Chapter 6. Local Area Networks Business Data Communications and Networking Fitzgerald and Dennis, 7th Edition Copyright © 2002 John Wiley & Sons, Inc. 1 Copyright John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc. Adopters of the textbook are granted permission to make back-up copies for their own use only, to make copies for distribution to students of the course the textbook is used in, and to modify this material to best suit their instructional needs. Under no circumstances can copies be made for resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein. 2 Chapter 6. Learning Objectives • Be aware of the roles of LANs in organizations • Understand the major components of LANs • Understand traditional Ethernet LANs • Understand switched Ethernet LANs • Understand wireless Ethernet LANs • Be aware of other wireless LAN technologies • Be familiar with how to improve LAN performance 3 Chapter 6. Outline • Introduction – Why use a LAN? Dedicated servers vs. Peer-to-peer LANs • LAN Components – NICs, Cables, Hubs and Network Operating Systems • Traditional Ethernet (IEEE 802.3) – Topology, Media Access Control, Ethernet Types • Switched Ethernet – Topology, Media Access Control, Performance Benefits • Wireless LANs (IEEE 802.11) – Topology, Media Access Control, Wireless Ethernet Types • Other Wireless Technologies – Infrared Wireless, Bluetooth • Improving LAN Performance – Improving Server Performance, Improving Circuit Capacity, Reducing Network Demand 4 Introduction 5 Why use a LAN? • There are two main benefits to using a local area network: information sharing and resource sharing. • Examples of information sharing include file sharing, exchanging e-mail, and using the Internet. • Examples of resource sharing include sharing hardware and software, such as sharing an expensive printer. • Another important resource sharing technique is to purchase software on a per seat basis. For example, only purchasing a 10-seat license for a software program on a 20 client network instead of purchasing 20 copies of the same program. 6 Dedicated Server Networks • A basic LAN dichotomy exists between dedicated server LANs and peer-to-peer LANs which don’t have servers. Since 90% of all LANs have a dedicated server, this chapter mostly focuses on server-based LANs. • A dedicated server is a computer that is permanently assigned a specific server task such as being a Web server, e-mail server, file server or printer server. • Servers also run a special operating system called a server network operating system. • When many servers are part of a network, it can be referred to as a server farm. 7 Peer-to-Peer Networks • Peer-to-peer networks do not use dedicated servers. • Any computer on a peer-to-peer network can act as both a client, accessing resources or information on other computers on the network, or as a server, allowing access to attached information or resources. • Peer-to-peer networks tend to be small networks. • The main advantage of peer-to-peer networking is lower cost since there is no dedicated server, generally the most expensive network component. • The main disadvantage is that peer-to-peer networks are generally slower than dedicated server networks, since each computer is less powerful and may be in use as a client and a server at the same time. 8 LAN Components 9 Basic LAN Components (Figure 6-1) • The six basic LAN components are: 1. Clients 2. Servers 3. Network Interface Cards 4. Network Cables 5. Hubs and Switches 6. Network Operating System • The first two were discussed in chapter 2, the rest will be discussed in this chapter. 10 Figure 6-1. Basic LAN Components 11 Network Interface Cards • Network interface cards, also called network cards and network adapters include a cable socket allowing computers to be connected to the network. • NICs are part of both the physical and data link layer and include a unique data link layer address (sometimes called a MAC address), placed in them by their manufacturer. • Before sending data onto the network, the network card also organizes data into frames and then sends them out on the network. • Notebook computers often use NICs that are plugged into the PCMCIA port. 12 Network Cables • Each computer is physically connected to the network using a cable. • These cables are either untwisted wire pairs (UTP, the most common choice), shielded twisted pair (STP), coaxial cable, or optical fiber. • Wireless LANs use radio frequencies or infrared light instead of cables. • Sometimes two different types of cabling can be linked using a special connector. A BALUN (Balanced-Unbalanced) is one such device that connects UTP and Coaxial Cable. 13 Hubs • Hubs act as junction boxes, linking cables from several computers on a network. Hubs are usually sold with 4, 8, 16 or 24 ports. • Some hubs allow connection of more than one kind of cabling, such as UTP and coax. • Hubs also repeat (reconstruct and strengthen) incoming signals. This is important since all signals become weaker with distance. • The maximum LAN segment distance for a cable can therefore be extended using hubs. 14 Figure 6-2. Network Hub 15 Network Operating Systems • The NOS is the software that runs the LAN. It comes in two types: Server NOSs & Client NOSs. • Server NOSs enable server to execute and respond to the requests sent to them as web server, print servers, file servers, etc. • Client NOS functions are typically included in most OS packages such as Windows 98 and Windows 2000. 16 Network Profiles • The network profile specifies what resources on each server are available to the network for use by other computers, including data files, printers, etc. • Devices that are not included in the network profile can not be used over the network. • User profiles describe what each user on a LAN has access to. • Most LANs also use auditing software which keeps track of which user has accessed what network resource. 17 Traditional Ethernet (IEEE 802.3) 18 Ethernet (IEEE 802.3) • Almost all LANs today use Ethernet • Originally, Ethernet was jointly developed by a consortium of Digital Equipment Corp., Intel and Xerox and was standardized as IEEE 802.3. • Ethernet LANs that use hubs are sometimes called shared Ethernet. 19 Shared Ethernet Topology (Figure 6-3) • Ethernet’s logical topology is a bus topology. • This means all computers on the network receive messages from all other computers, whether the message is intended for those computers or not. • When a frame is received by a computer, the first task is to read the frame’s destination address to see if the message is meant for it or not. • Although, a decade ago most Ethernet LANs used a physical bus, almost all Ethernets today use a physical star topology, with the network’s computers linked into hubs. • It is also common to link use multiple hubs to form more complex physical topologies (Figure 6-4). 20 Figure 6-3 Ethernet Topology 21 Figure 6-4 Multiple Hub Ethernet Design 22 Media Access Control • Ethernet’s medium access control protocol, called CSMA/CD, is contention-based • With a contention-based protocol, frames can be sent by two computers on the same network at the same time, in which case they will collide and become garbled. • CSMA/CD, can thus be termed “ordered chaos” because it tolerates, rather than avoids, collisions caused by two computers transmitting at the same time. 23 CSMA/CD • Stands for: Carrier Sense Multiple Access w/ Collision Detect • Carrier Sense: computers listen to the network to see if another computer is transmitting before sending anything themselves. • Multiple Access: all computers have access to the network medium. • Collision Detect: if they detect a collision (CD), they then wait a random amount of time and resend the frame (It has to be random in order to avoid another collision). 24 Ethernet Physical Media Standards • Ethernet Media are formatted as follows: [Value1]Base/Broad[Value2] • Value 1: Data Rate for Medium 10 = 10Mbps • Base or Broad – Base = Baseband Mode meaning only one (digital) channel – Broad = Broadband (analog) cable transmissions use more than one channel (e.g., cable TV) • Value2: (relates to maximum distance possible in hundreds of meters or cable type T= twisted pair, F =fiber) 25 Types of Ethernet (Figure 6-5) • Seven types of shared Ethernet have been in use: • 10Base5 = thick Ethernet, uses thick coax. This is the original Ethernet specification. Now uncommon. • 10Base2 = thin Ethernet, uses thin coax. Became popular in the early 1990s as a cheaper alternative to 10Base5. Now uncommon. • 10BaseT = twisted pair Ethernet, most common type of Ethernet. Uses Cat 3 and Cat 5 UTP. Common but rapidly losing ground to 100BaseT. • 100BaseT = also called Fast Ethernet, has replaced 10BaseT in sales volume. Uses Cat 5 UTP (Sometimes combined 10/100 Ethernet is found in which some segments run 10BaseT and some run 100BaseT is also used by some organizations). • 1000BaseT = Gigabit Ethernet. Maximum cable length is only 100 meters. • 10GbE = 10 Gbps Ethernet. Uses fiber and is typically full duplex. • 40GbE = 40 Gbps Ethernet. Uses fiber and is typically full duplex. 26 Name Maximum Data Rate Cables 10Base5 10 Mbps Coaxial 10Base2 10 Mbps Coaxial 10BaseT 10 Mbps UTP cat 3, UTP cat 5 100BaseT 100 Mbps UTP cat 5, fiber 1000BaseX 1 Gbps UTP cat 5, UTP cat 5e, UTP cat 6, fiber 10 GbE 10 Gbps UTP cat 5e, UTP cat 6, UTP cat 7, fiber 40 GbE 40 Gbps fiber Figure 6-5 Types of Ethernet 27 Switched Ethernet 28 Switched Ethernet Topology • Switched Ethernet uses switches instead of hubs. • While a hub broadcasts frames to all ports, the switch reads the destination address of the frame and only sends it to the corresponding port. • The effect is to turn the network into a group of point-to-point circuits and to change the logical topology of the network from a bus to a star. 29 Basic Switch Operation • Switches make forwarding decisions based on forwarding tables (similar to routing tables). • When a frame is received, the switch reads its [data link layer] destination address and sends the frame out the corresponding port in its forwarding table. • Switches making switching decisions based on data link layer addresses are called layer-2 switches. • When a switch is first turned on, its forwarding table is empty. It then learns which ports correspond to which computers by reading the source addresses of the incoming frames along with the port number that the frame arrived on. • If the switch’s forwarding table does not have the destination address of the frame, it broadcasts the frame to all ports. • Thus, a switch starts by working like a hub and then works more and more as a switch as it fills its forwarding table. 30 Media Access Control • Switched Ethernet still uses CSMA/CD media access control, but collisions are less likely as each network segment operates independently. • The network’s modified topology also allows multiple messages to be sent at one time. • For example, computer A can send a message to computer B at the same time that computer C sends one to computer D. • If two computers send frames to the same destination at the same time, the switch stores the second frame in memory until it has finished sending the first, then forwards the second. 31 Figure 6-6 802.3 Ethernet versus switched Ethernet 32 Performance Benefits • Switched Ethernet can dramatically improve network performance. • Shared Ethernet 10BaseT networks are only capable of using about 50% of capacity before collisions are a problem • Switched Ethernet, however, runs at up to 95% capacity on 10BaseT. • Another performance improvement can be made by using a 10/100 switch that uses a 100BaseT connection for the server(s) and/or routers, i.e., the network segments experiencing the highest volume of LAN traffic. 33 Wireless Ethernet (IEEE 802.11) 34 Wireless Ethernet (IEEE 802.11) • Wireless LANs dispense with cables and use radio or infrared frequencies to transmit signals through the air. • WLANs are growing in popularity because they eliminate cabling and facilitate network access from a variety of locations and for mobile workers (as in a hospital). • The most common wireless networking standard is IEEE 802.11, often called Wireless Ethernet or Wireless LAN. 35 Wireless LAN Topology • WLAN topologies are the same as on Ethernet: physical star, logical bus (Figure 6-7). • Wireless LAN devices use the same radio frequencies, so they must take turns using the network. • Instead of hubs, WLANs use devices called access points (AP). Maximum transmission range is about 100-500 feet. Usually a set of APs are installed making wireless access possible in several areas in a building or corporate campus. • Each WLAN computer uses an NIC that transmits radio signals to the AP. • Because of the ease of access, security is a potential problem, so IEEE 802.11 uses 40-bit data encryption to prevent eavesdropping. 36 Figure 6-7 A wireless Ethernet access point connected into an Ethernet Switch. 37 WLAN Media Access Control • Wireless LANs use CSMA/CA where CA = collision avoidance (CA). With CA, a station waits until another station is finished transmitting plus an additional random period of time before sending anything. • Two different WLAN MAC techniques are now in use: the Physical Carrier Sense Method and the Virtual Carrier Sense Method. 38 Physical Carrier Sense Method • In the physical carrier sense method, a node that wants to send first listens to make sure that the transmitting node has finished, then waits a period of time longer. • Each frame is sent using the Stop and Wait ARQ, so by waiting, the listening node can detect that the sending node has finished and can then begin sending its transmission. • With Wireless LANs, ACK/NAK signals are sent a short time after a frame is received, while stations wishing to send a frame wait a somewhat longer time, ensuring that no collision will occur. 39 Virtual Carrier Sense Method • When a computer on a Wireless LAN is near the transmission limits of the AP at one end and another computer is near the transmission limits at the other end of the AP’s range, both computers may be able to transmit to the AP, but can not detect each other’s signals. • This is known as the hidden node problem. When it occurs, the physical carrier sense method will not work. • The virtual carrier sense method solves this problem by having a transmitting station first send a request to send (RTS) signal to the AP. If the AP responds with a clear to send (CTS) signal, the computer wishing to send a frame can then begin transmitting. 40 Types of Wireless Ethernet • Two forms of the IEEE 802.11b standard currently exist: • Direct Sequence Spread Spectrum (DSSS) uses the entire frequency band to transmit information. DSSS is capable of data rates of up to 11 Mbps with fallback rates of 5.5, 2 and 1 Mbps. Lower rates are used when interference or congestion occurs. • Frequency Hopping Spread Spectrum (FHSS) divides the frequency band into a series of channels and then changes its frequency channel about every half a second, using a pseudorandom sequence. FHSS is more secure, but is only capable of data rates of 1 or 2 Mbps. • IEEE 802.11a is another Wireless LAN standard that is still being defined. It will operate in the 5 GHz band and be capable of data rates of up to 54 Mbps, but will probably average about 20 Mbps in practice. 41 Other Wireless Technologies 42 Infrared Wireless LANs • Infrared WLANs are less flexible than IEEE 802.11 WLANs because, as with TV remote controls that are also infrared based, they require line of sight to work. • Infrared Hubs and NICs are usually mounted in fixed positions to ensure they will hit their targets. • The main advantage of infrared WLANs is reduced wiring. • A new version, called diffuse infrared, operates without a direct line of sight by bouncing the infrared signal off of walls, but is only able to operate within a single room and at distances of only about 50-75 feet. 43 Fig. 6-9 Infrared Wireless LAN 44 Bluetooth • Bluetooth is a 1 Mbps wireless standard developed for piconets, small personal or home networks. • It may soon be standardized as IEEE 802.15. • Although Bluetooth uses the same 2.4 GHz band as Wireless LANs it is not compatible with the IEEE 802.11 standard and so can not be used in locations that use the Wireless LANs. • Bluetooth’s controlled MAC technique uses a master device that polls up to 8 “slave” devices. • Examples of Bluetooth applications include; linking a wireless mouse, a telephone headset, or a Palm handheld computer to a home network. 45 Improving LAN Performance 46 Improving LAN Performance • As networks become more and more intensively used, LAN performance becomes a critical issue. • The measure of LAN Performance is throughput, i.e., the total amount of user data transmitted in a given period of time. • LAN performance can be improved by identifying and eliminating bottlenecks, that is, points in the network where congestion is occurring because the network or device can’t handle all of the demand it is experiencing. 47 Identifying Network Bottlenecks • Two common network bottlenecks are related to server access: • If server performance is poor when server utilization is high (>60%), then the bottleneck is the server. • If server performance is poor during periods of low server utilization (<40%), then the bottleneck is not the server but the network circuit. 48 Improving Server Performance • Two types of server performance improvements are possible: – Software improvements such as choosing a faster Network Operating System, fine tuning network and NOS parameters for optimal performance. – Hardware improvements such as adding a second server, upgrading the server’s CPU, increasing its memory space, adding more hard drives or adding a second NIC to the server. 49 Improving Server Performance: RAID • Improving disk drive performance is especially important, since disk reads are the slowest task the server needs to do. • Replacing one large drive with many small ones can improve server performance. • RAID or Redundant Array of Inexpensive Disks, builds on this idea. RAID system can be used to both improve performance and increase reliability by building redundancy into the hard drives, so that a hard drive failure does not result in any loss of data. 50 Improving Circuit Capacity • Improving circuit capacity can be done simply by upgrading one or all segments of a network to a faster protocol (which also means upgrading the NICs), such as; – Upgrading the network from 10BaseT to 100BaseT, or – Upgrading the network segment to the server from 10BaseT to 100BaseT • Another approach to improving circuit capacity is by increasing the number of network segments to the server. Most servers can handle several network segments simply by adding additional NIC cards, thereby increasing access to the server (see Figure 6-11). 51 Fig. 6-11b Network Segmentation: a. Before b. After 52 Reducing Network Demand • Performance can also be improved by reducing network demand. This can be done by: – Moving more files, such as heavily used software packages to client computers. – Disk caching, software on client machines can also reduce server demand. – Moving user demands from peak times to off peak times, by telling network users when peak usage times occur and encouraging users to not use the network as heavily during these times can also help improve performance. – Delaying some network intensive jobs to off-peak times, such as running heavy printing jobs at night, can also improve performance. 53 Figure 6-10 Improving LAN performance • Increase Server Performance – Software: Fine-tune the NOS settings – Hardware: • Add more servers and spread the network applications across the servers to balance the load • Upgrade to a faster computer • Increase the server's memory • Increase the number and speed of the server's hard disk(s) • Upgrade to a faster NIC • Increase Circuit Capacity – Upgrade to a faster circuit – Segment the network • Reduce Network Demand – Move files from the server to the client computers – Increase the use of disk caching on client computers – Change user behavior 54 End of Chapter 6 55