06 Table of Contents 1: Introduction 2: Ethernet 3: IEEE standards 4: Topology 5: CSMA/CD 6: Wireless-LAN 7: Transmission Speed 8: Limitations of Ethernet 9: Sena Products and

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Data Link Layer. Page 1. Ethernet

Data Link Layer. Page 1. Ethernet Sicherungsebene Network Categories Local Area Networks (LAN): 10m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

More information

Network Topologies. Network Topologies

Network Topologies. Network Topologies Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical

More information

RTT 60.5 msec receiver window size: 32 KB

RTT 60.5 msec receiver window size: 32 KB Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)

More information

Fiber Distributed Data Interface

Fiber Distributed Data Interface CHPTER 8 Chapter Goals Provide background information about FDDI technology. Explain how FDDI works. Describe the differences between FDDI and Copper Distributed Data Interface (CDDI). Describe how CDDI

More information

Level 2 Routing: LAN Bridges and Switches

Level 2 Routing: LAN Bridges and Switches Level 2 Routing: LAN Bridges and Switches Norman Matloff University of California at Davis c 2001, N. Matloff September 6, 2001 1 Overview In a large LAN with consistently heavy traffic, it may make sense

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Wired & Wireless LAN Connections

Wired & Wireless LAN Connections Lecture 5 Wired & Wireless LAN Connections Network Interface Card (NIC) Ethernet Wiring - Thick Ethernet - Thin Ethernet - Star (Hub) Ethernet Extending LAN - Fiber Modem - Repeater - Bridge - Switch Short

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access Sicherungsebene Network Categories Local Area Networks (LAN): 0m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

More information

How To Encode Data From A Signal To A Signal (Wired) To A Bitcode (Wired Or Coaxial)

How To Encode Data From A Signal To A Signal (Wired) To A Bitcode (Wired Or Coaxial) Physical Layer Part 2 Data Encoding Techniques Networks: Data Encoding 1 Analog and Digital Transmissions Figure 2-23.The use of both analog and digital transmissions for a computer to computer call. Conversion

More information

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1 Fast Ethernet and Gigabit Ethernet Networks: Fast Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Introduction To Computer Networks

Introduction To Computer Networks Introduction To Computer Networks 1. LAN s and WAN s 2. Some network and internetwork components 3. The communication process 4. Communication media 5. Topologies 6. Communication models and Standards

More information

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer Data Link Layer Physical

More information

Network Design. Yiannos Mylonas

Network Design. Yiannos Mylonas Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which

More information

Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

Cabling LANs and WANs

Cabling LANs and WANs Cabling LANs and WANs CCNA 1 v3 Module 5 10/11/2005 NESCOT CATC 1 Cabling the LAN Each media has advantages and disadvantages: Cable length Cost Ease of installation Susceptibility to interference The

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

Network Categories. Network Types for the Local Range. Ethernet

Network Categories. Network Types for the Local Range. Ethernet Sicherungsebene Network Categories Chapter 2: Computer Networks 2.1: Physical Layer: representation of digital signals 2.2: Data Link Layer: error protection and access control 2.3: Network infrastructure

More information

Computer Network and Communication

Computer Network and Communication 2 Computer Network and Communication 2.1 INTRODUCTION As we all know, the advances in Information technology revolutionized almost every aspect of our life. Education, industry, banking, researches and

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone

More information

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and NETWORK By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Network A network is a group of devices (Nodes) connected by media

More information

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking. Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:

More information

EECC694 - Shaaban. Transmission Channel

EECC694 - Shaaban. Transmission Channel The Physical Layer: Data Transmission Basics Encode data as energy at the data (information) source and transmit the encoded energy using transmitter hardware: Possible Energy Forms: Electrical, light,

More information

Data Communication and Computer Network

Data Communication and Computer Network 1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

INTRODUCTION TO 100BASE-T: FAST (AND FASTER) ETHERNET

INTRODUCTION TO 100BASE-T: FAST (AND FASTER) ETHERNET 51-20-97 DATA COMMUNICATIONS MANAGEMENT INTRODUCTION TO 100BASE-T: FAST (AND FASTER) ETHERNET Colin Mick INSIDE How It Works: An Iso View, 100BASE-TX, 100BASE-T4, 100BASE-T2, Gigabit Ethernet, Impacts

More information

Wireless LAN Concepts

Wireless LAN Concepts Wireless LAN Concepts Wireless LAN technology is becoming increasingly popular for a wide variety of applications. After evaluating the technology, most users are convinced of its reliability, satisfied

More information

LAN / WAN Technologies

LAN / WAN Technologies The Hong Kong Polytechnic University Industrial Centre Knowledge Update Course for Secondary Computer Teachers LAN / WAN Technologies By Edward Cheung email: icec@polyu.edu.hk 15 July, 2003. 030715 LAN

More information

EPL 657 Wireless Networks

EPL 657 Wireless Networks EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing

More information

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK

CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK CN1047 INTRODUCTION TO COMPUTER NETWORKING CHAPTER 1 BASIC CONCEPTS OF NETWORK DEFINTION & APPLICATIONS DEFINTION: A computer network is defined as the interconnection of two or more computers. It is done

More information

Tutorial. www.ccontrols.com

Tutorial. www.ccontrols.com Tutorial 1 Tutorial CONTROLLER AREA NETWORK CAN was designed by Bosch and is currently described by ISO 11898 1. In terms of the Open Systems Interconnection model (OSI), CAN partially defines the services

More information

Chapter 7 Low-Speed Wireless Local Area Networks

Chapter 7 Low-Speed Wireless Local Area Networks Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics

More information

11/22/2013 1. komwut@siit

11/22/2013 1. komwut@siit 11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)

More information

Local-Area Network -LAN

Local-Area Network -LAN Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there

More information

Introduction to Optical Networks

Introduction to Optical Networks Yatindra Nath Singh Assistant Professor Electrical Engineering Department Indian Institute of Technology, Kanpur Email: ynsingh@ieee.org http://home.iitk.ac.in/~ynsingh 1 What are optical network? Telecomm

More information

NETWORKING TECHNOLOGIES

NETWORKING TECHNOLOGIES NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

Ethernet, VLAN, Ethernet Carrier Grade

Ethernet, VLAN, Ethernet Carrier Grade Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP

More information

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Chapter 9A. Network Definition. The Uses of a Network. Network Basics Chapter 9A Network Basics 1 Network Definition Set of technologies that connects computers Allows communication and collaboration between users 2 The Uses of a Network Simultaneous access to data Data

More information

Gigabit Ethernet: Architectural Design and Issues

Gigabit Ethernet: Architectural Design and Issues Gigabit Ethernet: Architectural Design and Issues Professor of Computer and Information Sciences Columbus, OH 43210 http://www.cis.ohio-state.edu/~jain/ 9-1 Overview Distance-Bandwidth Principle 10 Mbps

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals What You Will Learn About Computers Are Your Future Chapter 8 Networks: Communicating and Sharing Resources Basic networking concepts Advantages and disadvantages of networks Peer-to-peer and client/server

More information

Chapter 4 Connecting to the Internet through an ISP

Chapter 4 Connecting to the Internet through an ISP Chapter 4 Connecting to the Internet through an ISP 1. According to Cisco what two things are essential to gaining access to the internet? a. ISPs are essential to gaining access to the Internet. b. No

More information

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data. Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs

More information

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area Networks) 10/28/2008 Vasile Dadarlat - Computer Networks 1 MAN (Metropolitan

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

IT4504 - Data Communication and Networks (Optional)

IT4504 - Data Communication and Networks (Optional) - Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication

More information

Data Transmission. Data Communications Model. CSE 3461 / 5461: Computer Networking & Internet Technologies. Presentation B

Data Transmission. Data Communications Model. CSE 3461 / 5461: Computer Networking & Internet Technologies. Presentation B CSE 3461 / 5461: Computer Networking & Internet Technologies Data Transmission Presentation B Kannan Srinivasan 08/30/2012 Data Communications Model Figure 1.2 Studying Assignment: 3.1-3.4, 4.1 Presentation

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Analog vs. Digital Transmission

Analog vs. Digital Transmission Analog vs. Digital Transmission Compare at two levels: 1. Data continuous (audio) vs. discrete (text) 2. Signaling continuously varying electromagnetic wave vs. sequence of voltage pulses. Also Transmission

More information

Networks. The two main network types are: Peer networks

Networks. The two main network types are: Peer networks Networks Networking is all about sharing information and resources. Computers connected to a network can avail of many facilities not available to standalone computers: Share a printer or a plotter among

More information

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6) reas for Discussion Direct Link Networks Joseph Spring School of Computer Science Sc - Computer Network Protocols & rch s ased on Chapter 2, Peterson & Davie, Computer Networks: Systems pproach, 5 th Ed

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

RFC 2544 Testing of Ethernet Services in Telecom Networks

RFC 2544 Testing of Ethernet Services in Telecom Networks RFC 2544 Testing of Ethernet Services in Telecom Networks White Paper Nigel Burgess Agilent Technologies Introduction The object of this paper is to discuss the use and testing of Ethernet services in

More information

Local Area Network. OSI Seven Layer Model. Whole Building Network

Local Area Network. OSI Seven Layer Model. Whole Building Network (MECH3023) 2 Local Area Network Networking for BAS Centralized & Decentralized networks LAN topologies LAN standards & examples Transmission hardware OSI Seven Layer Model Importance of interoperability

More information

Random Access Protocols

Random Access Protocols Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori

More information

Lesson 2-3: Ethernet Basics

Lesson 2-3: Ethernet Basics Unit 2: LAN Configurations Lesson 2-3: Ethernet Basics At a Glance Ethernet LAN topology is currently the most common network architecture. Ethernet topologies are generally bus and/or bus-star topologies.

More information

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate? Lecture 4 Continuation of transmission basics Chapter 3, pages 75-96 Dave Novak School of Business University of Vermont Objectives Line coding Modulation AM, FM, Phase Shift Multiplexing FDM, TDM, WDM

More information

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com

COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES Gene Robinson E.A.Robinsson Consulting 972 529-6395 ROB1200@aol.com 9 March 1999 IEEE802 N-WEST STANDARDS MEETING FOR BROADBAND WIRELESS ACCESS SYSTEMS

More information

Computers Are Your Future. 2006 Prentice-Hall, Inc.

Computers Are Your Future. 2006 Prentice-Hall, Inc. Computers Are Your Future 2006 Prentice-Hall, Inc. Computers Are Your Future Chapter 3 Wired and Wireless Communication 2006 Prentice-Hall, Inc Slide 2 What You Will Learn... ü The definition of bandwidth

More information

Real-Time (Paradigms) (51)

Real-Time (Paradigms) (51) Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major

More information

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005. Lecturer: Kartik Krishnan Lecture 1-3 SFWR 4C03: Computer Networks & Computer Security Jan 3-7, 2005 Lecturer: Kartik Krishnan Lecture 1-3 Communications and Computer Networks The fundamental purpose of a communication network is the exchange

More information

Written examination in Computer Networks

Written examination in Computer Networks Written examination in Computer Networks February 14th 2014 Last name: First name: Student number: Provide on all sheets (including the cover sheet) your last name, rst name and student number. Use the

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

How To Communicate With A Token Ring Network (Dihon)

How To Communicate With A Token Ring Network (Dihon) Token us Token -procedure: Only someone who possesses a certain ken (= bit sequence), may send. One example for a ken network: IEEE 80. Token us All stations should be treated equally, i.e. they have pass

More information

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012

Protocolo IEEE 802.15.4. Sergio Scaglia SASE 2012 - Agosto 2012 Protocolo IEEE 802.15.4 SASE 2012 - Agosto 2012 IEEE 802.15.4 standard Agenda Physical Layer for Wireless Overview MAC Layer for Wireless - Overview IEEE 802.15.4 Protocol Overview Hardware implementation

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0

Certified Telecommunications & Network Professional (CTNP) Syllabus. Version 1.0 (CTNP) Syllabus Copyright This is intellectual property of ACTA S.A. and it is protected by Greek and European legislation concerning copyright. The creation of a copy of part, or of the whole, without

More information

Candidates should attempt FOUR questions. All questions carry 25 marks.

Candidates should attempt FOUR questions. All questions carry 25 marks. UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE

More information

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

CSMA/CA. Information Networks p. 1

CSMA/CA. Information Networks p. 1 Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not

More information

Local Area Networks (LANs) Blueprint (May 2012 Release)

Local Area Networks (LANs) Blueprint (May 2012 Release) Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the

More information

Computer Networks: LANs, WANs The Internet

Computer Networks: LANs, WANs The Internet 1 Computer Networks: LANs, WANs The Internet Required reading: Garcia 1.1 and 1.2 CSE 3213, Fall 2010 Instructor: N. Vlajic History of Computers 2 Computer a machine that manipulates data according to

More information

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0 CCNA 1: Networking Basics Cisco Networking Academy Program Version 3.0 Table of Contents CCNA 1: NETWORKING BASICS...1 TARGET AUDIENCE...3 PREREQUISITES...3 COURSE DESCRIPTION...3 COURSE OBJECTIVES...3

More information

Introduction to Computer Networks and Data Communications

Introduction to Computer Networks and Data Communications Introduction to Computer Networks and Data Communications Chapter 11 Learning Objectives Define the basic terminology of computer networks Recognize the individual components of the big picture of computer

More information

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)

CS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs) CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,

More information

CS423: Lectures 2-4, Physical Layer. George Varghese. April 16, 2008

CS423: Lectures 2-4, Physical Layer. George Varghese. April 16, 2008 CS423: Lectures 2-4, Physical Layer George Varghese April 16, 2008 What does the Physical Layer Do? bits SENDER PHYSICAL LAYER RECEIVER 1 RECEIVER 1 RECEIVER 1 A possibly faulty, single-hop, bit pipe that

More information