Chapter 11 Local Area Networks Information Technology in Theory By Pelin Aksoy and Laura DeNardis.

Post on 14-Dec-2015

223 views 1 download

Tags:

Transcript of Chapter 11 Local Area Networks Information Technology in Theory By Pelin Aksoy and Laura DeNardis.

Chapter 11Local Area Networks

Information Technology in Theory

By Pelin Aksoy and Laura DeNardis

2

Objectives

• Gain familiarity with the most popular types of local area networks (LANs), with a focus on Ethernet

• Understand LAN design characteristics, including topology, access mechanism, physical transmission media, and equipment

Information Technology in Theory

3

Objectives (continued)

• Explain what a frame format is and what purpose it serves in LANs

• Define the functions of LAN operating systems• Understand the technical architecture of Wi-Fi

Information Technology in Theory

4

Network Categories

• Local area networks (LANs) • Wide area networks (WANs)• Personal area networks (PANs)• Metropolitan area networks (MANs) • Campus area networks (CANs)

• Storage area networks (SANs)

Information Technology in Theory

5

Defining LANs

• LAN—a network that spans a confined geographical distance, such as a building or home

• WAN—a network that spans a larger geographical area, such as a city, nation, or the world at large

Information Technology in Theory

6

Resources Accessed via LANs

Information Technology in Theory

7

LAN Design Characteristics

• Physical topology • Logical topology• Access control and LAN switching• LAN physical media and equipment• LAN operating systems

Information Technology in Theory

8

Physical Topology

• A LAN’s physical topology refers to how the multiple devices (often called network nodes) are physically connected to each other– Star– Ring– Star-Wired Ring– Bus

Information Technology in Theory

9

Star Topology

Information Technology in Theory

10

Ring Topology

Information Technology in Theory

11

Star-Wired Ring Topology

Information Technology in Theory

12

Bus Topology

Information Technology in Theory

13

Logical Topology

• While the physical topology describes how network nodes are connected within the LAN, the logical topology dictates how information flows among the nodes

• Common logical topologies for LANs– Bus– Ring– Star

Information Technology in Theory

14

Access Control and LAN Switching

• Access control mechanism – A procedure that specifies and enforces rules

for when each device may transmit or receive information over a network

– Token passing– CSMA/CD– CSMA/CA

Information Technology in Theory

15

Token Passing

• Uses a deterministic access method • Each node communicates only during its specified

turn• A token, which is just a signal that comprises a

specific bit pattern, is transmitted from one device to the next in a sequential pattern

• When a device receives this signal, it “possesses the token,” meaning it may transmit information

Information Technology in Theory

16

CSMA/CD

• CSMA/CD is nondeterministic– Any device may transmit information at any given

moment, provided that no signals are already being transmitted over the LAN

• A node preparing to transmit information first “listens” to the network to determine whether transmissions are occurring

• The node starts to transmit only if it detects that the network is free of transmissions

Information Technology in Theory

17

CSMA/CA

• In some LANs, such as wireless LANs, collisions cannot be detected

• Using CSMA/CA, a node that has information to transmit first listens to the network to see if another node is transmitting

• If the network is idle, it sends a “request to send” (RTS) packet to other nodes

• The other nodes can then send a “clear to send” (CTS) packet, alerting the transmitting node that it is free to send data

Information Technology in Theory

18

Gigabit LAN Switches

Information Technology in Theory

19

LAN Switching

Information Technology in Theory

20

LAN Physical Media and Equipment

• Network interface controller• Transmission media • Wiring hubs• High-speed switches• Routers• Servers

Information Technology in Theory

21

Network Interface Controller

• Built into the computer’s motherboard• Basically a small card with a couple of integrated

circuits and other electronic components • Provides the physical interface to a network

medium or wireless LAN and supports an addressing system that is critical to the LAN’s operation

Information Technology in Theory

22

Transmission Media

• The most common LAN transmission media are free space, fiber-optic cable, twisted pair, or some combination

• Many LANs connect devices using a combination of twisted pair cable and fiber-optic cable

• WLANs use radio frequency communications rather than fiber-optic cable or copper cable

Information Technology in Theory

23

LAN Operating Systems

• Software• Sometimes called a network operating system

(NOS) or a server operating system• Some computer operating systems, like UNIX,

Linux, and Windows NT have built-in networking features

• Other software, like Novell’s Netware, has specifically been designed as a LAN operating system

Information Technology in Theory

24

LAN Operating Systems (continued)

• Manage and control networked access to LAN resources such as printers, files, applications, and messaging services

• Provide security by managing user directories, monitoring remote LAN access, and incorporating encryption and other security features

• Provide network management, including diagnostic tools

Information Technology in Theory

25

LAN Types

• Ethernet• Token ring• FDDI• Wireless LANs

Information Technology in Theory

26

LAN Characteristics• Shared or switched access method• Topology (ring, bus, star)• Medium (twisted pair, free space, fiber)• Speed, distance• Cost• Performance, mobility• Manageability• Number of devices supported• Frame format

Information Technology in Theory

27

Ethernet LANs

• Originally developed in 1976 by Bob Metcalfe at Xerox’s Palo Alto Research Center (PARC)

• IEEE 802.3 standard • Commonly implemented over free space, twisted

pair cable, or fiber-optic cable

Information Technology in Theory

28

10/100-Mbps Switch

Information Technology in Theory

29

Ethernet Frame Format

Information Technology in Theory

30

Token Ring and FDDI

• Not as popular as Ethernet• Token Ring

– Ring configuration

– Token passing access method

• FDDI– Dual ring configuration

– Fiber

– Token passing access method

Information Technology in Theory

31

Token Structure

Information Technology in Theory

32

Token Ring Network

Information Technology in Theory

33

Token Ring Frame Format

Information Technology in Theory

34

FDDI LAN

Information Technology in Theory

35

Wireless LANs

• WLAN: wireless local area network• Use radio-frequency signals, rather than light or

electricity over cables, to connect users within a limited geographical range

Information Technology in Theory

36

Wi-Fi

• Predominant WLAN implementation is known as Wi-Fi (wireless fidelity)

• A catchy designation indicating that a product complies with the IEEE’s 802.11 wireless Ethernet specifications

• Uses a carrier radio frequency in the unlicensed 2.4-GHz or 5-GHz range

Information Technology in Theory

37

WLAN Standards

• IEEE 802.11a—Wireless technology operating at a frequency of 5 GHz with a maximum data rate of 54 Mbps

• IEEE 802.11b—Wi-Fi wireless technology operating at a frequency of 2.4 GHz with a maximum data rate of 11 Mbps

• IEEE 802.11g—Backward compatible with 802.11b, operating at a frequency of 2.4 GHz and a maximum data rate of 54 Mbps

Information Technology in Theory

38

WLAN Standards (continued)

• IEEE 802.11i—Standards for wireless security mechanisms

• IEEE 802.15—Known as WPAN, or wireless personal area networks

• IEEE 802.16—WiMAX, an emerging technology that seeks to provide high-speed wireless access over much longer distances than implementations of the IEEE 802.11 standards

Information Technology in Theory

39

Personal WLANs

• A home-based wireless LAN uses a wireless access point (WAP) – A device that connects wireless computers to a wired

network to enable high-speed Internet access and other services

• Laptops with an installed wireless adapter then communicate with the WAP over the 2.4-GHz or 5-GHz frequency range

Information Technology in Theory

40

Home LAN Implementation

Information Technology in Theory

41

Business WLAN Implementation

Information Technology in Theory

42

WLAN Advantages

• Mobility• Flexibility

Information Technology in Theory

43

WLAN Disadvantages

• Security• Range limitations• Bandwidth

• Manageability

Information Technology in Theory

44

Municipal Broadband Wireless

• Some cities and municipalities offer public Internet access via Wi-Fi network access points in parks, libraries, and other public locations

• These networks are driven by economic, political, and technical factors

Information Technology in Theory

45

Summary

• A network shares information using a set of hardware and software designed to interconnect multiple computers, communication devices, and other types of devices

• Categorizing networks is somewhat arbitrary, but in the networking industry, the most common categories are local area networks (LANs) and wide area networks (WANs)

Information Technology in Theory

46

Summary (continued)

• LANs are networks that span a relatively small geographical area, such as the floor of an office or a house; LANs interconnect local computing resources and provide WAN access

• WANs are networks that span a large geographical area such as a city, a country, or the world at large– The Internet is the most important example of a WAN– Chapter 12 discusses WANs in detail

Information Technology in Theory

47

Summary (continued)

• Some design characteristics of LANs include topology (such as bus, star, and ring), access method (such as CSMA/CD, CSMA/CA, or token passing), and type of medium (wireless, fiber, twisted pair)

• Ethernet, including switched Ethernet, has become the most prevalent type of local area network

• Some wireless local area networks (WLANs) include the IEEE 802.11b and IEEE 80211g standards, more commonly called Wi-Fi– WLANs have great advantages, including mobility and

flexibility, but they also present security challenges

Information Technology in Theory