Data Communications

58
Chapter 7: Local Area Networks: The Basics Data Communications and Computer Networks: A Business User’s Approach Third Edition

description

 

Transcript of Data Communications

Page 1: Data Communications

Chapter 7:

Local Area Networks: The Basics

Data Communications andComputer Networks: A Business User’s ApproachThird Edition

Page 2: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 2

Objectives

•State the definition of a local area network

•List the primary function, activities, and application areas of a local area network

•Cite the advantages and disadvantages of local area networks

•Identify the physical and logical topologies of local area networks

Page 3: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 3

Objectives (continued)

•Cite the characteristics of wireless local area networks and their medium access control protocols

•Specify the different medium access control techniques

•Recognize the different IEEE 802 frame formats

•Describe the common local area network systems

Page 4: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 4

Introduction

•Local area network - communication network

•Interconnects a variety of data communicating devices within a small geographic area

•Broadcasts data at high data transfer rates with very low error rates

•Since the local area network first appeared in the 1970s, its use has become widespread in commercial and academic environments

Page 5: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 5

Primary Function of a LAN

•To provide access to hardware and software resources that will allow users to perform one or more of the following activities:

•File serving - large storage disk drive acts as a central storage repository

•Print serving - Providing authorization to access a particular printer, accept and queue print jobs, and user access to print queue to perform administrative duties

Page 6: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 6

Primary Function of a LAN (continued)

•Video transfers - High speed LANs are capable of supporting video image and live video transfers

•Manufacturing support - LANs can support manufacturing and industrial environments

•Academic support – In classrooms, labs, and wireless

•E-mail support

•Interconnection between multiple systems

Page 7: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 7

Advantages of Local Area Networks

•Ability to share hardware and software resources

•Individual workstation might survive network failure

•Component and system evolution are possible

•Support for heterogeneous forms of hardware and software

•Access to other LANs and WANs (Figure 7-1)

•Private ownership

•Secure transfers at high speeds with low error rates

Page 8: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 8

Advantages of Local Area Networks (continued)

Page 9: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 9

Disadvantages of Local Area Networks

•Equipment and support can be costly•Level of maintenance continues to grow•Private ownership?•Some types of hardware may not interoperate•Just because a LAN can support two different kinds of packages does not mean their data can interchange easily•A LAN is only as strong as it weakest link, and there are many links

Page 10: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 10

Basic Local Area Network Topologies

Local area networks are interconnected using one of four basic configurations:

1. Bus/tree

2. Star-wired bus

3. Star-wired ring

4. Wireless

Page 11: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 11

Bus/Tree Topology

•The original topology

•Workstation has a network interface card (NIC) that attaches to the bus (a coaxial cable) via a tap

•Data can be transferred using either

•Baseband digital signals

•Broadband analog signals

Page 12: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 12

Bus/Tree Topology (continued)

Page 13: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 13

Bus/Tree Topology (continued)

Page 14: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 14

Bus/Tree Topology (continued)

•Baseband signals •Bidirectional

•More outward transmitting from the workstation in both directions

•Broadband signals •Usually uni-directional

•Transmit in only one direction special wiring considerations are necessary

•Buses can be split and joined, creating trees

Page 15: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 15

Bus/Tree Topology (continued)

Page 16: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 16

Bus/Tree Topology (continued)

Page 17: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 17

Star-Wired Bus Topology

•Logically operates as a bus - physically looks like a star

•Star design based on hub

•All workstations attach to hub

•Unshielded twisted pair usually used to connect workstation to hub•Hub takes incoming signal and immediately broadcasts it out all connected links•Hubs can be interconnected to extend network size

Page 18: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 18

Star-Wired Bus Topology (continued)

Page 19: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 19

Star-Wired Bus Topology (continued)

Page 20: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 20

Star-Wired Bus Topology (continued)

•Modular connectors and twisted pair make installation and maintenance of star-wired bus better than standard bus

•Hubs can be interconnected with twisted pair, coaxial cable, or fiber optic cable

•Biggest disadvantage: when one station talks, everyone

hears it called a shared network

•All devices are sharing the network medium

Page 21: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 21

Star-Wired Ring Topology

•Logically operates as a ring but physically appears as a star

•Based on MAU (multi-station access unit) which functions similarly to a hub

•Where a hub immediately broadcasts all incoming signals onto all connected links, the MAU passes the signal around in a ring fashion

•Like hubs, MAUs can be interconnected to increase network size

Page 22: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 22

Star-Wired Ring Topology (continued)

Page 23: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 23

Star-Wired Ring Topology (continued)

Page 24: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 24

Wireless LANs

•Not really a specific topology

•Workstation in wireless LAN can be anywhere as long as within transmitting distance to access point

•Several versions of IEEE 802.11 standard defines various forms of wireless LAN connections

•Workstations reside within a basic service set

•Multiple basic service sets create an extended service set

Page 25: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 25

Wireless LANs (continued)

•Two basic components necessary: •Client Radio - usually PC card with integrated antenna installed in a laptop or workstation

•Access Point (AP) - Ethernet port plus transceiver

•AP acts as bridge between wired and wireless networks

•Can perform basic routing functions

•Workstations with client radio cards reside within a basic service set•Multiple basic service sets create extended service set

Page 26: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 26

Wireless LANs (continued)

Page 27: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 27

Wireless LANs (continued)

Page 28: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 28

Wireless LANs (continued)

•IEEE 802.11 – The original wireless standard, capable of transmitting data at 2 Mbps

•IEEE 802.11b – The second wireless standard, capable of transmitting data at 11 Mbps

•In actual tests, 11 Mbps 802.11b devices managed 5.5 Mbps (from July 2000 test by Network Computing)

Page 29: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 29

Wireless LANs (continued)

•With directional antennae designed for point-to-point transmission (rare), 802.11b can transmit for more than 10 miles

•With an omni-directional antenna on a typical AP, range may drop to as little as 100 feet

Page 30: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 30

Wireless LANs (continued)

•IEEE 802.11a – One of the more recent standards, capable of transmitting data at 54 Mbps using 5 GHz frequency range

•IEEE 802.11g – The other recent standard, also capable of transmitting data at 54 Mbps but using the same frequencies as 802.11b (2.4 GHz)

•Backwards compatible with 802.11b

Page 31: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 31

Wireless LANs (continued)

•HiperLAN/2 (European standard, 54 Mbps in 5 GHz band)•To provide security, most systems use either Wired Equivalent Privacy (WEP)

•Provides either 40- or 128-bit key protection

•Or a more advanced standard such as WPA (more on security in Chapter Thirteen)•Wireless LANs may also be configured without access point

•These configurations are called “ad-hoc”

Page 32: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 32

Wireless LANs (continued)

Page 33: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 33

Comparison of Bus, Star-Wired Bus, Star-Wired Ring, and Wireless Topologies

Page 34: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 34

Medium Access Control Protocols

• How does a workstation get its data onto the LAN medium?

• Medium access control protocol - software that allows workstations to “take turns” at transmitting data

• Two basic categories:

1. Contention-based protocols

2. Round robin protocols

Page 35: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 35

Contention-Based Protocols

•Essentially first come first served

•Most common example:

•Carrier sense multiple access with collision detection (CSMA/CD)

•If no one is transmitting, a workstation can transmit

•If someone else is transmitting, workstation “backs off” and waits

Page 36: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 36

Contention-Based Protocols (continued)

•If two workstations transmit at the same time •Collision occurs

•When the two workstations hear the collision•Stop transmitting immediately

•Each workstation backs off a random amount of time and tries again

•Hopefully, both workstations do not try again at the exact same time

•CSMA/CD: example of non-deterministic protocol

Page 37: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 37

Contention-Based Protocols (continued)

Page 38: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 38

Round Robin Protocols

•Each workstation takes turn transmitting turn is passed around the network from workstation to workstation•Most common example is token ring LAN:

•Software token is passed from workstation to workstation

•Token ring: example of deterministic protocol•Token ring more complex than CSMA/CD. What happens if token is lost? Duplicated? Hogged?•Token ring LANs are losing the battle with CSMA/CD LANs

Page 39: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 39

Token Ring

Page 40: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 40

IEEE 802

• To better support local area networks, data link layer of the OSI model was broken into two sublayers:1. Logical link control sublayer

2. Medium access control sublayer

• Medium access control sublayer defines the frame layout • More closely tied to specific medium at physical layer

• Thus, when people refer to LANs they often refer to its MAC sublayer name, such as 10BaseT

Page 41: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 41

IEEE 802

Page 42: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 42

IEEE 802.3 and 802.5 Frame Formats

•IEEE 802 suite of protocols defines frame formats for CSMA/CD (IEEE 802.3) and token ring (IEEE 802.5)

•Each frame format describes how data package is formed

•Note how the two frames are different

•If a CSMA/CD network connects to a token ring network, frames have to be converted from one to another

Page 43: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 43

IEEE 802.3 and 802.5 Frame Formats

Page 44: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 44

IEEE 802.3 and 802.5 Frame Formats

Page 45: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 45

Local Area Network Systems

•Ethernet or CSMA/CD

•Most common form of LAN today

•Star-wired bus is most common topology but bus topology also available

•Ethernet comes in many forms depending on:

•Medium used

•Transmission speed

•Technology

Page 46: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 46

Ethernet

•Originally, CSMA/CD was 10 Mbps

•Then 100 Mbps was introduced

•Most NICs sold today are 10/100 Mbps

•Then 1000 Mbps (1 Gbps) was introduced

•10 Gbps is now beginning to appear

Page 47: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 47

Ethernet (continued)

•1000 Mbps introduces a few interesting wrinkles:

•Transmission is full duplex (separate transmit and receive) no collisions

•Prioritization is possible using 802.1p protocol

•Topology can be star or mesh (for trunks)

Page 48: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 48

Ethernet (continued)

•Cabling can be either UTP or optical

•10 Gbps Ethernet may not work over UTP due to radio frequency interference

•Where 10 Mbps Ethernet has less than 30% utilization due to collisions

•1000 Mbps is limited only by traffic queueing

•Distance with 10 Mbps is limited by CSMA/CD propagation time

•1000 Mbps limited only by media

Page 49: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 49

Ethernet (continued)

Page 50: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 50

IBM Token Ring

•Deterministic LAN offered at speeds of 4, 16 and 100 Mbps

•Very good throughput under heavy loads

•More expensive components than CSMA/CD

•Losing ground quickly to CSMA/CD

•May be extinct soon

Page 51: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 51

Fiber Distributed Data Interface (FDDI)

•Based on token ring design using 100 Mbps fiber connections

•Allows for two concentric rings

•Inner ring can support data travel in opposite direction or work as backup

•Token is attached to outgoing packet, rather than waiting for outgoing packet to circle entire ring

Page 52: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 52

Fiber Distributed Data Interface (FDDI)

Page 53: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 53

LANs In Action: A Small Office Solution

•What type of system will interconnect twenty workstations in one room and fifteen workstations in another room to a central server, offering:

•Internal e-mail

•A database that contains all customer information

• High quality printer access

Page 54: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 54

LANs in Action: A Small Office Solution (continued)

Page 55: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 55

LANs in Action: A Small Office Solution (continued)

Page 56: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 56

LANs in Action: A Home Office Solution

•What if you have two computers at home and want both to share a printer and connection to the Internet?

•Some type of Small Office/Home Office (SOHO) solution might solve this problem

•LAN with 2- or 3-port hub, connecting cables, and software

•In some models, hub also acts as a router to the Internet

Page 57: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 57

LANs in Action: A Home Office Solution (continued)

Page 58: Data Communications

Data Communications & Computer Networks: A Business User's Approach, Third Edition 58

Summary

• Local area networks

• Medium access control techniques

• IEEE 802 frame formats