+ All Categories
Home > Documents > Lecture 14: Data Transport Networks: Local Area Network

Lecture 14: Data Transport Networks: Local Area Network

Date post: 28-Jan-2015
Category:
Upload: networksguy
View: 106 times
Download: 1 times
Share this document with a friend
Description:
 
Popular Tags:
27
Data Transport Network - Local Area Network Rong Wang CGS3285 Spring2004
Transcript
Page 1: Lecture 14: Data Transport Networks: Local Area Network

Data Transport Network- Local Area Network

Rong WangCGS3285

Spring2004

Page 2: Lecture 14: Data Transport Networks: Local Area Network

2

Local Area Networks

LAN topologies Multiple Access Methods

Random Access Controlled Access Channelization

The Ethernet frame

Page 3: Lecture 14: Data Transport Networks: Local Area Network

3

BASIC LAN TOPOLOGIES

Page 4: Lecture 14: Data Transport Networks: Local Area Network

4

APPEARANCES CAN BE DECEIVING!

Page 5: Lecture 14: Data Transport Networks: Local Area Network

5

FIGURE 8-4: LAN TOPOLOGIES

Page 6: Lecture 14: Data Transport Networks: Local Area Network

6

HUB vs. SWITCH

Earliest LANs used long coaxial cables (Bus, Ring)

Hub Implements a logical bus or ring topology within

a single device. Switch

Device that creates a true star network. Data is delivered to the appropriate user based

on the destination address. No other devices on the network hear or interfere

with the data transmission. Connections to hubs/switches usually over

twisted pair in a physical star configuration.

Page 7: Lecture 14: Data Transport Networks: Local Area Network

7

LAN ACCESS METHODS

Access Method - allows LAN users to transmit data and controls access the physical media. Different types of access methods exist including:

Switching (becoming cheaper & more popular) Creates full duplex path between sender and receiver

Central Control (not used often) type of polling & selecting

Multiplexing (Broadband) Frequency Division Time Division

Page 8: Lecture 14: Data Transport Networks: Local Area Network

8

LAN ACCESS METHODS (cont.)

Access Method Types (cont.)

Token Passing (Token Ring) Contention (Baseband)

Random Access (not used often) *** CSMA - Carrier Sense Multiple Access ***

Collision Avoidance CSMA/CD (Ethernet)

Collision Avoidance & Detection

*** Requires acknowledgement from receiver

Page 9: Lecture 14: Data Transport Networks: Local Area Network

9

MULTIPLE ACCESS METHODS

Page 10: Lecture 14: Data Transport Networks: Local Area Network

10

RANDOM OF ACCESS

Each station has the right to the medium without being controlled by any other station.

Collision Confliction caused by multiple stations that try to send

data on medium simultaneously Frame swill be either destroyed or modified

Page 11: Lecture 14: Data Transport Networks: Local Area Network

11

ALOHA NETWORK

Multiple access (MA) A base station is used as central controller Every station that needs to send a frame to another

station first sends it to the base station Base station receives the frames and relays it to the

intended destination

Page 12: Lecture 14: Data Transport Networks: Local Area Network

12

PROCEDURE OF ALOHA PROTOCOL

Rules Multiple access: any station sends a frame when it has

a frame to send Acknowledgement: after sending the frame, the

station waits for an acknowledgement. If it does not receive an acknowledgement during the allotted time, it assumes that the frame is lots and tries to send after a random amount of time

Page 13: Lecture 14: Data Transport Networks: Local Area Network

13

COLLISION IN CSMA

Carrier sense multiple access (CSMA) Each station first listen to the medium, before

sending Reduce the possibility of collision but can not

eliminate it: what if multiple stations detected that the medium is idle and then send data at the same time?

Page 14: Lecture 14: Data Transport Networks: Local Area Network

14

PERSISTENCE STRATEGY None persistent strategy

If line is idle, the station sends immediately, if the line is not idle, the station waits a random period of time and then sense the line again.

Persistent strategy 1 persistent method: if the stations finds the line idle, it sends

its frame immediately (with a probability of 1). P persistent method: if the line is idle, the station may or may

not send, it sends with probability p and refrains from sending with probability 1-p.

Page 15: Lecture 14: Data Transport Networks: Local Area Network

15

CSMA/CD

Carrier sense multiple access with collision detection

Page 16: Lecture 14: Data Transport Networks: Local Area Network

16

CSMA-CA

CSMA with Collision Avoidance

IFG: interframe gap

Page 17: Lecture 14: Data Transport Networks: Local Area Network

17

CONTROL ACCESS

Reservation Polling Token passing

Page 18: Lecture 14: Data Transport Networks: Local Area Network

18

RESERVATION ACCESS METHOD

A station that needs to make a reservation before sending data

A reservation frame precedes the data frames sent in a each time interval, which consists of minislot. Each of the slot is assigned to a station in the system.

Page 19: Lecture 14: Data Transport Networks: Local Area Network

19

POLLING AND SELECTING

Polling and Selecting works with topologies in which one device is designed as a primary station and the other devices are secondary stations.

Primary station controls the link. All data exchanges must be made through the primary device even when the ultimate destination is a second device.

Page 20: Lecture 14: Data Transport Networks: Local Area Network

20

SELECTING

In select mode, when a primary device has something to send, it sends a select (SEL) frame to check if the secondary is ready to receive the data.

Page 21: Lecture 14: Data Transport Networks: Local Area Network

21

POLLING Used by the primary divide to solicit transmissions from the

secondary device When the primary is ready to receive data, it must ask(poll) each

device in turn if it has anything to send If a station got polling message and does not have data to send,

it sends back response with negative (NAK) frame and the primary station sends polling message to the next station

If a station has data to send, it returns the positive (data frame) and primary returns a acknowledgement (ACK frame) to verify its receipt.

Page 22: Lecture 14: Data Transport Networks: Local Area Network

22

TOKEN PASSING Stations are arranged around a ring, each station has a

predecessor and a successor. Data comes from the predecessor and going to the

successor. A station is authorized to send data when it receives a

special frame called a token If the station does not have data to send, it passes the token

to its successor station. If the station has data to send, it sends the frames and finally

release the token to be used by the successor station.

Page 23: Lecture 14: Data Transport Networks: Local Area Network

23

TOKEN PASSING PROCEDURE

Page 24: Lecture 14: Data Transport Networks: Local Area Network

24

ETHERNET

Device must conform to the Ethernet protocols

No network control concept Baseband

Half duplex with CSMA/CD hub Full duplex with LAN switch

Up to 100 Mb/sec using coax, twisted pair or fiber

10 Base-T or 10 Base-F 100 Base-T (Fast Ethernet)

Up to 10 km length Broadcast capacity Low cost

Page 25: Lecture 14: Data Transport Networks: Local Area Network

25

ETHERNET FRAME

Page 26: Lecture 14: Data Transport Networks: Local Area Network

26

THE ETHERNET FRAME

Preamble and Start-of-frame Delimiter 62 alternating ones and zeroes followed by two ones

Destination and Source Addresses 48-bit address for receiver and sender

Length/type Usually identifies the protocol type (e.g. IP), it can also

contain the length of the frame when used with IEEE 802.2

Data Contains 46-1500 bytes of data

Frame Check Sequence (FCS) Contains the 4-byte Cyclical Redundancy Check result

Page 27: Lecture 14: Data Transport Networks: Local Area Network

27

HIGHER SPEED LANs

Gigabit Ethernet 100 VG-Anylan (IEEE 802.12)-demand

priority FDDI-Fiber Distributed Data Interface

Redundant rings, IEEE 802.5 CDDI-Copper Distributed Data Interface HSTR-High Speed Token Ring


Recommended