Introduction to Local Area Networks

Similar documents
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Based on Computer Networking, 4 th Edition by Kurose and Ross

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Introduction to Ethernet

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

RTT 60.5 msec receiver window size: 32 KB

- Hubs vs. Switches vs. Routers -

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

LAN Switching and VLANs

Local-Area Network -LAN

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

11/22/

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Howstuffworks "How LAN Switches Work" Click here to go back to the normal view!

Wide Area Networks. Learning Objectives. LAN and WAN. School of Business Eastern Illinois University. (Week 11, Thursday 3/22/2007)

Data Communication and Computer Network

Performance Analysis of Switches in High Speed LAN

DATA COMMUNICATION AND NETWORKS

Chapter 8: Computer Networking. AIMS The aim of this chapter is to give a brief introduction to computer networking.

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Overview of Routing between Virtual LANs

LAN / WAN Technologies

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Communication Systems Internetworking (Bridges & Co)

Introduction To Computer Networks

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Level 2 Routing: LAN Bridges and Switches

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

Ethernet, VLAN, Ethernet Carrier Grade

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Wireless Links - Wireless communication relies on radio signals or infrared signals for transmitting data.

NETWORKING TECHNOLOGIES


Controlled Random Access Methods

UPPER LAYER SWITCHING

Computer Networks. By Hardeep Singh

Mathatma Gandhi University

Computer Networks Vs. Distributed Systems

Network Design. Yiannos Mylonas

CSCI 362 Computer and Network Security

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

WIRELESS ETHERNET (IEEE )

Local Area Network. OSI Seven Layer Model. Whole Building Network

Computer Networking: A Survey

Gigabit Ethernet: Architectural Design and Issues

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Computer Networking Networks

Random Access Protocols

Final Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.

CORPORATE NETWORKING

CSMA/CA. Information Networks p. 1

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

Objectives. The Role of Redundancy in a Switched Network. Layer 2 Loops. Broadcast Storms. More problems with Layer 2 loops

Transport Layer Protocols

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Agenda. Distributed System Structures. Why Distributed Systems? Motivation

Written examination in Computer Networks

Wireless LAN Concepts

ICS 153 Introduction to Computer Networks. Inst: Chris Davison

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

Chapter 1 Reading Organizer

Module 15: Network Structures

Network Topologies. Network Topologies

Future Stars. Grade X Manual Chapter 1 Networking and Telecommunication. telecommunication. Telephones, telegrams, radios and televisions help

Computer Networks: LANs, WANs The Internet

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 2 An Introduction to Networking

Tutorial.

Computer Networking Type A: Very Short Answer Questions

Data Link Layer. Page 1. Ethernet

CCNA 1: Networking Basics. Cisco Networking Academy Program Version 3.0

Selecting a Web Server Connection Rate Gilbert Held

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

Fiber Distributed Data Interface

Lesson 2-3: Ethernet Basics

Chapter 14: Distributed Operating Systems

Wired & Wireless LAN Connections

Networks. The two main network types are: Peer networks

SSVP SIP School VoIP Professional Certification

Final for ECE374 05/06/13 Solution!!

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

Real-Time (Paradigms) (51)

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Computer Networks CS321

Transcription:

For Summer Training on Computer Networking visit Introduction to Local Area Networks Prepared by : Swapan Purkait Director Nettech Private Limited swapan@nettech.in + 91 93315 90003

Introduction A local area network interconnects a variety of data communicating devices within a small geographic area broadcasts data at high data transfer rates very low error rates. Local area networks first appeared in 1970s, its use has now become widespread in both commercial and academic environments.

Primary Function of a LAN Information Exchange File serving - A large storage disk drive acts as a central storage repository. Print serving - Providing the authorization to access a particular printer, accept and queue print jobs, provide a user access to the print queue to perform administrative duties. Remote Execution

Local Area Networks Technology for connecting multiple computers across short distances ( within a building - up to a few KM) Inexpensive Highly reliable Easy to install and manage

Example Local Area Networks

Basic Network Topologies Local area networks are interconnected using one of four basic configurations: 1. Bus 2. Tree 3. Star 4. Wireless

Bus Topology

Interconnections in a LAN

Network Interface Card (NIC) Each computer is connected to the network through a special Network Interface Card (NIC) LAN transfers data independently of types of computers attached to it. The interface board shields the LAN from the characteristics of each device (e.g., speed).

Bidirectional Propagation of Signals

Tree Topology

Star Topology

Wireless Topology Not really a specific topology A workstation in a wireless LAN can be anywhere as long as it is within transmitting distance to an access point. Several versions of IEEE 802.11 standard define the various forms of wireless LAN connections.

Medium Access Control Sublayer To better support local area networks, the data link layer of the OSI model was broken into two sublayers: 1. Logical link control sublayer 2. Medium access control sublayer Medium access control sublayer defines the frame layout more closely tied to a specific medium at the physical layer. When people refer to LANs They often refer to its MAC sublayer name, such as 10BaseT.

Medium Access Control Protocols How does a workstation get its data onto the LAN medium? A medium access control (MAC) protocol is the software that allows workstations to take turns at transmitting data. Two basic categories: 1. Contention-based protocols 2. Round robin protocols

Contention-Based Protocols -CSMA/CD Most common example is carrier sense multiple access with collision detection (CSMA/CD). If no one is transmitting, a workstation can transmit. If someone else is transmitting, the workstation backs off and waits.

Two Packets Experiencing Collision

Contention-Based Protocols CSMA/CD cont If two workstations transmit at the same time, a collision occurs. When the two workstations hear the collision, they stop transmitting immediately. Each workstation backs off a random amount of time and tries again. Hopefully, both workstations do not try again at the exact same time. CSMA/CD is an example of a nondeterministic protocol.

Round Robin Protocol Each workstation takes a turn transmitting the turn is passed around the network from workstation to workstation. Most common example is token ring LAN a software token is passed from workstation to workstation. Token ring is an example of a deterministic protocol. Token ring more complex than CSMA/CD. What happens if token is lost? Duplicated? Hogged? Token ring LANs are losing the battle with CSMA/CD LANs.

Wired Ethernet Originally, CSMA/CD was 10 Mbps Then 100 Mbps was introduced. Most NICs sold today are 10/100 Mbps Then 1000 Mbps (1 Gbps) was introduced 10 Gbps is now being installed in highend applications

Small Company/ Engg. College

Small Office Home Office (SOHO)

Ethernet Most popular CSMA/CD protocol. What if a computer transmits a very long message? It keeps the line busy for very long time, while all other computers in the LAN must wait for the long message to end All messages must be small, to allow other computers to access the line For Ethernet, the maximum size of the payload is 1,500 bytes

Ethernet (cont d) What is expected performance? When only one computer needs to transmit: it can immediately access the line. When many computers want access (high traffic): Average waiting time is high. There is high probability of collision. For every collision, Xmission must start agan Conclusion: expected delay depends on the traffic on the LAN!

Ethernet Frame Structure Sending adapter encapsulates IP datagram (or other network layer protocol packet) in Ethernet frame Preamble: 7 bytes with pattern 10101010 followed by one byte with pattern 10101011 used to synchronize receiver, sender clock rates

Ethernet Frame Structure (more) Addresses: 6 bytes, frame is received by all adapters on a LAN and dropped if address does not match Type: indicates the higher layer protocol, mostly IP but others may be supported such as Novell IPX and AppleTalk) CRC: checked at receiver, if error is detected, the frame is simply dropped

Ethernet: uses CSMA/CD A: sense channel, if idle then { transmit and monitor the channel; If detect another transmission } then { abort and send jam signal; update # collisions; delay as required by exponential backoff algorithm; goto A } else {done with the frame; set collisions to zero} else {wait until ongoing transmission is over and goto A}

Ethernet s CSMA/CD Cont... Exponential Backoff: Goal: adapt retransmission attemtps to estimated current load heavy load: random wait will be longer first collision: choose K from {0,1}; delay is K x 512 bit transmission times after second collision: choose K from {0,1,2,3} after ten or more collisions, choose K from {0,1,2,3,4,,1023}

Ethernet Technologies: 10Base2 10: 10Mbps; 2: under 200 meters max cable length thin coaxial cable in a bus topology repeaters used to connect up to multiple segments repeater repeats bits it hears on one interface to its other interfaces: physical layer device only!

10BaseT and 100BaseT 10/100 Mbps rate; latter called fast ethernet T stands for Twisted Pair Hub to which nodes are connected by twisted pair, thus star topology

10BaseT and 100BaseT (more) Max distance from node to Hub is 100 meters Hub can disconnect jabbering adapter Hub can gather monitoring information, statistics for display to LAN administrators

Gbit Ethernet Uses standard Ethernet frame format Allows point-to-point links and shared broadcast channels CSMA/CD is used Uses hubs, Called here Buffered Distributors Full-Duplex at 1 Gbps for point-to-point links

Switched Ethernet Point-to-point connections to multi-port hub acting like switch; no collisions. More efficient under high traffic load: break large shared Ethernet into smaller segments. Hub Switch

Ethernet name cable max. nodes adv. segm. 10Base5 thick 500m 100 for backbones coax 10Base2 thin coax 200m 30 cheapest 10Base-T TP 100m 1024 easy maintenance 10Base-F fiber 2000m 1024 between buildings

Interconnecting LANs Q: Why not just one big LAN? Limited amount of supportable traffic: on single LAN, all stations must share bandwidth Limited length: 802.3 specifies maximum cable length Large collision domain (can collide with many stations) Limited number of stations: 802.5 have token passing delays at each station

Hubs Physical Layer devices: essentially repeaters operating at bit levels: repeat received bits on one interface to all other interfaces Hubs can be arranged in a hierarchy (or multi-tier design), with backbone hub at its top

Hubs Cont... Each connected LAN referred to as LAN segment Hubs do not isolate collision domains: node may collide with any node residing at any segment in LAN Hub Advantages: simple, inexpensive device Multi-tier provides graceful degradation: portions of the LAN continue to operate if one hub malfunctions extends maximum distance between node pairs (100m per Hub)

Hub Limitations Single collision domain results in no increase in max throughput multi-tier throughput same as single segment throughput Individual LAN restrictions pose limits on number of nodes in same collision domain and on total allowed geographical coverage Cannot connect different Ethernet types (e.g., 10BaseT and 100baseT)

Bridges Link Layer devices: operate on Ethernet frames, examine frame header and selectively forwarding frame based on its destination Bridge isolates collision domains since it buffers frames When frame is to be forwarded on segment, bridge uses CSMA/CD to access segment and transmit

Bridges Cont... Bridge advantages: Isolates collision domains resulting in higher total max throughput, and does not limit the number of nodes nor geographical coverage Can connect different type Ethernet since it is a store and forward device Transparent: no need for any change to hosts LAN adapters

Bridges: frame filtering, forwarding Bridges filter packets same-lan -segment frames not forwarded onto other LAN segments Forwarding: how to know which LAN segment on which to forward frame? looks like a routing problem (more shortly!)

Backbone Bridge

Interconnection Without Backbone Not recommended for two reasons: - single point of failure at Computer Science hub - all traffic between EE and SE must path over CS segment

Bridge Filtering bridges learn which hosts can be reached through which interfaces: maintain filtering tables when frame received, bridge learns location of sender: incoming LAN segment records sender location in filtering table filtering table entry: (Node LAN Address, Bridge Interface, Time Stamp) stale entries in Filtering Table dropped (TTL can be 60 minutes)

Bridge Filtering filtering procedure: if destination is on LAN on which frame was received then drop the frame else { lookup filtering table } if entry found for destination then forward the frame on interface indicated; else flood; /* forward on all but the interface on which the frame arrived*/

Bridge Learning: example Suppose C sends frame to D and D replies back with frame to C C sends frame, bridge has no info about D, so floods to both LANs bridge notes that C is on port 1 frame ignored on upper LAN frame received by D

Bridge Learning: example D generates reply to C, sends bridge sees frame from D bridge notes that D is on interface 2 bridge knows C on interface 1, so selectively forwards frame out via interface 1

Bridges Spanning Tree for increased reliability, desirable to have redundant, alternate paths from source to destination with multiple simultaneous paths, cycles result - bridges may multiply and forward frame forever solution: organize bridges in a spanning tree by disabling subset of interfaces Disabled

Switches A switch is a combination of a hub and a bridge. It can interconnect two or more workstations, but like a bridge, it observes traffic flow and learns. When a frame arrives at a switch, the switch examines the destination address and forwards the frame out the one necessary connection. Workstations that connect to a hub are on a shared segment. Workstations that connect to a switch are on a switched segment.

Switches A switch that employs cut-through architecture is passing on the frame before the entire frame has arrived at the switch. Multiple workstations connected to a switch use dedicated segments. This is a very efficient way to isolate heavy users from the network. A switch can allow simultaneous access to multiple servers, or multiple simultaneous connections to a single server.

Workstation Connected to a Shared Segment

Workstation Connected to a Dedicated Segment

Routers The device that connects a LAN to a WAN or a WAN to a WAN. A router accepts an outgoing packet, removes any LAN headers and trailers, encapsulates the necessary WAN headers and trailers. Because a router has to make wide area network routing decisions, the router has to dig down into the network layer of the packet to retrieve the network destination address.

Routers Routers are often called layer 3 devices. OSI network layer. Routers often incorporate firewall functions. An example of a router s operation is shown on the next slide.

Router Operation

Bridges vs. Routers Both store-and-forward devices routers: network layer devices (examine network layer headers) bridges are Link Layer devices Routers maintain routing tables, implement routing algorithms Bridges maintain filtering tables, implement filtering, learning and spanning tree algorithms

Routers vs. Bridges Bridges + and - + Bridge operation is simpler requiring less processing bandwidth - Topologies are restricted with bridges: a spanning tree must be built to avoid cycles - Bridges do not offer protection from broadcast storms (endless broadcasting by a host will be forwarded by a bridge)

Routers + and - Routers vs. Bridges + arbitrary topologies can be supported, cycling is limited by TTL counters (and good routing protocols) + provide firewall protection against broadcast storms - require IP address configuration (not plug and play) - require higher processing bandwidth bridges do well in small (few hundred hosts) while routers used in large networks (thousands of hosts)

Summary LAN Topologies Ethernet addresses MAC layer issues CSMA/CD Types of Ethernet Hubs, Bridges, Routers, Switches

Connect with us at Facebook Visit www.facebook.com/nettech.in 62