1 7/19/2016 14:35 Rivier College CS575: Advanced LANs Chapter 5: Protocol Architecture Chapter 5 Protocol Architecture 1 2 7/19/2016 14:35 IEEE 802 Protocol Layers Compared to OSI Model Chapter 5 Protocol Architecture 2 3 7/19/2016 14:35 Scope of LAN Protocols Chapter 5 Protocol Architecture 3 4 7/19/2016 14:35 Logical Link Control (LLC) Scenario Chapter 5 Protocol Architecture 4 5 7/19/2016 14:35 User Data and LAN/MAN Protocol Control Information Chapter 5 Protocol Architecture 5 6 7/19/2016 14:35 Generic MAC Frame Format Chapter 5 Protocol Architecture 6 7 7/19/2016 14:35 LAN Protocols in Context Chapter 5 Protocol Architecture 7 8 7/19/2016 14:35 Bridges 0 For interconnection of LANs that use identical protocols at the MAC layer (IEEE 802.3, FDDI) 0 Few reasons for using the bridges: - Reliability (the network can be partitioned into self-contained units) - Improve performance - Improve security of communications by allowing different types of traffic (e.g., accounting, personnel, strategic planning) and different types of users with different levels of security - Establish controlled and monitored mechanisms of communication - Geography Chapter 5 Protocol Architecture 8 9 7/19/2016 14:35 Bridge Operation Chapter 5 Protocol Architecture 9 10 7/19/2016 14:35 Protocol Architecture for Bridge Chapter 5 Protocol Architecture 10 11 7/19/2016 14:35 Routers 0 Router connects dissimilar networks and operates at layer 3 of the OSI model 0 Differences among networks include the following: - Addressing schemes (e.g., IEEE 802 LAN uses either 16-bit or 48-bit binary addresses for each attached device; an X.25 public frame-switching network uses 12-digit decimal addresses [encoded as 4-bit per digit for a 48-bit address]) - Maximum frame sizes (e.g., Ethernet imposes 1500-byte frame; X.25 – 1000-byte frame) - Interfaces (the concept of a router is independent of interfaces) - Reliability Chapter 5 Protocol Architecture 11 12 7/19/2016 14:35 Protocol Architecture for Router Chapter 5 Protocol Architecture 12 13 7/19/2016 14:35 Networking Devices Chapter 5 Protocol Architecture 13 14 7/19/2016 14:35 IEEE 802 Protocol Layers Compared to OSI Model Chapter 5 Protocol Architecture 14 15 7/19/2016 14:35 Organization of IEEE 802 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 802.1 High Layer LAN Protocols Working Group 802.2 Logical Link Control (LLC) Working Group 802.3 Ethernet Working Group: CSMA/CD (Ethernet) 802.4 Token Bus Working Group 802.5 Token Ring Working Group 802.6 Metropolitan Area Network Working Group 802.7 Broadband Technical Advisory Group (TAG) 802.8 Fiber Optic Technical Advisory Group (TAG) 802.9 Isochronous LAN Working Group 802.10 Security Working Group 802.11 Wireless LAN Working Group 802.12 Demand Priority Working Group (100VG-AnyLAN) 802.14 Cable Modem Working Group 802.15 Wireless Personal Area Networks Working Group 802.16 Broadband Wireless Access Study Group Chapter 5 Protocol Architecture 15 16 7/19/2016 14:35 Effectiveness of the Cycle Redundancy Check (CRC) * Error-detection technique requires an Error-Detecting Code (e.g., CRC) Chapter 5 Protocol Architecture 16