Uploaded by diresnegash

chapter-8-lan-technologies-and-network-topology

advertisement
Chapter 8 LAN Technologies
and Network Topology








Direct Point-to-Point Communication
Local Area Networks (LANs)
LAN Topologies
Ethernet
Token Ring
FDDI
LocalTalk
Wireless LAN
Direct Point-to-Point
Communication
 used in early computer communications systems
 Advantages
- Each point-to-point connection can use different network
hardware, frame format, and bandwidth (fig 8.1)
- Each point-to-point connection has exclusive access
- Easy to enforce security and privacy
 Disadvantages
- fully meshed network becomes exponentially expensive
as number of nodes increases (fig 8.2)
- number of direct connections required = (N2 - N) / 2
Local Area Networks (LANs)



based on sharing the same communications medium.
emerged in 1980’s in local communications as
alternative to expensive, dedicated point-to-point
connections
shared networks confined to local communication
because
–
–
–
more time would be spent coordinating the of sharing of
network and less time spent actually transmitting data if two
nodes are separated farther apart
Cost of providing high bandwidth is more expensive over long
distance than over short distance
Locality of reference: computers usually communicate to
another nearby computer.
LAN Topologies

Star network
– all computers attached to a central point such as a hub (fig 8.3)
– Fault tolerant advantage

Ring network
– computers are logically arranged in circular loop (fig 8.4)
– Physical orientation may be different ( offices on various floors
using token ring).
– One bad cable may disable the entire ring.
– Token ring may be logical ring but physical star.

Bus network
– usually consist of a single shared long cable to which
computers attach (fig 8.5)
– One bad cable may cripple the entire bus.
– Ethernet network can be logical bus but physical star.
Ethernet Network

Manchester Encoding (fig 8.6)
 Originally a bus network (ANIM06_1.MOV)
in which multiple computers share a single
transmission medium.
 While one computer transmits a frame, all
other computers must wait (fig 8.7)
 Uses CSMA (carrier sense multiple access
with collision detect) (ANIM06_2.MOV)
 Uses binary exponential backup in
recovering from collision. Delay time is
doubled after each successive collision.
Wireless LAN

Uses antennas to broadcast RF signals through air
 Carrier Sense Multiple Access with Collision
Avoidance CSMA/CA (fig 8.8)
 IEEE 802.11b
–
–
–
–

Up to 11 Mbps
frequency hopping spread spectrum (FHSP)
direct sequence spread spectrum (DSSS)
radio frequencies in range of 2.4 GHz - 2.483 GHz
IEEE 802.11a
– Up to 50 Mbps
– radio frequencies in range of 5 GHz
LocalTalk Network

bus network designed by Apple.
 Uses modified CSMA/CA (a short message
is sent to reserve the medium before
transmitting a large message)
 Limited to 230 kbps
 Easy to install: daisy-chain computers (fig
10.9)
Token Ring Network





token passing ring network (fig 8.9)
IBM’s token ring operate at 16Mbps
token is a special bit pattern or message different
from normal data frames (bit stuffing of data may
be used)
only one token circulates the ring at any time. To
send data, computer waits for token to arrive,
transmit one frame, and then pass token to next
node (ANIM06_3.MOV)
guarantees fair access because nodes take turns.
FDDI Network

Fiber Distributed Data Interconnect (FDDI)
 token ring technology operating at 100
Mbps using fiber.
 Uses counter rotating ring for fault
tolerance (fig 8.10)
 Self healing
– Ring is still up if there is one break in the ring
Download