Chapter 5: Protocol Architecture Rivier College CS575: Advanced LANs Chapter 5

advertisement
1
7/19/2016 14:35
Rivier College
CS575: Advanced LANs
Chapter 5: Protocol Architecture
Chapter 5
Protocol Architecture
1
2
7/19/2016 14:35
IEEE 802 Protocol Layers Compared to OSI Model
Chapter 5
Protocol Architecture
2
3
7/19/2016 14:35
Scope of LAN Protocols
Chapter 5
Protocol Architecture
3
4
7/19/2016 14:35
Logical Link Control (LLC) Scenario
Chapter 5
Protocol Architecture
4
5
7/19/2016 14:35
User Data and LAN/MAN Protocol Control Information
Chapter 5
Protocol Architecture
5
6
7/19/2016 14:35
Generic MAC Frame Format
Chapter 5
Protocol Architecture
6
7
7/19/2016 14:35
LAN Protocols in Context
Chapter 5
Protocol Architecture
7
8
7/19/2016 14:35
Bridges
0 For interconnection of LANs that use identical protocols at the
MAC layer (IEEE 802.3, FDDI)
0 Few reasons for using the bridges:
- Reliability (the network can be partitioned into self-contained
units)
- Improve performance
- Improve security of communications by allowing different
types of traffic (e.g., accounting, personnel, strategic planning)
and different types of users with different levels of security
- Establish controlled and monitored mechanisms of
communication
- Geography
Chapter 5
Protocol Architecture
8
9
7/19/2016 14:35
Bridge Operation
Chapter 5
Protocol Architecture
9
10
7/19/2016 14:35
Protocol Architecture for Bridge
Chapter 5
Protocol Architecture
10
11
7/19/2016 14:35
Routers
0 Router connects dissimilar networks and operates at layer 3 of the
OSI model
0 Differences among networks include the following:
- Addressing schemes (e.g., IEEE 802 LAN uses either 16-bit or
48-bit binary addresses for each attached device; an X.25 public
frame-switching network uses 12-digit decimal addresses
[encoded as 4-bit per digit for a 48-bit address])
- Maximum frame sizes (e.g., Ethernet imposes 1500-byte frame;
X.25 – 1000-byte frame)
- Interfaces (the concept of a router is independent of interfaces)
- Reliability
Chapter 5
Protocol Architecture
11
12
7/19/2016 14:35
Protocol Architecture for Router
Chapter 5
Protocol Architecture
12
13
7/19/2016 14:35
Networking Devices
Chapter 5
Protocol Architecture
13
14
7/19/2016 14:35
IEEE 802 Protocol Layers Compared to OSI Model
Chapter 5
Protocol Architecture
14
15
7/19/2016 14:35
Organization of IEEE 802
0
0
0
0
0
0
0
0
0
0
0
0
0
0
0
802.1 High Layer LAN Protocols Working Group
802.2 Logical Link Control (LLC) Working Group
802.3 Ethernet Working Group: CSMA/CD (Ethernet)
802.4 Token Bus Working Group
802.5 Token Ring Working Group
802.6 Metropolitan Area Network Working Group
802.7 Broadband Technical Advisory Group (TAG)
802.8 Fiber Optic Technical Advisory Group (TAG)
802.9 Isochronous LAN Working Group
802.10 Security Working Group
802.11 Wireless LAN Working Group
802.12 Demand Priority Working Group (100VG-AnyLAN)
802.14 Cable Modem Working Group
802.15 Wireless Personal Area Networks Working Group
802.16 Broadband Wireless Access Study Group
Chapter 5
Protocol Architecture
15
16
7/19/2016 14:35
Effectiveness of the Cycle Redundancy Check (CRC)
* Error-detection technique requires an Error-Detecting Code (e.g., CRC)
Chapter 5
Protocol Architecture
16
Download