52
Chapter 7: Local Area Networks: The Basics Data Communications and Computer Networks: A Business User’s Approach Fifth Edition

07rev5.ppt

Embed Size (px)

DESCRIPTION

 

Citation preview

Page 1: 07rev5.ppt

Chapter 7:

Local Area Networks: The Basics

Data Communications andComputer Networks: A Business User’s ApproachFifth Edition

Page 2: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 2

Introduction

•Local area network - communication network

•Interconnects a variety of data communicating devices within a small geographic area

•Broadcasts data at high data transfer rates with very low error rates

•Since the local area network first appeared in the 1970s, its use has become widespread in commercial and academic environments

Page 3: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 3

Primary Function of a LAN

•To provide access to hardware and software resources that will allow users to perform one or more of the following activities:

•File serving, Print serving, Video transfers, Manufacturing support, Academic support , E-mail support, Interconnection between multiple systems

Page 4: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 4

Advantages of Local Area Networks

•Ability to share hardware and software resources

•Component and system evolution (upgrades) are possible and easier to implement

•Support for heterogeneous forms of hardware and software

•Access to other LANs and WANs (Figure 7-1)

•Private ownership (is this always a plus?)

•Secure transfers at high speeds with low error rates

Page 5: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 5

Interconnection of Local Area NetworksRouters!

Page 6: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 6

Disadvantages of Local Area Networks

•Equipment and support can be costly•Level of maintenance continues to grow•Private ownership?•Some types of hardware may not interoperate•Just because a LAN can support two different kinds of packages does not mean their data can be interchanged easily•A LAN is only as strong as it weakest link, and there are many links…Security!!!

Page 7: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 7

Basic Local Area Network Topologies

Local area networks are interconnected using one of four basic configurations:

1. Bus/tree

2. Star-wired bus

3. Star-wired ring

4. Wireless

(physical implementation!)

Page 8: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 8

Bus/Tree Topology

•The original topology

•Workstation has a network interface card (NIC) that attaches to the bus (a coaxial cable) via a tap

•Data can be transferred using either

•Baseband digital signals

•Broadband analog signals

Page 9: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 9

Bus/Tree Topology (continued)

Page 10: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 10

Bus/Tree Topology (continued)

Page 11: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 11

Bus/Tree Topology (continued)

•Baseband signals (digital) •Bidirectional

•Move outward from the workstation transmitting in both directions

•Broadband signals (analog)•Usually unidirectional

•Transmit in only one direction (due to amplifiers!)

•Buses can be split and joined, creating trees

Page 12: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 12

Bus/Tree Topology (continued)

Page 13: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 13

Bus/Tree Topology (continued)If transmission is one way, how does pc #b transmit to #a?

PC #A

PC #B

data

Page 14: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 14

Star-Wired Bus Topology

•Logically operates as a bus - physically looks like a star

•Star design based on hub

•All workstations attach to hub

•Unshielded twisted pair usually used to connect workstation to hub•Hub takes incoming signal and immediately broadcasts it out all connected links•Hubs can be interconnected to extend network size

Page 15: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 15

Star-Wired Bus Topology (continued)

Page 16: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 16

Star-Wired Bus Topology (continued)

Page 17: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 17

Star-Wired Bus Topology (continued)

•Modular connectors (RJ-45) and twisted pair make installation and maintenance of star-wired bus easier than a standard bus

•Hubs can be interconnected with twisted pair, coaxial cable, or fiber optic cable

•Biggest disadvantage: when one station talks, everyone

hears it (contention based: Ethernet!) called a shared network

•All devices are sharing the network medium

Page 18: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 18

Star-Wired Ring Topology

•Logically operates as a ring but physically appears as a star

•Based on MAU (multi-station access unit) which functions similarly to a hub

•Where a hub immediately broadcasts all incoming signals onto all connected links, the MAU passes the signal around in a ring fashion

•Like hubs, MAUs can be interconnected to increase network size

Page 19: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 19

Star-Wired Ring Topology (continued)

Page 20: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 20

Star-Wired Ring Topology (continued)

Page 21: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 21

Wireless LANs

•Not really a specific topology

•Workstation in wireless LAN can be anywhere as long as within transmitting distance to access point

•Several versions of IEEE 802.11 standard defines various forms of wireless LAN connections

Page 22: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 22

Wireless LANs (continued)

•Two basic components necessary: •Client Radio - usually PC card with integrated antenna installed in a laptop or workstation

•Access Point (AP) - Ethernet port plus transceiver

•AP acts as bridge between wired and wireless networks

Page 23: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 23

Wireless LANs (continued)

Basic Service Set:

Page 24: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 24

Wireless LANs (continued)Extended Service Set:

Page 25: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 25

Wireless LANs (continued)

•IEEE 802.11 – The original wireless standard, capable of transmitting data at 2 Mbps (freq. hopping or direct sequence spread spectrum)

•IEEE 802.11b – The second wireless standard, capable of transmitting data at 11 Mbps (direct sequence spread spectrum – chip codes – code division)

•In actual tests, 11 Mbps 802.11b devices managed 5.5 Mbps (from July 2000 test by Network Computing)

Page 26: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 26

DSSS:Acronym for direct-sequence spread spectrum. DSSS is one of two types of spread spectrum radio, the other being frequency-hopping spread spectrum. DSSS is a transmission technology used in LAWN transmissions where a data signal at the sending station is combined with a higher data rate bit sequence, or chipping code, that divides the user data according to a spreading ratio. The chipping code is a redundant bit pattern for each bit that is transmitted, which increases the signal's resistance to interference. If one or more bits in the pattern are damaged during transmission, the original data can be recovered due to the redundancy of the transmission.

Page 27: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 27

FHSS:Acronym for frequency-hopping spread spectrum. FHSS is one of two types of spread spectrum radio, the other being direct-sequence spread spectrum. FHSS is a transmission technology used in LAWN transmissions where the data signal is modulated with a narrowband carrier signal that "hops" in a random but predictable sequence from frequency to frequency as a function of time over a wide band of frequencies. The signal energy is spread in time domain rather than chopping each bit into small pieces in the frequency domain. This technique reduces interference because a signal from a narrowband system will only affect the spread spectrum signal if both are transmitting at the same frequency at the same time. If synchronized properly, a single logical channel is maintained. The transmission frequencies are determined by a spreading, or hopping, code. The receiver must be set to the same hopping code and must listen to the incoming signal at the right time and correct frequency in order to properly receive the signal. Current FCC regulations require manufacturers to use 75 or more frequencies per transmission channel with a maximum dwell time (the time spent at a particular frequency during any single hop) of 400 ms.

Page 28: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 28

Wireless LANs (continued)

•With directional antennae designed for point-to-point transmission (rare), 802.11b can transmit for more than 10 miles

•With an omni-directional antenna on a typical AP, range may drop to as little as 100 feet

Page 29: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 29

Wireless LANs (continued)

•IEEE 802.11a –Capable of transmitting data at 54 Mbps using 5 GHz frequency range (FDM similar to ADSL bits sent out over 48 sub-bands)

•IEEE 802.11g –Capable of transmitting data at 54 Mbps but using the same frequencies as 802.11b (2.4 GHz) (same as a but more complex modulation technique) Backwards compatible with 802.11b

Page 30: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 30

Wireless LANs (continued)

•To provide security, most systems use either Wired Equivalent Privacy (WEP)

•Provides either 40- or 128-bit key protection

•Or a more advanced standard such as WPA (more on security in Chapter Thirteen)•Wireless LANs may also be configured without access point

•These configurations are called “ad-hoc”

Page 31: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 31

Wireless LANs (continued)

Ad Hoc:

Page 32: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 32

Comparison of Bus, Star-Wired Bus, Star-Wired Ring, and Wireless Topologies

Page 33: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 33

Medium Access Control Protocols

• How does a workstation get its data onto the LAN medium?

• Medium access control protocol – software/firmware that allows workstations to “take turns” at transmitting data

• Two basic categories:

1. Contention-based protocols

2. Round robin protocols

Page 34: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 34

Contention-Based Protocols

•Essentially first come first served

•Most common example:

•Carrier sense multiple access with collision detection (CSMA/CD)

•If no one is transmitting, a workstation can transmit but keeps listening for a collision

•If someone else is transmitting, workstation “backs off” and waits

Page 35: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 35

CSMA/CD Persistence Algorithms (details section)

• Non-persistent- listen, back off, and listen again.

• 1-persistent- always listen, transmit immediately

• P-persistent- listen always, back off with probability p-1 (or transmit immediately with probability p!)

Page 36: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 36

Contention-Based Protocols (continued)

•If two workstations transmit at the same time •Collision occurs

•When a workstation hears a collision•Stop transmitting immediately and issue a jam signal

•All workstations back off a random amount of time and try again

•Hopefully, workstations do not try again at the exact same time

•CSMA/CD: example of non-deterministic protocol

Page 37: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 37

Contention-Based Protocols (continued)

Page 38: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 38

Round Robin Protocols

•Each workstation takes turn transmitting turn is passed around the network from workstation to workstation•Most common example is token ring LAN:

•Software token is passed from workstation to workstation

•Token ring: example of deterministic protocol•Token ring more complex than CSMA/CD. What happens if token is lost? Duplicated? Hogged?•Token ring LANs are losing the battle with CSMA/CD LANs

Page 39: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 39

Token Ring

Token

B has token soTransmits data

M takes data, sets rec. bits andSends message on.

B sees that M received dataAnd releases token

Page 40: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 40

IEEE 802

• To better support local area networks, data link (DLC) layer of the OSI model was broken into two sublayers:1. Logical link control sublayer (LLC-layer)

2. Medium access control sublayer (MAC-layer)

• Medium access control sublayer defines the frame layout • More closely tied to specific medium/protocol at physical

layer

• Thus, when people refer to LANs they often refer to its MAC sublayer name, such as 10BaseT (10Mbps, twisted pair)

Page 41: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 41

IEEE 802

Page 42: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 42

IEEE 802.3 and 802.5 Frame Formats

•IEEE 802 suite of protocols defines frame formats for CSMA/CD (IEEE 802.3) and token ring (IEEE 802.5)

•Each frame format describes how data package is formed

•Note that the two frame formats are different

•If a CSMA/CD network connects to a token ring network, frames have to be converted from one to another

Page 43: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 43

IEEE 802.3 and 802.5 Frame Formats

Why do some frames have toBe padded to reach a minimumLength?

CRC

Page 44: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 44

IEEE 802.3 and 802.5 Frame Formats

Page 45: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 45

Local Area Network Systems

•Ethernet or CSMA/CD

•Most common form of LAN today

•Star-wired bus is most common topology but bus topology also available

•Ethernet comes in many forms depending on:

•Medium used

•Transmission speed

•Technology

Page 46: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 46

Ethernet

•Originally, CSMA/CD was 10 Mbps

•Then 100 Mbps was introduced

•Most NICs sold today are 10/100 Mbps

•Then 1000 Mbps (1 Gbps) was introduced

•10 Gbps is now beginning to appear

Page 47: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 47

Ethernet (continued)

•Cabling can be either UTP or optical

•10 Gbps Ethernet may not work over UTP due to radio frequency interference

•Where 10 Mbps Ethernet has less than 30% utilization due to collisions

•1000 Mbps is limited only by traffic queuing

•Distance with 10 Mbps is limited by CSMA/CD propagation time

•1000 Mbps limited only by medium

Page 48: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 48

Ethernet (continued)

Page 49: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 49

IBM Token Ring

•Deterministic LAN offered at speeds of 4, 16 and 100 Mbps

•Very good throughput under heavy loads

•More expensive components than CSMA/CD

•Losing ground quickly to CSMA/CD

•May be extinct soon

Page 50: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 50

Fiber Distributed Data Interface (FDDI)

•Based on token ring design using 100 Mbps fiber connections

•Allows for two concentric rings

•Inner ring can support data travel in opposite direction or work as backup

•Token is attached to outgoing packet, rather than waiting for outgoing packet to circle entire ring

Page 51: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 51

Fiber Distributed Data Interface (FDDI)

Page 52: 07rev5.ppt

Data Communications & Computer Networks: A Business User's Approach, Fifth Edition 52

Homework For Chapter 7