LAN TECHNOLOGIES

advertisement
CEN-444
Networks Structure And Protocols
LAN TECHNOLOGIES
Mohammed Saleem Bhat
m.bhat@mu.edu.sa
Computer Engineering and Networks, College of Engineering , Majmaah University
Technology Options-Ethernet
Ethernet
Fast Ethernet
Gigabit Ethernet
10 Gig Ethernet
WLAN
Computer Engineering and Networks, College of Engineering , Majmaah University
Media Access
Ethernet and Wi-Fi are both “multi-access” technologies
Broadcast medium, shared by many hosts
Simultaneous transmissions will result in collisions
Media Access Control (MAC) protocol required
Rules on how to share medium
The Data Link Layer is divided into two Part MAC Media
Access Control) Sublayer and LLC (Logic Link Control)
Sublayer
Computer Engineering and Networks, College of Engineering , Majmaah University
802.3 Ethernet
Carrier-sense multiple access with collision detection
(CSMA/CD).
CS = carrier sense
MA = multiple access
CD = collision detection
Base Ethernet standard is 10 Mbps.
100Mbps, 1Gbps, 10Gbps standards came later
Computer Engineering and Networks, College of Engineering , Majmaah University
Ethernet CSMA/CD
CSMA/CD (carrier sense multiple access with collision
detection) media access protocol is used.
Data is transmitted in the form of packets.
Sense channel prior to actual packet transmission.
Transmit packet only if channel is sensed idle; else, defer
the transmission until channel becomes idle.
After packet transmission is started, the node monitors its
own transmission to see if the packet has experienced a
collision.
If the packet is observed to be undergoing a collision, the
transmission is aborted and the packet is retransmitted
after a random interval of time using Binary Exponential
Backoff algorithm.
Computer Engineering and Networks, College of Engineering , Majmaah University
Ethernet Address
End nodes are identified by their Ethernet Addresses
(MAC Address or Hardware Address) which is a unique 6
Byte address.
MAC Address is represented in Hexa Decimal format e.g
00:05:5D:FE:10:0A
The first 3 bytes identify a vendor (also called prefix) and
the last 3 bytes are unique for every host or device
Computer Engineering and Networks, College of Engineering , Majmaah University
LAN Technologies
Ethernet Frame Structure
Preamble:
7 bytes with pattern 10101010 followed by one byte with
pattern 10101011
Used to synchronize receiver, sender clock rates
Addresses: 6 bytes, frame is received by all adapters on a
LAN and dropped if address does not match
Length: 2 bytes, length of Data field
CRC: 4 bytes generated using CR-32, checked at receiver, if
error is detected, the frame is simply dropped
Data Payload: Maximum 1500 bytes, minimum 46 bytes
If data is less than 46 bytes, pad with zeros to 46 bytes
Computer Engineering and Networks, College
Length of Engineering , Majmaah University
LAN Technologies
Ethernet
10 Base 5 (Thicknet) (Bus Topology)
10 Base 2 (Thinnet) (Bus Topology)
10 Base T (UTP) (Star/Tree Topology)
10 Base FL (Fiber) (Star/Tree Topology)
Computer Engineering and Networks, College of Engineering , Majmaah University
LAN Technologies
802.11 Wireless LAN
Network
connectivity
to the
legacy
wired LAN
Desktop
with PCI 802.11 LAN card
Access Point
Laptop
with PCMCIA 802.11 LAN card
Provides network connectivity over wireless media
An Access Point (AP) is installed to act as Bridge between
Wireless and Wired Network
The AP is connected to wired network and is equipped
with antennae to provide wireless connectivity
Computer Engineering and Networks, College of Engineering , Majmaah University
LAN Technologies
802.11 Wireless LAN
Range ( Distance between Access Point and WLAN client)
depends on structural hindrances and RF gain of the
antenna at the Access Point
To service larger areas, multiple APs may be installed with
a 20-30% overlap
A client is always associated with one AP and when the
client moves closer to another AP, it associates with the
new AP (Hand-Off)
Three flavors:
802.11b
802.11a
Computer
Engineering and Networks,
802.11g
College of Engineering , Majmaah University
LAN Technologies
Multiple Access with Collision
Avoidance (MACA)
other node in
sender’s range
sender
RTS
receiver
other node in
receiver’s range
CTS
data
ACK
Before every data transmission
Sender sends a Request to Send (RTS) frame containing
the length of the transmission
Receiver respond with a Clear to Send (CTS) frame
Sender sends data
Receiver sends an ACK; now another sender can send data
When sender doesn’t get a CTS back, it assumes collision
Computer Engineering and Networks, College of Engineering , Majmaah University
LAN Technologies
WLAN : 802.11b
The most popular
deployment.
802.11
standard
currently
in
Supports 1, 2, 5.5 and 11 Mbps data rates in the 2.4 GHz
ISM (Industrial-Scientific-Medical) band
Computer Engineering and Networks, College of Engineering , Majmaah University
LAN Technologies
WLAN : 802.11a
Operates in the 5 GHz UNII (Unlicensed National
Information Infrastructure) band
Incompatible with devices operating in 2.4GHz
Supports Data rates up to 54 Mbps.
Computer Engineering and Networks, College of Engineering , Majmaah University
LAN Technologies
WLAN : 802.11g
Supports data rates as high as 54 Mbps on the 2.4 GHz
band
Provides backward compatibility with 802.11b equipment
Computer Engineering and Networks, College of Engineering , Majmaah University
Repeater, HUB, Bridge & Switch
REPEATER, HUB, BRIDGE AND
SWITCH
Computer Engineering and Networks, College of Engineering , Majmaah University
Repeater, Hub, Bridge & Switch
Repeater
A repeater receives a signal, regenerates it, and passes it
on.
It can regenerate and retime network signals at the bit
level to allow them to travel a longer distance on the
media.
It operates at Physical Layer of OSI
The Four Repeater Rule for 10-Mbps Ethernet should be
used as a standard when extending LAN segments.
This rule states that no more than four repeaters can be
used between hosts on a LAN.
This rule is used to limit latency added to frame travel by
each repeater.
Computer Engineering and Networks, College of Engineering , Majmaah University
Repeater, Hub, Bridge & Switch
Hub
Hubs are used to connect
multiple nodes to a single
physical device, which connects
to the network.
Hubs are actually multiport
repeaters.
Using a hub changes the network
topology from a linear bus, to a
star.
With hubs, data arriving over
the cables to a hub port is
electrically repeated on all the
other ports connected to the
same network segment, except
for the port on which the data
Computer
Engineering and Networks, College of Engineering , Majmaah University
was sent.
Repeater, Hub, Bridge & Switch
Bridge
Bridges are used to logically separate
network segments within the same network.
They operate at the OSI data link layer
(Layer 2) and are independent of higherlayer protocols.
The function of the bridge is to make
intelligent decisions about whether or not to
pass signals on to the next segment of a
network.
When a bridge receives a frame on the
network, the destination MAC address is
looked up in the bridge table to determine
whether to filter, flood, or copy the frame
onto another segment
Broadcast Packets are forwarded
Computer Engineering and Networks, College of Engineering , Majmaah University
Repeater, Hub, Bridge & Switch
Switch
Switches are Multiport Bridges.
Switches provide a unique network segment on each port,
thereby separating collision domains.
Today, network designers are replacing hubs in their wiring
closets with switches to increase their network performance
and bandwidth while protecting their existing wiring
investments.
Like bridges, switches learn certain information about the
data packets that are received from various computers on the
network.
Switches use this information to build forwarding tables to
determine the destination of data being sent by one computer
to another computer on the network.
Computer Engineering and Networks, College of Engineering , Majmaah University
Repeater, Hub, Bridge & Switch
Switches: Dedicated Access
Hosts have direct connection to
switch
Full Duplex: No collisions
Switching: A-to-A’ and B-to-B’
simultaneously, no collisions
A
C’
B
switch
Switches can be cascaded to
expand the network
C
B’
A’
Computer Engineering and Networks, College of Engineering , Majmaah University
Download