Chapter 11 Local Area Networks Information Technology in Theory By Pelin Aksoy and Laura DeNardis.
-
Upload
anthony-fisher -
Category
Documents
-
view
221 -
download
1
Transcript of Chapter 11 Local Area Networks Information Technology in Theory By Pelin Aksoy and Laura DeNardis.
Chapter 11Local Area Networks
Information Technology in Theory
By Pelin Aksoy and Laura DeNardis
2
Objectives
• Gain familiarity with the most popular types of local area networks (LANs), with a focus on Ethernet
• Understand LAN design characteristics, including topology, access mechanism, physical transmission media, and equipment
Information Technology in Theory
3
Objectives (continued)
• Explain what a frame format is and what purpose it serves in LANs
• Define the functions of LAN operating systems• Understand the technical architecture of Wi-Fi
Information Technology in Theory
4
Network Categories
• Local area networks (LANs) • Wide area networks (WANs)• Personal area networks (PANs)• Metropolitan area networks (MANs) • Campus area networks (CANs)
• Storage area networks (SANs)
Information Technology in Theory
5
Defining LANs
• LAN—a network that spans a confined geographical distance, such as a building or home
• WAN—a network that spans a larger geographical area, such as a city, nation, or the world at large
Information Technology in Theory
6
Resources Accessed via LANs
Information Technology in Theory
7
LAN Design Characteristics
• Physical topology • Logical topology• Access control and LAN switching• LAN physical media and equipment• LAN operating systems
Information Technology in Theory
8
Physical Topology
• A LAN’s physical topology refers to how the multiple devices (often called network nodes) are physically connected to each other– Star– Ring– Star-Wired Ring– Bus
Information Technology in Theory
9
Star Topology
Information Technology in Theory
10
Ring Topology
Information Technology in Theory
11
Star-Wired Ring Topology
Information Technology in Theory
12
Bus Topology
Information Technology in Theory
13
Logical Topology
• While the physical topology describes how network nodes are connected within the LAN, the logical topology dictates how information flows among the nodes
• Common logical topologies for LANs– Bus– Ring– Star
Information Technology in Theory
14
Access Control and LAN Switching
• Access control mechanism – A procedure that specifies and enforces rules
for when each device may transmit or receive information over a network
– Token passing– CSMA/CD– CSMA/CA
Information Technology in Theory
15
Token Passing
• Uses a deterministic access method • Each node communicates only during its specified
turn• A token, which is just a signal that comprises a
specific bit pattern, is transmitted from one device to the next in a sequential pattern
• When a device receives this signal, it “possesses the token,” meaning it may transmit information
Information Technology in Theory
16
CSMA/CD
• CSMA/CD is nondeterministic– Any device may transmit information at any given
moment, provided that no signals are already being transmitted over the LAN
• A node preparing to transmit information first “listens” to the network to determine whether transmissions are occurring
• The node starts to transmit only if it detects that the network is free of transmissions
Information Technology in Theory
17
CSMA/CA
• In some LANs, such as wireless LANs, collisions cannot be detected
• Using CSMA/CA, a node that has information to transmit first listens to the network to see if another node is transmitting
• If the network is idle, it sends a “request to send” (RTS) packet to other nodes
• The other nodes can then send a “clear to send” (CTS) packet, alerting the transmitting node that it is free to send data
Information Technology in Theory
18
Gigabit LAN Switches
Information Technology in Theory
19
LAN Switching
Information Technology in Theory
20
LAN Physical Media and Equipment
• Network interface controller• Transmission media • Wiring hubs• High-speed switches• Routers• Servers
Information Technology in Theory
21
Network Interface Controller
• Built into the computer’s motherboard• Basically a small card with a couple of integrated
circuits and other electronic components • Provides the physical interface to a network
medium or wireless LAN and supports an addressing system that is critical to the LAN’s operation
Information Technology in Theory
22
Transmission Media
• The most common LAN transmission media are free space, fiber-optic cable, twisted pair, or some combination
• Many LANs connect devices using a combination of twisted pair cable and fiber-optic cable
• WLANs use radio frequency communications rather than fiber-optic cable or copper cable
Information Technology in Theory
23
LAN Operating Systems
• Software• Sometimes called a network operating system
(NOS) or a server operating system• Some computer operating systems, like UNIX,
Linux, and Windows NT have built-in networking features
• Other software, like Novell’s Netware, has specifically been designed as a LAN operating system
Information Technology in Theory
24
LAN Operating Systems (continued)
• Manage and control networked access to LAN resources such as printers, files, applications, and messaging services
• Provide security by managing user directories, monitoring remote LAN access, and incorporating encryption and other security features
• Provide network management, including diagnostic tools
Information Technology in Theory
25
LAN Types
• Ethernet• Token ring• FDDI• Wireless LANs
Information Technology in Theory
26
LAN Characteristics• Shared or switched access method• Topology (ring, bus, star)• Medium (twisted pair, free space, fiber)• Speed, distance• Cost• Performance, mobility• Manageability• Number of devices supported• Frame format
Information Technology in Theory
27
Ethernet LANs
• Originally developed in 1976 by Bob Metcalfe at Xerox’s Palo Alto Research Center (PARC)
• IEEE 802.3 standard • Commonly implemented over free space, twisted
pair cable, or fiber-optic cable
Information Technology in Theory
28
10/100-Mbps Switch
Information Technology in Theory
29
Ethernet Frame Format
Information Technology in Theory
30
Token Ring and FDDI
• Not as popular as Ethernet• Token Ring
– Ring configuration
– Token passing access method
• FDDI– Dual ring configuration
– Fiber
– Token passing access method
Information Technology in Theory
31
Token Structure
Information Technology in Theory
32
Token Ring Network
Information Technology in Theory
33
Token Ring Frame Format
Information Technology in Theory
34
FDDI LAN
Information Technology in Theory
35
Wireless LANs
• WLAN: wireless local area network• Use radio-frequency signals, rather than light or
electricity over cables, to connect users within a limited geographical range
Information Technology in Theory
36
Wi-Fi
• Predominant WLAN implementation is known as Wi-Fi (wireless fidelity)
• A catchy designation indicating that a product complies with the IEEE’s 802.11 wireless Ethernet specifications
• Uses a carrier radio frequency in the unlicensed 2.4-GHz or 5-GHz range
Information Technology in Theory
37
WLAN Standards
• IEEE 802.11a—Wireless technology operating at a frequency of 5 GHz with a maximum data rate of 54 Mbps
• IEEE 802.11b—Wi-Fi wireless technology operating at a frequency of 2.4 GHz with a maximum data rate of 11 Mbps
• IEEE 802.11g—Backward compatible with 802.11b, operating at a frequency of 2.4 GHz and a maximum data rate of 54 Mbps
Information Technology in Theory
38
WLAN Standards (continued)
• IEEE 802.11i—Standards for wireless security mechanisms
• IEEE 802.15—Known as WPAN, or wireless personal area networks
• IEEE 802.16—WiMAX, an emerging technology that seeks to provide high-speed wireless access over much longer distances than implementations of the IEEE 802.11 standards
Information Technology in Theory
39
Personal WLANs
• A home-based wireless LAN uses a wireless access point (WAP) – A device that connects wireless computers to a wired
network to enable high-speed Internet access and other services
• Laptops with an installed wireless adapter then communicate with the WAP over the 2.4-GHz or 5-GHz frequency range
Information Technology in Theory
40
Home LAN Implementation
Information Technology in Theory
41
Business WLAN Implementation
Information Technology in Theory
42
WLAN Advantages
• Mobility• Flexibility
Information Technology in Theory
43
WLAN Disadvantages
• Security• Range limitations• Bandwidth
• Manageability
Information Technology in Theory
44
Municipal Broadband Wireless
• Some cities and municipalities offer public Internet access via Wi-Fi network access points in parks, libraries, and other public locations
• These networks are driven by economic, political, and technical factors
Information Technology in Theory
45
Summary
• A network shares information using a set of hardware and software designed to interconnect multiple computers, communication devices, and other types of devices
• Categorizing networks is somewhat arbitrary, but in the networking industry, the most common categories are local area networks (LANs) and wide area networks (WANs)
Information Technology in Theory
46
Summary (continued)
• LANs are networks that span a relatively small geographical area, such as the floor of an office or a house; LANs interconnect local computing resources and provide WAN access
• WANs are networks that span a large geographical area such as a city, a country, or the world at large– The Internet is the most important example of a WAN– Chapter 12 discusses WANs in detail
Information Technology in Theory
47
Summary (continued)
• Some design characteristics of LANs include topology (such as bus, star, and ring), access method (such as CSMA/CD, CSMA/CA, or token passing), and type of medium (wireless, fiber, twisted pair)
• Ethernet, including switched Ethernet, has become the most prevalent type of local area network
• Some wireless local area networks (WLANs) include the IEEE 802.11b and IEEE 80211g standards, more commonly called Wi-Fi– WLANs have great advantages, including mobility and
flexibility, but they also present security challenges
Information Technology in Theory