0% found this document useful (0 votes)
12 views

Chapter 7 - LAN 1

Uploaded by

Chan Teveak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Chapter 7 - LAN 1

Uploaded by

Chan Teveak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 69

Data Communications II

Chapter 7
Local Area Networks : The Basics
25/6/2023
Lecturer: Mr. HUN Ravy Mobile: 093 58 58 87 E-mail: [email protected]

1
Data Communications and Computer Networks
Chapter 7

Introduction
A local area network is a communication network that
interconnects a variety of data communicating devices within
a small geographic area and broadcasts data at high data
transfer rates with very low error rates.
Since the local area network first appeared in the 1970s, its
use has become widespread in commercial and academic
environments.

2
Data Communications and Computer Networks
Chapter 7

Primary Function of a LAN


To provide access to hardware and software resources that
will allow users to perform one or more of the following
activities:
File serving - A large storage disk drive acts as a central
storage repository.
Print serving - Providing the authorization to access a
particular printer, accept and queue print jobs, and providing a
user access to the print queue to perform administrative
duties.
3
Data Communications and Computer Networks
Chapter 7

Primary Function of a LAN continued


Video transfers - High speed LANs are capable of supporting
video image and live video transfers.
Manufacturing support - LANs can support manufacturing
and industrial environments.
Academic support – In classrooms, labs, and wireless
E-mail support
Interconnection between multiple systems

4
Data Communications and Computer Networks
Chapter 7

Advantages of Local Area Networks


Ability to share hardware and software resources.
Individual workstation might survive network failure.
Component and system evolution are possible.
Support for heterogeneous forms of hardware and software.
Access to other LANs and WANs (Figure 7-1).
Private ownership.
Secure transfers at high speeds with low error rates.
5
Data Communications and Computer Networks
Chapter 7

6
Data Communications and Computer Networks
Chapter 7

Disadvantages of Local Area Networks


Equipment and support can be costly.
Level of maintenance continues to grow.
Private ownership?
Some types of hardware may not interoperate.
Just because a LAN can support two different kinds of
packages does not mean their data can interchange easily.
A LAN is only as strong as it weakest link, and there are
many links.
7
Data Communications and Computer Networks
Chapter 7

Basic Network Topologies


Local area networks are interconnected using one of four
basic configurations:
1. Bus/tree
2. Star-wired bus
3. Star-wired ring
4. Wireless

8
Data Communications and Computer Networks
Chapter 7

Bus/Tree Topology
The original topology
Workstation has a network interface card (NIC) that attaches
to the bus (a coaxial cable) via a tap.
Data can be transferred using either baseband digital signals
or broadband analog signals.

9
Data Communications and Computer Networks
Chapter 7

10
Data Communications and Computer Networks
Chapter 7

11
Data Communications and Computer Networks
Chapter 7

Bus/Tree Topology
Baseband signals are bidirectional and more outward in both
directions from the workstation transmitting.
Broadband signals are usually uni-directional and transmit in
only one direction. Because of this, special wiring
considerations are necessary.
Buses can be split and joined, creating trees.

12
Data Communications and Computer Networks
Chapter 7

13
Data Communications and Computer Networks
Chapter 7

14
Data Communications and Computer Networks
Chapter 7

Star-wired Bus Topology


Logically operates as a bus, but physically looks like a star.
Star design is based on hub. All workstations attach to hub.
Unshielded twisted pair usually used to connect workstation
to hub.
Hub takes incoming signal and immediately broadcasts it out
all connected links.
Hubs can be interconnected to extend size of network.
15
Data Communications and Computer Networks
Chapter 7

17
Data Communications and Computer Networks
Chapter 7

18
Data Communications and Computer Networks
Chapter 7

Star-wired Bus Topology


Modular connectors and twisted pair make installation and
maintenance of star-wired bus better than standard bus.
Hubs can be interconnected with twisted pair, coaxial cable,
or fiber optic cable.
Biggest disadvantage: when one station talks, everyone hears
it. This is called a shared network. All devices are sharing
the network medium.

19
Data Communications and Computer Networks
Chapter 7

Star-wired Ring Topology


Logically operates as a ring but physically appears as a star.
Star-wired ring topology is based on MAU (multi-station
access unit) which functions similarly to a hub.
Where a hub immediately broadcasts all incoming signals
onto all connected links, the MAU passes the signal around in
a ring fashion.
Like hubs, MAUs can be interconnected to increase network
size.
20
Data Communications and Computer Networks
Chapter 7

21
Data Communications and Computer Networks
Chapter 7

22
Data Communications and Computer Networks
Chapter 7

Wireless Topology
Not really a specific topology since a workstation in a
wireless LAN can be anywhere as long as it is within
transmitting distance to an access point.
Several versions of IEEE 802.11 standard defines various
forms of wireless LAN connections.
Workstations reside within a basic service set, while multiple
basic service sets create an extended service set.

23
Data Communications and Computer Networks
Chapter 7

Wireless Topology
Two basic components necessary: the client radio, usually a
PC card with an integrated antenna installed in a laptop or
workstation, and the access point (AP), which is an Ethernet
port plus a transceiver.
The AP acts as a bridge between the wired and wireless
networks and can perform basic routing functions.
Workstations with client radio cards reside within a basic
service set, while multiple basic service sets create an
extended service set.
24
Data Communications and Computer Networks
Chapter 7

25
Data Communications and Computer Networks
Chapter 7

26
Data Communications and Computer Networks
Chapter 7

Wireless Topology
IEEE 802.11 – The original wireless standard, capable of
transmitting data at 2 Mbps
IEEE 802.11b – The second wireless standard, capable of
transmitting data at 11 Mbps
In actual tests, 11 Mbps 802.11b devices managed 5.5 Mbps
(from a July 2000 test by Network Computing).

27
Data Communications and Computer Networks
Chapter 7

Wireless Topology
With directional antennae designed for point-to-point
transmission (rare), 802.11b can transmit for more than 10
miles.
With an omni-directional antenna on a typical AP, range may
drop to as little as 100 feet.

28
Data Communications and Computer Networks
Chapter 7

Wireless Topology

IEEE 802.11a – One of the more recent standards, capable of


transmitting data at 54 Mbps using the 5 GHz frequency
range.
IEEE 802.11g – The other recent standard, also capable of
transmitting data at 54 Mbps but using the same frequencies
as 802.11b (2.4 GHz) and is backwards compatible with
802.11b.

29
Data Communications and Computer Networks
Chapter 7

Wireless Topology

HiperLAN/2 (European standard, 54 Mbps in 5 GHz band)


To provide security, most systems use either Wired
Equivalent Privacy (WEP), which provides either 40- or 128-
bit key protection, or a more advanced standard such as WPA
(more on security in Chapter Thirteen).
Wireless LANs may also be configured without an access
point. These configurations are called “ad-hoc”.
30
Data Communications and Computer Networks
Chapter 7

31
Data Communications and Computer Networks
Chapter 7

32
Data Communications and Computer Networks
Chapter 7

Medium Access Control Protocols


How does a workstation get its data onto the LAN medium?
A medium access control protocol is the software that allows
workstations to “take turns” at transmitting data.
Two basic categories:
1. Contention-based protocols
2. Round robin protocols

For Next Week 33


Data Communications and Computer Networks
Chapter 7

Contention-Based Protocols
Essentially first come first served.
Most common example is carrier sense multiple access with
collision detection (CSMA/CD).
If no one is transmitting, a workstation can transmit.
If someone else is transmitting, the workstation “backs off”
and waits.

34
Data Communications and Computer Networks
Chapter 7

Contention-Based Protocols
If two workstations transmit at the same time, a collision
occurs.
When the two workstations hear the collision, they stop
transmitting immediately.
Each workstation backs off a random amount of time and tries
again.
Hopefully, both workstations do not try again at the exact
same time.
CSMA/CD is an example of a non-deterministic protocol. 35
Data Communications and Computer Networks
Chapter 7

36
Data Communications and Computer Networks
Chapter 7

Round Robin Protocols


Each workstation takes a turn transmitting and the turn is
passed around the network from workstation to workstation.
Most common example is token ring LAN in which a
software token is passed from workstation to workstation.
Token ring is an example of a deterministic protocol.
Token ring more complex than CSMA/CD. What happens if
token is lost? Duplicated? Hogged?
Token ring LANs are losing the battle with CSMA/CD LANs.
37
Data Communications and Computer Networks
Chapter 7

38
Switches
• The hub is a simple device that transmits an
incoming frame out all the other ports on the
hub
• The switch has intelligence and can filter out
and forward frames based on their NIC
address
• A switch maintains internal port table(s) that
keep track of which frames arrived on which
ports
• Switches have eliminated many hubs
39
Switches (continued)

40
Switches (continued)

• A switch observes each frame that arrives at


a port, extracts the source address from the
frame, and places that address in the port’s
routing table
• A transparent switch is found with
CSMA/CD LANs

41
Switches (continued)

42
Switches (continued)

43
Isolating Traffic Patterns and
Providing Multiple Access
• Whether shared or dedicated segments are
involved, the primary goal of a switch is to
isolate a particular pattern of traffic from
other patterns of traffic or from the
remainder of the network
• Switches, because of their backplane, can
also allow multiple paths of
communications to simultaneously occur
44
Switches (continued)
Figure 7-13
A switch with
two servers
allowing
simultaneous
access to two
servers

45
Full-Duplex Switches
• Allow for simultaneous transmission and
reception of data to and from a workstation
• This full-duplex connection helps to
eliminate collisions
• To support a full-duplex connection to a
switch, at least two pairs of wires are
necessary
– One for the receive operation
– One for the transmit operation
– Most people install four pairs today, so wiring
is not the problem
46
Virtual LANs
• Virtual LAN (VLAN) – logical subgroup
within a LAN that is created via switches
and software rather than by manually
moving wiring from one network device to
another
• Even though employees and their actual
computer workstations may be scattered
throughout the building, LAN switches and
VLAN software can be used to create a
“network within a network”
47
Virtual LANs (continued)
• A relatively new standard, IEEE 802.1Q,
was designed to allow multiple devices to
intercommunicate and work together to
create a virtual LAN
• Instead of sending technician to a wiring
closet to move a workstation cable from one
switch to another, an 802.1Q-compliant
switch can be remotely configured by a
network administrator
48
Virtual LANs (continued)

Figure 7-14
A switch with
two VLANs
configured

49
Link Aggregation
• Allows you to combine two or more links
into one higher-speed link
• Why would we want to do this?
– What if you want more bandwidth between a
device and a switch?
– What if you want to provide a back-up link
between a device and a switch?
– What if you want to provide a higher-speed
connection to a server?

50
Link Aggregation
• An IEEE protocol (802.3ad-2000) which
typically runs in most LAN devices can
support link aggregation
• Link aggregation attempts to balance the
flow of messages over the multiple paths,
unless the flow of frames belong to a
particular conversation; then the frames are
sent over one of the links.

51
Data Communications and Computer Networks
Chapter 7

Medium Access Control Sublayer


To better support local area networks, the data link layer of
the OSI model was broken into two sublayers:
1. Logical link control sublayer
2. Medium access control sublayer
Medium access control sublayer defines the frame layout and
is more closely tied to a specific medium at the physical layer.
Thus, when people refer to LANs they often refer to its MAC
sublayer name, such as 10BaseT.
52
Data Communications and Computer Networks
Chapter 7

53
Data Communications and Computer Networks
Chapter 7

IEEE 802 Frame Formats


The IEEE 802 suite of protocols defines the frame formats for
CSMA/CD (IEEE 802.3) and token ring (IEEE 802.5).
Each frame format describes how the data package is formed.
Note how the two frames are different. If a CSMA/CD
network connects to a token ring network, the frames have to
be converted from one to another.

54
Data Communications and Computer Networks
Chapter 7

Local Area Network Systems


Ethernet or CSMA/CD
Most common form of LAN today.
Star-wired bus is most common topology but bus topology
also available.
Ethernet comes in many forms depending upon medium used
and transmission speed and technology.

55
Data Communications and Computer Networks
Chapter 7

Ethernet
Originally, CSMA/CD was 10 Mbps.
Then 100 Mbps was introduced. Most NICs sold today are
10/100 Mbps.
Then 1000 Mbps (1 Gbps) was introduced.
10 Gbps is now beginning to appear.

56
Data Communications and Computer Networks
Chapter 7

Ethernet
1000 Mbps introduces a few interesting wrinkles:
Transmission is full duplex (separate transmit and receive),
thus no collisions.
Prioritization is possible using 802.1p protocol.
Topology can be star or mesh (for trunks).

57
Data Communications and Computer Networks
Chapter 7

Ethernet
A few more interesting wrinkles:
Cabling can be either UTP or optical (but 10 Gbps Ethernet
may not work over UTP due to radio frequency interference).
Where 10 Mbps Ethernet has less than 30% utilization due to
collisions, 1000 Mbps is limited only by traffic queueing.
Distance with 10 Mbps is limited by CSMA/CD propagation
time, whereas 1000 Mbps limited only by media.
58
Data Communications and Computer Networks
Chapter 7

59
Data Communications and Computer Networks
Chapter 7

Local Area Network Systems


IBM Token Ring
Deterministic LAN offered at speeds of 4, 16 and 100 Mbps.
Very good throughput under heavy loads.
More expensive components than CSMA/CD.
Losing ground quickly to CSMA/CD. May be extinct soon.

60
Data Communications and Computer Networks
Chapter 7

Local Area Network Systems


FDDI (Fiber Distributed Data Interface)
Based on the token ring design using 100 Mbps fiber
connections.
Allows for two concentric rings - inner ring can support data
travel in opposite direction or work as backup.
Token is attached to the outgoing packet, rather than waiting
for the outgoing packet to circle the entire ring.
61
Data Communications and Computer Networks
Chapter 7

62
LANs In Action: A Small Office
Solution
• What type of system will interconnect 20
workstations in one room and 15
workstations in another room to a central
server, which offers:
– Internal e-mail
– A database that contains all customer
information
– High-quality printer access
63
LANs In Action:
A Small Office Solution
Figure 7-19
Wiring diagram of
Hannah’s office
(continued)
space showing the
placement of
switches and
servers

64
LANs In Action:
A Small Office Solution
Figure 7-20
The modified
(continued)
network with a
router and high-
speed phone line

65
Summary

• Primary functions of a LAN are to enable sharing of


data, software, and peripherals and to provide
common services such as file serving, print serving,
support for electronic mail, and process control and
monitoring in office, academic, and manufacturing
environments
• Local area networks have numerous advantages and
disadvantages
• A LAN can be configured as a bus/tree topology, a
star-wired bus topology, or a wireless network

66
Summary (continued)
• With both baseband and broadband buses, expansion in the
form of adding a new workstation is difficult when a tap is
not available
• For a workstation to place data onto a LAN, network must
have a medium access control protocol
– Two basic forms of medium access control protocols are:
• Contention-based
• Round-robin
• CSMA/CD works on first-come, first-served basis,
supports half-duplex and full-duplex connections, and is
clearly the most popular access protocol

67
Summary (continued)

• To standardize the medium access control


protocols, IEEE created the 802 series of
network standards
• Virtual LANs allow network administrators
to create subgroups of devices on a LAN
• The IEEE 802.1q standard supports virtual
LANs

68
Summary (continued)
• Link aggregation allows one to combine
two or more data paths or links into one
higher-speed link
• Link aggregation is supported by the IEEE
802.3ad-2000 standard
• The Spanning Tree Algorithm can be used
to eliminate cycles within larger local area
network installations
• The Rapid Spanning Tree Protocol
incorporates the Spanning
69
Tree Algorithm
Summary (continued)

• Many forms of wired Ethernet exist,


including twisted pair and fiber optic
versions, from 10 Mbps up to 100 Gbps
• The basic Ethernet frame consists of an 8-
byte header, two 6-byte NIC addresses, a
length or type field, a data field, an optional
pad field, and a 4-byte checksum

70

You might also like