Enterprise network • • • • • • • • • 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE802.3 8.4:Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast LAN interconnect technologies 8.1:Introduction • PSTN • ISDN • PBX (private branch exchange) 8.2:LANs • LANs are used to interconnect distributed communities of end systems • To ensure the transmission bandwidth is shared fairly between all of the attached stations, a number of different medium access control (MAC) methods are used. These include (CSMA/CD) and Token ring 8.3:Ethernet / IEEE802.3 • Ethernet networks – and the more recent derivative IEEE802.3 – are used extensively in technical and office environment • CSMA/CD – All the stations are attached directly to the same cable/bus ,it is said to operate in a multiple access mode – The bus operates in the broadcast mode which means that every frames transmitted is received by all the other stations that are attached to the bus – Because of the broadcast mode ,this will result in the contents of the two frames being corrupted and a collision is said to have occurred CSMA/CD Protocol • Carrier Sense before transmission • Carrier Sense while transmission • Collision: Two or more stations transmitting simultaneously • Backoff: Random delay after collision • Deference: Defers transmission if channel is sensed busy • Collision Window (Slot time): Round-trip propagation delay time plus some carrier sense time. In IEEE 802.3, this value is defined to be 51.2 us. CSMA/CD Collision Handling • Collision Signal is generated by Physical layer. • Jam signal (collision enforcement): To make sure that all stations involved in the collision will detect collision. A pattern of 32 bits. • Collision backoff and retransmission method (Truncated Binary Exponential Backoff Algorithm, BEBA): – n : number of collisions experienced (n <= 16) – k : Min (n,10) -- Truncation – r : Random delay time (unit: slot time) between 0 <= r < 2k CSMA/CD worse-case collision detection Hub configuration principles IEEE 802.3 Frame Format 8.4:Token ring • All the stations are connected together by a set of unidirectional links in the form of a ring and all frame transmissions between any of the stations take place over it by circulating the frame around the ring • Only one frame transfer can be in progress over the ring at a time • Fig 8.5 Token ring network operation Token ring wiring configuration Token ring Frame Format 8.5:Bridges • There are two types of bridges , the one are used with Ethernet LANs, knows as transparent bridges , and the others with token ring LANs, known as source routing bridges. Bridge vs Repeater 8.5.1:Transparent bridges • With a transparent bridge, as with a repeater,the presence of one (or more) bridges in a route between two communicating stations is transparent to the two stations . All routing decisions are made exclusively by the bridge(s) • Fig 8.12 • A bridge maintains a forwarding database • Bridge learning – Forwarding database to be created in advanced Transparent bridges(cont.) 8.5.2:Source routing bridges • The major difference between a LAN base on source routing bridges and one base on spanning tree bridges is that with the latter the bridges collectively perform the routing operation in a way that is transparent to the end stations. Conversely, with source routing , the end stations perform the routing function. • Fig 8.15 Token ring Frame Format Example 8.6:FDDI • FDDI is an optical fiber-based ring network that supports a bit rate of 100 Mbps . It can used for the interconnection of segments spread over a wider geographical area than a single building, such as a university campus or manufacturing plant. • Fig 8.18 • Use two counter-rotating rings to enhance reliability:primary ring and secondary ring • Two type of station: DAS and SAS • Fig 8.19 Physical interface FDDI Frame Format 8.7:High-speed LANs • 8.7.1:Fast Ethernet • 8.7.2:Switched Fast Ethernet • 8.7.3:Gigabit Ethernet 8.7.1:Fast Ethernet • Fast Ethernet was to use the same shared, halfduplex transmission mode as Ethernet but to obtain a*10 increase in operational bit rate over 10BaseT while at the same time retaining the same wiring systems , MAC method , and frame format. • The major technological hurdle to overcome with Fast Ethernet was how to achieve a bit rate of 100Mbps over 100m of UTP cable. • Fig 8.26 Collision detection • Fig 8.28 • Detect a collision by detecting a signal on pair 2 while it is transmitting and , the hub detects a collision by the presence of a signal on pair 1 8.7.2:Switched Fast Ethernet • In order to allow multiple access/transfers to be in progress concurrently, two developments have been made: – Switch hub architecture – Duplex working over the circuits that connect the stations to the hub. • Fig 8.29 8.8:LAN protocol 8.8.1:Physical layer 8.8.2:MAC sublayer 8.8.3:LLC sublayer 8.8.4:Network layer • IPX – connectionless • TCP/IP 8.9:Multicast LAN interconnect technologies • • • • 8.9.1:Intersite gateways 8.9.2:ISDN switched connection 8.9.3:Frame relay 8.9.4:High bit rate leased lines 8.9.1:Intersite gateways 8.9.2:ISDN switched connection 8.9.3:Frame relay 8.9.4:High bit rate leased lines Summary