Chapter 1

advertisement
Network+ Guide to Networks, Fourth Edition
Chapter 6
Topologies and Access Methods
At a Glance






Objectives
Teaching Tips
Quick Quizzes
Class Discussion Topics
Additional Projects
Additional Resources
6-1
Network+ Guide to Networks, Fourth Edition
6-2
Lecture Notes
Chapter Objectives





Describe the basic and hybrid LAN physical topologies, and their uses, advantages and disadvantages
Describe the backbone structure that form the foundation for most LANs
Compare the different types of switching used in data transmission
Understand the transmission methods underlying Ethernet, Token Ring, FDDI, and ATM networks
Describe the characteristics of different wireless network technologies, including Bluetooth and the
three IEEE 802.11 standards
Simple Physical Topologies
Define physical topology. Stress that physical topology does not specify device types, connectivity
methods, or addressing schemes for the network.
Present a brief overview of the basic physical topologies. Mention that hybrid topologies may be created.
Teaching
Tip
Make sure that students understand that they must thoroughly understand physical topologies for
the Network+ exam.
Teaching
Tip
Physical topologies and logical topologies are two different networking concepts. Students
should be aware that, when used alone, the word topology often refers to a network’s physical
topology.
Bus
Present an overview of the bus topology, using Figure 6-1 to illustrate.
Describe the characteristics of the bus topology. Stress that devices share the responsibility for getting data
from one point to another.
Discuss the concept of terminators and signal bounce. Illustrate with Figure 6-1.
Discuss the advantages and disadvantages of using a bus topology. Stress that a defect in the bus affects the
entire network.
Ring
Describe the ring topology, using Figure 6-2 to illustrate. Explain the manner in which packets are
transmitted in this topology. Define active topology.
Discuss the advantages and disadvantages of the ring topology. Stress that this topology is not very flexible
or scalable.
Network+ Guide to Networks, Fourth Edition
Star
Describe the basic structure of a star network, using Figure 6-3 to illustrate.
Discuss the advantages and disadvantages of using the star topology. Mention that more cabling is required,
but that a cabling defect will affect two nodes at most. Stress that this type of network is scalable.
Hybrid Physical Topologies
Describe the reasons for creating hybrid networks. Explain that simple topologies are generally too
restrictive, but can be used in more complex configurations.
Star-Wired Ring
Describe the Star-Wired Ring topology, using Figure 6-4 to illustrate. Mention the advantages of using this
type of topology, including fault tolerance and reliability.
Mention that Token Ring networks use this topology.
Star-Wired Bus
Describe the Star-Wired Bus topology, using Figure 6-5 to illustrate. Discuss the advantages and
disadvantages of this topology.
Mention that Ethernet and Fast Ethernet networks use this topology.
Backbone Networks
Discuss the concept of a backbone network. Mention that they are typically capable of higher throughputs,
and that they generally carry a great deal of network traffic.
Define enterprise. Stress that the backbone is the most significant building block of an enterprise-wide
network.
Serial Backbone
Describe the serial backbone configuration, using Figure 6-6 to illustrate. Define daisy chain and discuss
how daisy chaining is used in a serial backbone.
Discuss the advantages and disadvantages of the serial backbone configuration. Mention the limitations in
the extent that hubs can be connected on a serial backbone.
Distributed Backbone
Describe the distributed backbone configuration, using Figures 6-7 and 6-8 to illustrate. Explain the
advantages of using this type of backbone configuration.
6-3
Network+ Guide to Networks, Fourth Edition
6-4
Discuss how this type of backbone can be used to connect multiple LAN segments. Use Figure 6-8 to
illustrate.
Mention that a distributed backbone configuration allows workgroups to be segregated on a network.
Mention that the distribute backbone configuration may contain daisy-chained hubs and, in such cases, this
configuration will experience some of the same limitations as serial backbones.
Collapsed Backbone
Present an overview of the collapsed backbone configuration. Use Figure 6-9 to illustrate.
Contrast the collapsed backbone in Figure 6-9 to the distributed backbone in Figure 6-8.
Discuss the advantages and disadvantages of using a collapsed backbone. Stress that this arrangement
allows you to interconnect different types of subnetworks.
Parallel Backbone
Discuss the parallel backbone configuration, using Figure 6-10 to illustrate. Mention that this is the most
robust backbone configuration.
Explain the situations in which a network administrator might choose to use a parallel backbone, and
discuss the advantages of selectively implementing the parallel structure.
Teaching
Tip
LANs contain four distinct functional areas: station connectivity, server connectivity, WAN
connectivity, and backbone. Each may be best served by a different basic or complex topology.
Logical Topologies
Define logical topology. Mention that a network’s logical and physical topologies will not necessarily
match.
Provide an overview of the bus logical topology. Explain the physical topologies that it is usually
associated with.
Provide an overview of the ring logical topology. Explain the physical topologies that it is usually
associated with.
Mention that Ethernet networks use the bus logical topology, while Token Ring networks use the ring
logical topology.
Discuss how understanding logical topologies can be useful when designing or troubleshooting a network.
Switching
Define switching. Explain that it is a component of a network’s logical topology.
Network+ Guide to Networks, Fourth Edition
Circuit Switching
Present an overview of circuit switching. Stress that this type of switching monopolizes a piece of
bandwidth.
Discuss the advantages and disadvantages of circuit switching. Mention the applications and technologies
that use circuit switching.
Message Switching
Present a brief overview of message switching. Explain the store and forward routine used to transfer data.
Mention the similarities to and differences from circuit switching.
Packet Switching
Provide an overview of packet switching. Stress that this is the most commonly used method for connecting
nodes on a network.
Explain the advantages of using packet switching. Explain why packets can travel any path on a network
and stress the benefits of this ability.
Briefly explain how packets are reassembled when they reach their destination. Point out situations where
packet switching is not optimal. Stress that packet switching efficiently uses bandwidth.
Ethernet
Review the history and typical uses of Ethernet. Explain that it is the most popular network technology
used on modern LANs.
Explain that all Ethernet networks share the same access method, Carrier Sense Multiple Access with
Collision Detection (CSMA/CD).
CSMA/CD (Carrier Sense Multiple Access with Collision Detection)
Define access method. Explain that the access method used in Ethernet is called CSMA/CD.
Discuss the characteristics of the CSMA/CD access method.
Define collision and jamming. Explain the CSMA/CD process, using Figure 6-11 to illustrate.
Explain the concept of a collision domain. Mention that repeaters propagate collisions, and discuss the
consequences of connecting multiple parts of a network with repeaters.
Discuss the relationship between collision domains and cabling distance limitations. Define data
propagation delay.
Explain that NICs cannot keep up with collision detection on high-speed networks. Discuss the limitations
that this fact imposes on high speed networks.
6-5
Network+ Guide to Networks, Fourth Edition
Switched Ethernet
Discuss the concept of shared Ethernet, stressing its limitations. Explain that stations cannot send and
receive data simultaneously, nor can they transmit a signal when another station on the same segment is
sending or receiving data.
Provide an overview of switched Ethernet. Stress that it enables multiple nodes to simultaneously transmit
and receive data over different logical network segments. Illustrate with Figure 6-12.
Describe the advantages of using switched Ethernet. Explain that it effectively increases bandwidth.
Ethernet Frames
Provide an overview of Ethernet frames. List the four types of data frames that are available for use on
Ethernet.
Explain that Ethernet frame types have no relation to the topology or cabling characteristics of the network
and that framing also takes place independently of the higher-level layers.
Using and Configuring Frames
Explain that interoperability among the frame types should not be expected.
Discuss the importance of LAN administrators ensuring that all devices on a LAN use the same, correct
frame type. Explain that node’s Data Link layer services must be properly configured to expect the types of
frames it might receive. Mention that Ethernet_II is the most commonly used frame type.
Explain how frame types are specified using NIC configuration software. Mention that there is often an
auto-detect feature that allows the NIC to detect the types of frames used on the network and to adjust its
configuration accordingly.
Frame Fields
Discuss the frame fields that all frame types have in common, including the preamble, start-of-frame
delimiter (SFD), header, and FCS field. Describe the purpose of each field. Explain that the FCS and the
header make up the 18-byte frame for the data.
Describe the characteristics of the data portion of an Ethernet frame. Mention the number of bytes that the
data portion many contain. Explain that the minimum total size of an Ethernet frame is 64 bytes and how
padding is used to enforce this minimum. Also mention that the maximum size of an Ethernet frame is
1518 bytes.
Explain that larger frame sizes generally improve network efficiency. Mention why network administrators
should try to minimize the number of broadcast frames on their networks.
Explain that it is most efficient to support only one frame type on a network.
Ethernet_II (DIX)
Discuss the history and characteristics of Ethernet_II. Explain the differences and advantages from older
Ethernet frame types. Stress the importance and use of the type field.
Briefly describe the Ethernet_SNAP frame type and discuss its differences from the Ethernet_II frame type.
6-6
Network+ Guide to Networks, Fourth Edition
PoE (Power over Ethernet)
Provide an overview of the PoE standard. Mention its similarity to standard telephone lines.
Discuss the role that the power sourcing equipment (PSE) and powered devices (PDs) play in PoE. Mention
that PoE requires CAT 5 or better copper cabling.
Quick Quiz 1
1.
A(n) _____ topology consists of a single cable connecting all nodes on a network without
intervening connectivity devices.
Answer: bus
2.
In a(n) _____ topology, every node on the network is connected through a central device, such as
a hub or a switch.
Answer: star
3.
Which is the most robust type of network backbone?
a. Serial
b. Distributed
c. Collapsed
d. Parallel
Answer: d
4.
In _____ switching, a connection is established between two network nodes before they begin
transmitting data.
Answer: circuit
5.
What is the minimum Ethernet frame size?
a. 32 bytes
b. 46 bytes
c. 64 bytes
d. 128 bytes
Answer: c
Token Ring
Provide a brief overview of the history of the Token Ring network access method.
Explain the advantages and disadvantages of Token Ring networks versus Ethernet networks. Mention that
Token Ring networks are more expensive, but more reliable than Ethernet networks.
Explain that Token Ring networks use the token-passing routine and a star-ring hybrid physical topology.
Discuss the token-passing mechanism in detail. Stress that this mechanism avoids the possibility of
collisions and that it does not impose distance limitations on the length of LAN segments.
Discuss the role of the active monitor on a Token Ring network.
Describe the specification for a Token Ring network, as specified by the IEEE 802.5 standard. These
specifications are described on page 306 of the text. Mention the role that Multistation Access Units
(MAUs) play on a Token Ring network, and illustrate with Figure 6-14.
6-7
Network+ Guide to Networks, Fourth Edition
Discuss the self-circuiting feature that MAU ports provide and the benefits associated with this feature.
Illustrate the connector types used on Token Ring networks with Figure 6-15.
Teaching
Tip
Make sure that students understand that Token Ring’s logical topology is a ring, its physical
topology is a star-ring hybrid in which data circulate in a ring fashion, and the layout of the
network is a star.
FDDI (Fiber Distributed Data Interface)
Provide an overview of FDDI, including its history. Explain the basic layout of a FDDI network, using
Figure 6-16 to illustrate.
Explain the advantages and disadvantages of using FDDI networks. Stress the reliability and security
implicit to this type of network.
Explain the similarities between Token Ring networks and FDDI networks. Discuss the benefits provided
by the secondary ring in a FDDI network.
ATM (Asynchronous Transfer Mode)
Provide a brief overview of ATM, including its history. Mention types of cables that ATM may run over.
Explain the reasons why ATM uses a fixed packet size and discuss the advantages that this provides.
Discuss the concept of virtual circuits and explain the advantages that they provide.
Explain why ATM is considered to be a connection-oriented packet switching technology. Discuss the
concept of quality of service (QoS) and explain its relationship to ATM.
Explain how ATM is compatible with other leading network technologies. Discuss the purpose of LAN
emulation (LANE).
Mention that ATM is expensive and may be pushed out of use by Gigabit Ethernet.
Wireless Networks
Present a brief overview of wireless access methods. Explain that each wireless technology is defined by a
standard that describes unique functions at both the Physical and the Data Link layers of the OSI Model.
802.11
Provide an overview of the 802.11 standards, specifically mentioning 802.11a, 802.11b, and 802.11g.
Explain that these standards share many characteristics.
6-8
Network+ Guide to Networks, Fourth Edition
6-9
Access Method
Explain that the 802.11 MAC services append 48-bit physical addresses to a frame to identify its source
and destination. Mention that, by using the same physical addressing scheme as Ethernet, 802.11 networks
can be easily combined with Ethernet networks.
Provide an overview of the CSMA/CA access method. Discuss how transmission is achieved over a
wireless network, as described on page 311 of the text. Mention that CSMA/CA reduces but does not
eliminate the possibility of collision.
Discuss the overhead required on a wireless network. Explain that the theoretical maximum throughput on
a wireless network is rarely achieved in practice.
Discuss the Request to Send/Clear to Send (RTS/CTS) protocol.
Association
Describe the process of association in wireless networks. Explain that association involves a number of
packet exchanges between a station and an access point (AP).
Give an overview of active scanning. Explain the concept of a probe frame and describe the information
contained in a reply to a probe frame.
Give an overview of passive scanning. Explain the purpose of and the information contained in a beacon
frame. Mention the purpose of the Service Set Identifier (SSID).
Explain that wireless networks can have multiple APs. Describe how a station picks an AP on such a
network. Also discuss the concept of reassociation.
Teaching
Tip
Make sure the students understand that the 802.11 standard does not specify how two APs should
communicate. Explain that, when designing an 802.11 network, it is best to use APs
manufactured by the same company, to ensure full compatibility.
Frames
Explain that, for each function such as ACKs, probes, and beacons, the 802.11 standard specifies a frame
type at the MAC sublayer. Explain that each of these frame types is subdivided into three groups and
present a short discussion of each group.
Illustrate an 802.11 data frame using Figure 6-18. Discuss each of the fields in this frame.
Emphasize the fields that are unique to the 802.11 data frame, such as the Sequence Control field.
802.11b
Present an overview of the 802.11b standard. Mention the characteristics of this standard, such as
frequency range and maximum throughput. Also mention that this is the least expensive of all the 802.11
technologies.
Network+ Guide to Networks, Fourth Edition
Teaching
Tip
6-10
Table 6-1 at the end of this chapter summarizes the characteristics of a number of wireless
standards, including 802.11a, 802.11b, 802.11g, Bluetooth, and IrDA. Rather than discussing the
characteristics of all these standards individually, it is probably easier to show Table 6-1 to the
students and describe them simultaneously. This will make it easier to compare and contrast the
standards.
802.11a
Present an overview of the 802.11a standard. Mention the characteristics of this standard, such as frequency
range and maximum throughput.
802.11g
Present an overview of the 802.11g standard. Mention the characteristics of this standard, such as
frequency range and maximum throughput.
Bluetooth
Provide an overview of Bluetooth, including it history. Explain that it is a mobile wireless networking
standard that uses FHSS RF signaling in the 2.4-GHz band.
Discuss the characteristics of Bluetooth versions 1.1, 1.2, and 2.0. Explain the advantages of Bluetooth 2.0.
Explain the concept of piconets and scatternets. Use Figures 6-20 and 6-21 to illustrate.
Infrared (IR)
Provide an overview of IR technology. Describe the characteristics of IR, including frequency ranges and
throughput. Stress that IR is only viable over short distances and cannot circumnavigate obstacles.
Explain the ways that IR technology is used.
Mention that the specifications for using IR signaling between devices on a network have been established
by the IrDA (Infrared Data Association), and that IrDA refers to the most popular IR networking
specifications.
Teaching
Tip
Make sure that the students understand that the actual geographic range of any wireless
technology depends on several factors, including the power of the antenna, physical barriers or
obstacles between sending and receiving nodes, and interference in the environment. Therefore,
although a technology is rated for a certain average geographic range, it may actually transmit
signals in a shorter or longer range.
Network+ Guide to Networks, Fourth Edition
Quick Quiz 2
1.
In Token Ring networks, the _____ maintains the timing for ring passing, monitors token and
frame transmission, detects lost tokens, and corrects errors when a timing error or other disruption
occurs.
Answer: active monitor
2.
True or False: ATM employs a fixed packet size.
Answer: True
3.
802.11 standards specify the use of _____ to access a shared medium.
Answer: Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
4.
In _____ scanning, a wireless station listens on all channels within its frequency range for a
special signal, known as a beacon frame, issued from an AP.
Answer: passive
Class Discussion Topics
1.
One network topology that was not discussed in this chapter is the mesh topology. In this
topology, there is a point-to-point connection between every device on the network. Have the
students discuss the advantages and disadvantages of this topology and compare it to the simple
topologies described in this chapter.
2.
Wireless technology is constantly improving in the areas of range, throughput, bandwidth, and
accessibility. For instance, it has been claimed that the development of the WiMAX standard
(IEEE 802.16) could result in almost blanket high-speed wireless coverage of the United States
within the next
10 to 15 years. Ask students if they think that wireless networking will completely replace wirebound networking technologies in the future.
Additional Projects
1.
A useful and important tool for a network administrator is a network diagramming software
package. There are many of these packages and tools available. Have the students research online
to find one or two such tools. Have them submit descriptions of the tools that they found, prices
for the tools, and reviews of the tools (this may or may not be possible, depending on which
software tool the student identifies). Compile the students’ results into a list that can be
redistributed to the class.
2.
Identify a reasonably sized network, such as a LAN in the building where the class is taught, that
the students would be able to physically examine. Have the students determine, via physical
examination or by interviewing the network administrator, the topologies employed in this
network. Have them diagram the network, identifying all connectivity hardware and all nodes on
the network. When they are done, check to make sure that the students identified the correct
topologies used on this network. If a suitable network cannot be found, draw a diagram of a
moderately sized network and have the students perform this exercise based on the diagram.
6-11
Network+ Guide to Networks, Fourth Edition
Additional Resources









LAN Topologies: http://docs.rinet.ru/NeHi/ch05/ch05.htm
Packet Switching Demo (Flash animation):
http://www.pbs.org/opb/nerds2.0.1/geek_glossary/packet_switching_flash.html
The Evolution of Packet Switching (historically interesting paper from 1973 by Dr. Lawrence G.
Roberts): http://www.packet.cc/files/ev-packet-sw.html
CSMA/CD Transmission Simulation Applet:
http://media.pearsoncmg.com/aw/aw_kurose_network_2/applets/csmacd/csmacd.html
Ethernet Frame Types: http://telecom.tbi.net/frmlan.html
Token Ring: http://www.datacottage.com/nch/troperation.htm
FDDI: http://www.cisco.com/univercd/cc/td/doc/cisintwk/ito_doc/fddi.htm
The ATM Forum: http://www.atmforum.com/
IEEE Wireless Standards Zone: http://standards.ieee.org/wireless/
6-12
Download