1 / 27

Data Transport Network - Local Area Network

Data Transport Network - Local Area Network. Rong Wang CGS3285 Spring2004. Local Area Networks. LAN topologies Multiple Access Methods Random Access Controlled Access Channelization The Ethernet frame. BASIC LAN TOPOLOGIES. APPEARANCES CAN BE DECEIVING!. FIGURE 8-4: LAN TOPOLOGIES.

dunne
Download Presentation

Data Transport Network - Local Area Network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Data Transport Network- Local Area Network Rong Wang CGS3285 Spring2004

  2. Local Area Networks • LAN topologies • Multiple Access Methods • Random Access • Controlled Access • Channelization • The Ethernet frame

  3. BASIC LAN TOPOLOGIES

  4. APPEARANCES CAN BE DECEIVING!

  5. FIGURE 8-4: LAN TOPOLOGIES

  6. Earliest LANs used long coaxial cables (Bus, Ring) Hub Implements a logical bus or ring topology within a single device. Switch Device that creates a true star network. Data is delivered to the appropriate user based on the destination address. No other devices on the network hear or interfere with the data transmission. Connections to hubs/switches usually over twisted pair in a physical star configuration. HUB vs. SWITCH

  7. LAN ACCESS METHODS • Access Method - allows LAN users to transmit data and controls access the physical media. Different types of access methods exist including: • Switching (becoming cheaper & more popular) • Creates full duplex path between sender and receiver • Central Control (not used often) • type of polling & selecting • Multiplexing (Broadband) • Frequency Division • Time Division

  8. LAN ACCESS METHODS (cont.) • Access Method Types (cont.) • Token Passing (Token Ring) • Contention (Baseband) • Random Access (not used often) *** • CSMA - Carrier Sense Multiple Access *** • Collision Avoidance • CSMA/CD (Ethernet) • Collision Avoidance & Detection *** Requires acknowledgement from receiver

  9. MULTIPLE ACCESS METHODS

  10. RANDOM OF ACCESS • Each station has the right to the medium without being controlled by any other station. • Collision • Confliction caused by multiple stations that try to send data on medium simultaneously • Frame swill be either destroyed or modified

  11. ALOHA NETWORK • Multiple access (MA) • A base station is used as central controller • Every station that needs to send a frame to another station first sends it to the base station • Base station receives the frames and relays it to the intended destination

  12. PROCEDURE OF ALOHA PROTOCOL • Rules • Multiple access: any station sends a frame when it has a frame to send • Acknowledgement: after sending the frame, the station waits for an acknowledgement. If it does not receive an acknowledgement during the allotted time, it assumes that the frame is lots and tries to send after a random amount of time

  13. COLLISION IN CSMA • Carrier sense multiple access (CSMA) • Each station first listen to the medium, before sending • Reduce the possibility of collision but can not eliminate it: what if multiple stations detected that the medium is idle and then send data at the same time?

  14. PERSISTENCE STRATEGY • None persistent strategy • If line is idle, the station sends immediately, if the line is not idle, the station waits a random period of time and then sense the line again. • Persistent strategy • 1 persistent method: if the stations finds the line idle, it sends its frame immediately (with a probability of 1). • P persistent method: if the line is idle, the station may or may not send, it sends with probability p and refrains from sending with probability 1-p.

  15. CSMA/CD • Carrier sense multiple access with collision detection

  16. CSMA-CA • CSMA with Collision Avoidance • IFG: interframe gap

  17. CONTROL ACCESS • Reservation • Polling • Token passing

  18. RESERVATION ACCESS METHOD • A station that needs to make a reservation before sending data • A reservation frame precedes the data frames sent in a each time interval, which consists of minislot. Each of the slot is assigned to a station in the system.

  19. POLLING AND SELECTING • Polling and Selecting works with topologies in which one device is designed as a primary station and the other devices are secondary stations. • Primary station controls the link. All data exchanges must be made through the primary device even when the ultimate destination is a second device.

  20. SELECTING • In select mode, when a primary device has something to send, it sends a select (SEL) frame to check if the secondary is ready to receive the data.

  21. POLLING • Used by the primary divide to solicit transmissions from the secondary device • When the primary is ready to receive data, it must ask(poll) each device in turn if it has anything to send • If a station got polling message and does not have data to send, it sends back response with negative (NAK) frame and the primary station sends polling message to the next station • If a station has data to send, it returns the positive (data frame) and primary returns a acknowledgement (ACK frame) to verify its receipt.

  22. TOKEN PASSING • Stations are arranged around a ring, each station has a predecessor and a successor. • Data comes from the predecessor and going to the successor. • A station is authorized to send data when it receives a special frame called a token • If the station does not have data to send, it passes the token to its successor station. • If the station has data to send, it sends the frames and finally release the token to be used by the successor station.

  23. TOKEN PASSING PROCEDURE

  24. ETHERNET • Device must conform to the Ethernet protocols • No network control concept • Baseband • Half duplex with CSMA/CD hub • Full duplex with LAN switch • Up to 100 Mb/sec using coax, twisted pair or fiber • 10 Base-T or 10 Base-F • 100 Base-T (Fast Ethernet) • Up to 10 km length • Broadcast capacity • Low cost

  25. ETHERNET FRAME

  26. THE ETHERNET FRAME • Preamble and Start-of-frame Delimiter • 62 alternating ones and zeroes followed by two ones • Destination and Source Addresses • 48-bit address for receiver and sender • Length/type • Usually identifies the protocol type (e.g. IP), it can also contain the length of the frame when used with IEEE 802.2 • Data • Contains 46-1500 bytes of data • Frame Check Sequence (FCS) • Contains the 4-byte Cyclical Redundancy Check result

  27. HIGHER SPEED LANs • Gigabit Ethernet • 100 VG-Anylan (IEEE 802.12)-demand priority • FDDI-Fiber Distributed Data Interface • Redundant rings, IEEE 802.5 • CDDI-Copper Distributed Data Interface • HSTR-High Speed Token Ring

More Related