Date post: | 04-Jun-2018 |
Category: |
Documents |
Upload: | srikanth-jva |
View: | 242 times |
Download: | 3 times |
of 52
8/13/2019 DCN Unit 3 Ppt
1/52
UNIT-3
8/13/2019 DCN Unit 3 Ppt
2/52
Types of Networks..
Local Area Networkor LAN
Metropolitan Area Network orMAN
Wide Area Network orWAN
8/13/2019 DCN Unit 3 Ppt
3/52
Other networks include.
WLAN - Wireless LAN
SAN - Storage Area Network, System Area
Network, Server Area Network, or sometimes
Small Area Network
CAN - Campus Area Network, Controller
Area Network, or sometimes Cluster Area
Network
PAN - Personal Area Network DAN - Desk Area Network
8/13/2019 DCN Unit 3 Ppt
4/52
LAN (Local Area Network)
A LAN is generally a privately ownednetwork within a office, building or campus
covering a distance of a few kilometers.
A LAN is a computer network that covers asmall area.
Ownership by a single organization
Transmission speed of at least several Mbps(tens to hundreds are economical)
4
8/13/2019 DCN Unit 3 Ppt
5/52
Features of LAN..
The main purpose for designing a LAN is toshare resources such as printers, programs anddata.
Speed at a maximum of several 100s of
Megabits per second (Mbps) i.e., like 10 Gbps.Previously LAN had speed of around 4-16 Mbps,later 100 Mbps was developed.
Relatively low cost
Limited to short distance
Often rely onshared media.
8/13/2019 DCN Unit 3 Ppt
6/52
Topologies in LAN..
Topology refers to the way in which the
stations attached to the network are
interconnected.
Different topologies are
- Bus
- Tree
- Star
- Ring
8/13/2019 DCN Unit 3 Ppt
7/52
Bus Topology
Stations attach to linear medium (bus) Via a tap - allows for transmission and reception
Transmission propagates in medium in both directions(Full-duplex).
Data is transmitted in frames with addressing. Received by all other stations
Not addressed stations ignore
Need to identify target station
Each station has unique address Destination address included in frame header
Terminator absorbs frames at the end of medium
8/13/2019 DCN Unit 3 Ppt
8/52
8/13/2019 DCN Unit 3 Ppt
9/52
Since a single cable is used to connect
all the stations, it is inexpensive i.e., lowcost to implement this topology.
Easy to design
Easy to implement
The disadvantage is, if the cable breaks
down, entire network will not work.
The other disadvantage is, it requires
termination.
8/13/2019 DCN Unit 3 Ppt
10/52
8/13/2019 DCN Unit 3 Ppt
11/52
Tree Topology
8/13/2019 DCN Unit 3 Ppt
12/52
Star Topology
In star topology, each station is connected to a centralhub with a point-to-point connection.
Each station connected directly to central node usinga full-duplex (bi-directional) link.
Central node or hub can broadcast
Physical star, but logically like bustopology
Only one station can transmit at a time
8/13/2019 DCN Unit 3 Ppt
13/52
Star Topology
8/13/2019 DCN Unit 3 Ppt
14/52
Star topology advantages
Break in one cable does not affect other devices
Easy to locate problems Easy to install
Does not require termination like bus topology
Star topology disadvantages Center of star topology device (hub) can be
expensive
Hub failure can affect entire topology
Amount of cable is expensive
8/13/2019 DCN Unit 3 Ppt
15/52
Ring Topology A network topology that is set up in a circular
fashion in which data travels around the ring inone direction and each device on the right acts asa repeater to keep the signal strong as it travels.Each device incorporates a receiver for theincoming signal and a transmitter to send thedata on to the next device in the ring.
Repeaters joined by point-to-point links in closedloop Links unidirectional Receive data on one link and retransmit on another
Stations act like repeaters Data transmitted in frames
Frame passes all stations in a circular manner Destination recognizes address and copies frame Frame circulates back to source where it is terminated.
8/13/2019 DCN Unit 3 Ppt
16/52
8/13/2019 DCN Unit 3 Ppt
17/52
Frame Transmission in Ring LAN
8/13/2019 DCN Unit 3 Ppt
18/52
Ring topology advantages
Prevents network collisions Each station acts like a repeater
Ring topology disadvantages
Cable break can affect all devices Temporarily shut down network to add a
new station
Maintenance and monitoring is difficult
8/13/2019 DCN Unit 3 Ppt
19/52
For building networks of different
topologies, stations are required, along
with hubs, repeaters and cables.
8/13/2019 DCN Unit 3 Ppt
20/52
Fiber-Optic cable Advantages of fiber-optic cabling
Transmit data over long distances
Not susceptible to EMI
High transmission rates Not susceptible to eavesdropping
Small cable size
Disadvantages of fiber-optic cabling Expensive
Cable can be easily damaged during install makinginstallations more difficult
Manual termination of ends is time consuming
8/13/2019 DCN Unit 3 Ppt
21/52
Metropolitan Area Network
A metropolitan area network(MAN) is a computernetwork that usually spans a city or a large campus. A
MAN usually interconnects a number of local area
networks (LANs).
A MAN is optimized for a larger geographical area thana LAN, ranging from several blocks of buildings to entire
cities.
A MANis a collection of LANs within the same
geographical area, for instance a city. Distances between 5 and 50 kms
Data rate above 1 Mbps
21
8/13/2019 DCN Unit 3 Ppt
22/52
8/13/2019 DCN Unit 3 Ppt
23/52
Wide Area Network
A Wide Area Network ( WAN) is a computer
network covering multiple distance areas, which
may spread across the entire world.
WANs often connect multiple smaller networks,
such as local area networks (LANs) or metro
area networks (MANs).
A WAN is a computer network that spans arelatively large geographical area.
23
8/13/2019 DCN Unit 3 Ppt
24/52
24
IEEE Standards
IEEE stands for
Institute for Electrical and ElectronicEngineers.
IEEE has produced several standardfor LANs collectively known as
IEEE 802 standards for LANs andMANs.
8/13/2019 DCN Unit 3 Ppt
25/52
25
802.1: This standard gives an introduction to the set ofstandards and defines internetworking. This provides forcompatibility of different LANs and MANs across
protocol. 802.2:This standard describes the upper part of the DLL,
which uses Logical Link Control Protocol.
802.3: Describes the LAN Standard
802.4: Describes the LAN Standard Token Bus
802.5: Describes the LAN Standard Token Ring
802.6:Describes the LAN Standard Distributed QueueDual Bus (DQDB)
802.11:Wireless LAN
802.15: Bluetooth
8/13/2019 DCN Unit 3 Ppt
26/52
8/13/2019 DCN Unit 3 Ppt
27/52
According to IEEE 802 reference model the
data link layer is divided into two sub-
layers.
Logical Link Control(LLC)
Medium Access Control (MAC)
8/13/2019 DCN Unit 3 Ppt
28/52
Generally, the functions of data-link layer are
framing,
flow control &
error control.
Therefore in IEEE 802, the above functions aredivided among LLC and MAC sub-layers.
Flow control, error control and part of framing aredone by LLC.
The remaining part of framing is done in MAC sub-
layer along with other functionalities.
8/13/2019 DCN Unit 3 Ppt
29/52
The main difference between LLC and
MAC is that.LLC sub-layer provides single protocol for
all networks
MAC sub-layer is different for differentnetworks depending on the topology of thenetwork.
Eg: MAC sub-layer provides different
protocol for Bus topology and anotherprotocol for Ring topology.
8/13/2019 DCN Unit 3 Ppt
30/52
8/13/2019 DCN Unit 3 Ppt
31/52
IEEE Standard 802.2=Logic Link Control
Interface Between Network layer & MAC sub-layer
Specifies method of addressing and controls exchange of
data.
Independent of topology, medium, and medium access
control.
Assemble data into a frame with address and error-detection
fields.
Interface to higher levels and performs flow and error control.
8/13/2019 DCN Unit 3 Ppt
32/52
32
IEEE 802.2 frame format.
M di A C t l
8/13/2019 DCN Unit 3 Ppt
33/52
Medium Access Control
(MAC) MAC is a protocol used in networks to
facilitate the flow of frames in the medium. Main concern: interference from users.
Uses some mechanisms to coordinate the access of channel.
From the name itself it suggests that thisprotocol looks into the control of how the
medium is accessed.
MAC provides a means of controlling access
to the transmission medium in an efficient and
orderly manner.
8/13/2019 DCN Unit 3 Ppt
34/52
Medium Access Control Sublayer
Coordinate access to medium
Connectionless frame transfer service Machines identified by MAC/physical address
Broadcast frames with MAC addresses
Prepare data for transmission
Error detection
Address recognition
Governs access to transmission medium
8/13/2019 DCN Unit 3 Ppt
35/52
8/13/2019 DCN Unit 3 Ppt
36/52
8/13/2019 DCN Unit 3 Ppt
37/52
8/13/2019 DCN Unit 3 Ppt
38/52
To know the MAC address of a system.
Applicable to windows 7, 98, 2000, XP. ipconfig /all
or
ipconfig /all > %UserProfile%\Desktop\IP.txt(to save as a file on desktop)
8/13/2019 DCN Unit 3 Ppt
39/52
IEEE 802.6=Distributed Queue Dual Bus (DQDB)
DQDB protocol is a dual bus configuration.
DQDB architecture has two unidirectional buses
A and B.
It facilitates traffic in the opposite directions.
Bus A allows data flow from station 5 to 1 and
bus B allows data flow from station 1 to 5.
8/13/2019 DCN Unit 3 Ppt
40/52
8/13/2019 DCN Unit 3 Ppt
41/52
Consider an example where data has to sent fromstation 4 to station 2.
The head of Bus A i.e., station 5 will create an
empty transmission slot. When the transmission slot reaches station 4, it
fills the slot with data along with destinationaddress (i.e., station 2).
Next the data frame moves to station 3, where itchecks for the address and realizes that the datais not meant for it.
The data slot reaches station 2, where theaddress is checked, data is copied and makes anindicator on the slot to acknowledge the receipt ofdata.
The slot next moves to station 1 wherein it getsabsorbed.
8/13/2019 DCN Unit 3 Ppt
42/52
If in case station 1 has to send data to station
3, then the same process follows but here
Bus Bwill be used.
8/13/2019 DCN Unit 3 Ppt
43/52
IEEE Standard 802.4=Token Bus
Physically the Token bus is a linear cable to which the stations
are attached.
Logically , the stations are arranged in a ring with each station
knowing the address of the station to its left or right.
When the ring is initialized the highest numbered station may
send the first frame.
After it does, it passes the permission to its immediate neighbor
by sending the neighbor a special control frame called Token.
The token propagates around the logical ring, with only the token
holder being permitted to transmit frames.
Since only one station holds the token at a time, collisions do not
occur.
8/13/2019 DCN Unit 3 Ppt
44/52
44
17 20Broadband
Coaxial cable
Logical Ring
This station isnot currentlyin the logicalring
14
1971113
This station isnot currentlyin the logical
ring
IEEE 802 4 frame format
8/13/2019 DCN Unit 3 Ppt
45/52
45
IEEE 802.4 frame format
Bytes 1 1 1 6 or 2 6 or 2 4 1
Destn add Source add Data Checksum
Start of
framedelimiter
Preamble
FrameControl
EndDelimiter
8/13/2019 DCN Unit 3 Ppt
46/52
46
Each time a station acquires the token it transmitsframes for a certain amount of time after which it
passes the token.
If frames are short enough then several frames may betransmitted consecutively.
If the station has no data it passes the tokenimmediately after receiving it.
Token Bus MAC Sub-layer Protocol
8/13/2019 DCN Unit 3 Ppt
47/52
The stations are arranged to form a circular ring.
Any station connected to the ring can transmit dataonly when it possesses the token.
A special 3-byte token frame is used in 802.5
Once a station gets hold of a token, it can transmitdata over the medium.
A station holds the token, till the data frame is
received by the destination station, and returns backto the source station.
The data will be checked for its destination address
by every station connected to the ring topology.
IEEE Standard 802.5=Token Ring
8/13/2019 DCN Unit 3 Ppt
48/52
The destination station, indicates the receipt of the
data by setting a flag bit.
When the data frame gets back to the source, itchecks the flag bit to know data has been received or
not.
After this, the token will be passed on to the next
consecutive station.
In this manner, every station gets a turn to access the
medium in a ring topology.
Only one station can hold a token at a time
This ensures no congestion or collision over the
medium.
8/13/2019 DCN Unit 3 Ppt
49/52
8/13/2019 DCN Unit 3 Ppt
50/52
1 2
3
802 5 F F
8/13/2019 DCN Unit 3 Ppt
51/52
802.5 Frame Format..
Bytes 1 1 1 6 6 no limit 4 1 1
SD AC FC Destn add Source add Data Checksum ED FS
Start offramedelimiter
FrameControl
EndDelimiter
SD AC ED
1 1 1
Token format
Data Frame Format
FrameStatus
Access control
8/13/2019 DCN Unit 3 Ppt
52/52
The Access Control Field contains the token bit, active station
bit and priority bits.
The Frame Control distinguishes between data and various
control frames
The Frame Status is used for acknowledgement by the
destination