html5-img
1 / 68

Guide to Networking Essentials Fifth Edition

Guide to Networking Essentials Fifth Edition . Chapter 7 Network Architectures. Objectives. Compare and contrast media access methods used in network architectures Describe the operation of Ethernet Differentiate between Ethernet standards and speeds

zayit
Download Presentation

Guide to Networking Essentials Fifth Edition

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Guide to Networking EssentialsFifth Edition Chapter 7 Network Architectures

  2. Objectives • Compare and contrast media access methods used in network architectures • Describe the operation of Ethernet • Differentiate between Ethernet standards and speeds • Explain the four Ethernet frame types and how they are used Guide to Networking Essentials, Fifth Edition

  3. Objectives (continued) • Describe the token ring architecture and its components • Describe the AppleTalk network architecture • Explain the function of Fiber Distributed Data Interface • Describe other LAN and WAN architectures and their role in today’s networks Guide to Networking Essentials, Fifth Edition

  4. Putting Data on the Cable: Access Methods • Given that network architectures communicate in a number of different ways, some factors in network communications must be considered • How computers put data on the cable • How they ensure that the data reaches its destination undamaged Guide to Networking Essentials, Fifth Edition

  5. Function of Access Methods • The way in which computers attached to a network share the cable must be defined • A collision results from two or more devices sending a signal along the same channel at the same time • Splitting data in small chunks helps prevent collisions • Channel access methods specify when computers can access the cable or data channel • Ensure that data reaches destination by preventing computers from sending messages that might collide • Every computer on a network must use the same access method Guide to Networking Essentials, Fifth Edition

  6. Major Access Methods • Channel access is handled at the MAC sublayer of the Data Link layer in the OSI model • Five major types of channel access • Contention • Switching • Token passing • Demand priority • Polling Guide to Networking Essentials, Fifth Edition

  7. Contention • In early networks based on contention, computers sent data whenever they had data to send • As networks grow, outgoing messages collide more frequently, must be sent again, and then collide again • To organize contention-based networks, two carrier access methods were created • CSMA/CD • CSMA/CA Guide to Networking Essentials, Fifth Edition

  8. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Guide to Networking Essentials, Fifth Edition

  9. Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) • When the computer senses that no other computer is using the network, it signals its intent to transmit • Other computers with data to send must wait when they receive the “intent-to-transmit” signal and send their “intent-to-transmit” only when channel is free • The overhead created by intent-to-transmit packets reduces network speed significantly • Used in wireless LANs with an access point • Wireless NIC tells access point its intents to transmit • Access point hears transmissions from all devices, so it can determine whether it’s okay to transmit Guide to Networking Essentials, Fifth Edition

  10. Switching • Switching: nodes are interconnected through a a switch, which controls access to the media • Contention occurs only when multiple senders ask to reach the same receiver simultaneously or when the simultaneous transmission requests exceed the switch’s capability to handle multiple connections • Advantages: fairer, centralized management (enables QoS), switch can have connection ports that operate at different speeds • Disadvantage: higher cost Guide to Networking Essentials, Fifth Edition

  11. Token Passing Guide to Networking Essentials, Fifth Edition

  12. Demand Priority • Demand priority: channel access method used solely by the 100VG-AnyLAN 100 Mbps Ethernet standard (IEEE 802.12) • 100VG-AnyLAN runs on a star bus topology • Intelligent hubs control access to the network • Hub searches all connections in a round-robin fashion • When an end node has data to send, it transmits a demand signal to the hub • The hub then sends an acknowledgement that the computer can start transmitting its data • The major disadvantage of demand priority is price Guide to Networking Essentials, Fifth Edition

  13. Polling Guide to Networking Essentials, Fifth Edition

  14. Choosing an Access Method Guide to Networking Essentials, Fifth Edition

  15. Choosing an Access Method (continued) Guide to Networking Essentials, Fifth Edition

  16. Choosing an Access Method (continued) Guide to Networking Essentials, Fifth Edition

  17. The Ethernet Architecture • 1960s and 1970s: many organizations worked on methods to connect computers and share data • E.g., the ALOHA network at the University of Hawaii • 1972: Robert Metcalf and David Boggs, from Xerox’s PARC, developed an early version of Ethernet • 1975: PARC released first commercial version (3 Mbps, up to 100 computers, max. 1 km of total cable) • DIX developed standard based on Xerox’s Ethernet (10 Mbps) • 1990: IEEE defined the 802.3 specification • Defines how Ethernet networks operate at layers 1-2 Guide to Networking Essentials, Fifth Edition

  18. Overview of Ethernet • Ethernet is the most popular network architecture • Advantages: easy to install, scalable, broad media support, and low cost • Supported transmission speeds: 10 Mbps to 10 Gbps • Uses the NIC’s MAC address to address frames • Ethernet variations are compatible with one another • Basic operation and frame formatting is the same • Cabling, speed of transmission, and method by which bits are encoded on the medium differ Guide to Networking Essentials, Fifth Edition

  19. Ethernet Operation • Ethernet is a best-effort delivery system • It works at the Data Link layer of the OSI model • Relies on the upper-layer protocols to ensure reliable delivery of data • Understanding the following concepts is important: • How Ethernet accesses network media • Collisions and collision domains • How Ethernet handles errors • Half-duplex and full-duplex communications Guide to Networking Essentials, Fifth Edition

  20. Accessing Network Media • Ethernet uses CSMA/CD in a shared-media environment (a logical bus) • Ethernet device listens for a signal or carrier (carrier sense) on the medium first • If no signal is present, no other device is using the medium, so a frame can be sent • Ethernet devices have circuitry that detects collisions and automatically resends the frame that was involved in the collision Guide to Networking Essentials, Fifth Edition

  21. Collisions and Collision Domains Guide to Networking Essentials, Fifth Edition

  22. Ethernet Error Handling • Collisions are the only type of error for which Ethernet automatically attempts to resend the data • Errors can occur when data is altered in medium • Usually caused by noise or faulty media connections • When the destination computer receives a frame, the CRC is recalculated and compared against the CRC value in the FCS • If values match, the data is assumed to be okay • If values don’t match, the data was corrupted • Destination computer discards the frame • No notice is given to the sender Guide to Networking Essentials, Fifth Edition

  23. Half-Duplex Versus Full-Duplex Communications • When half-duplex communication is used with Ethernet, CSMA/CD must also be used • When using a switched topology, a computer can send and receive data simultaneously (full-duplex communication) • The collision detection circuitry is turned off because collisions aren’t possible • Results in a considerable performance advantage Guide to Networking Essentials, Fifth Edition

  24. Ethernet Standards • Each Ethernet variation is associated with an IEEE standard • The following sections discuss many of the standards, some of which are obsolete or had limited use • Keep in mind that Ethernet over UTP cabling has been the dominant technology since the early 1990s, and will likely to continue to be for the foreseeable future Guide to Networking Essentials, Fifth Edition

  25. 100 Mbps IEEE Standards • The most widely accepted Ethernet standard today is 100BaseT, which is also called fast Ethernet • The current IEEE standard for 100BaseT is 802.3u • Subcategories: • 100BaseTX: Two-pair Category 5 or higher UTP • 100BaseT4: Four-pair Category 3 or higher UTP • 100BaseFX: Two-strand fiber-optic cable • Because of its widespread use, the cable and equipment in fast Ethernet are inexpensive • Architecture of choice for all but heavily used servers and multimedia applications Guide to Networking Essentials, Fifth Edition

  26. 100BaseTX • 100BaseTX is the standard that’s usually in mind when discussing 100 Mbps Ethernet • Requires two of the four pairs bundled in a Category 5 twisted-pair cable • Although three cable types are available for 100BaseT, 100BaseTX is the most widely accepted • Generally called fast Ethernet Guide to Networking Essentials, Fifth Edition

  27. 100BaseT4 • 100BaseT4 Ethernet uses all four pairs of wires bundled in a UTP cable • Advantage: capability to run over Category 3 cable • One of the biggest expenses of building a network is cable installation, so many organizations with Category 3 cabling chose to get the higher speed with the existing cable plant by using 100BaseT4 instead of 100BaseTX Guide to Networking Essentials, Fifth Edition

  28. 100BaseFX • 100BaseFX uses two strands of fiber-optic cable • Advantages: • Impervious to electrical noise and electronic eavesdropping • Can span much greater distances between devices • Disadvantage: far more expensive than twisted-pair • Rarely used as a complete 100BaseTX replacement • Used as backbone cabling between hubs or switches and to connect wiring closets between floors or buildings • Connect client or server computers to the network when immunity to noise and eavesdropping is required Guide to Networking Essentials, Fifth Edition

  29. 100BaseT Design Considerations Guide to Networking Essentials, Fifth Edition

  30. 100BaseT Design Considerations (continued) Guide to Networking Essentials, Fifth Edition

  31. 10 Mbps IEEE Standards • Four major implementations of 10 Mbps Ethernet • 10Base5: Ethernet using thicknet coaxial cable • 10Base2: Ethernet using thinnet coaxial cable • 10BaseT: Ethernet over UTP cable • 10BaseF: Ethernet over fiber-optic cable • Of these 10 Mbps standards, only 10BaseT and 10BaseF are seen today • 10Base2 and 10Base5 are essentially obsolete Guide to Networking Essentials, Fifth Edition

  32. 10BaseT Guide to Networking Essentials, Fifth Edition

  33. 10BaseF Guide to Networking Essentials, Fifth Edition

  34. Gigabit Ethernet: IEEE 802.3ab and 802.3z Standards • Gigabit Ethernet implementations • 802.3z-1998 covers 1000BaseX specifications, including the L (long wavelength laser/fiber-optic), S (short wavelength laser/fiber-optic), and C (copper jumper cables) • 802.3ab-1999 covers 1000BaseT specifications, which require four pairs of 100 ohm Category 5 or higher cable Guide to Networking Essentials, Fifth Edition

  35. 1000BaseT Guide to Networking Essentials, Fifth Edition

  36. 1000BaseLX Guide to Networking Essentials, Fifth Edition

  37. 1000BaseSX Guide to Networking Essentials, Fifth Edition

  38. 1000BaseCX Guide to Networking Essentials, Fifth Edition

  39. 10 Gigabit Ethernet: 10 Gbps IEEE 802.3ae Standard • Defined to run only on fiber-optic cabling, both SMF and MMF, on a maximum distance of 40 km • Provides bandwidth that can transform how WAN speeds are thought of • Runs in full-duplex mode only • CSMA/CD is not necessary • Primary use: as network backbone • It also has its place in storage area networks (SANs) • Will be the interface for enterprise-level servers Guide to Networking Essentials, Fifth Edition

  40. 10 Gigabit Ethernet: 10 Gbps IEEE 802.3ae Standard (continued) • Standards • 10GBASE-SR: Runs over short lengths (between 26 and 82 meters) over MMF • For high-speed servers, SANs, etc. • 10GBASE-LR: Runs up to 10 km on SMF • For campus backbones and MANs • 10GBASE-ER: Runs up to 40 km over SMF • Primary applications are for MANs • 10GBASE-SW: Uses MMF for distances up to 300 m • 10GBASE-LW: Uses SMF for distances up to 10 km • 10GBASE-EW: Uses SMF for distances up to 40 km Guide to Networking Essentials, Fifth Edition

  41. What’s Next for Ethernet? • Implementations of 40 Gbps Ethernet are underway • Ethernet could increase tenfold every 4-6 years • 100 Gbps Ethernet available by 2006 to 2008, terabit Ethernet by 2011, and 10 terabit Ethernet by 2015 • In October 2005, Lucent Technologies demonstrated for the first time the transmission of Ethernet over fiber-optic cable at 100 Gbps • It will be able to transfer data across the city faster than today’s CPUs can transfer data to memory • This level of speed has major implications for the entertainment industry and many other areas Guide to Networking Essentials, Fifth Edition

  42. Ethernet Frame Types • Ethernet supports four non-compatible frame types • Ethernet 802.3: used by IPX/SPX on Novell NetWare 2.x and 3.x networks • Ethernet 802.2: used by IPX/SPX on Novell NetWare 3.12 and 4.x networks • Supported by default in Microsoft NWLink • Ethernet SNAP: used in EtherTalk and mainframes • Ethernet II is used by TCP/IP • All Ethernet frame types support a packet size between 64 and 1518 bytes, and can be used by all network architectures mentioned previously Guide to Networking Essentials, Fifth Edition

  43. Ethernet 802.3 Guide to Networking Essentials, Fifth Edition

  44. Ethernet 802.2 • Ethernet 802.2 frames comply completely with the Ethernet 802.3 standard • The IEEE 802.2 group didn’t address Ethernet, only the LLC sublayer of the OSI model’s layer 2 • Since Novell had already decided to use the term Ethernet 802.3 to describe Ethernet raw, it’s generally accepted that Ethernet 802.2 means a fully 802.3- and 802.2-compliant Ethernet frame • Ethernet 802.2 frames contain similar fields to 802.3, with three additional LLC fields Guide to Networking Essentials, Fifth Edition

  45. Ethernet SNAP • Ethernet SubNetwork Address Protocol (SNAP) is generally used on the AppleTalk Phase 2 • It contains enhancements to the 802.2 frame, including a protocol type field, which indicates the network protocol used in the frame’s data section Guide to Networking Essentials, Fifth Edition

  46. Ethernet II Guide to Networking Essentials, Fifth Edition

  47. Wireless Ethernet: IEEE 802.11b, a, and g • AP serves as the center of a star topology network • Stations can’t send and receive at the same time • CSMA/CA is used instead of CSMA/CD • 802.11b/a/g use handshaking before transmission • Station sends AP an RTS and it responds with CTS • Standards define a maximum transmission rate, but speeds might be dropped to increase reliability • No fixed segment length • Maximum of 300 feet without obstructions • Can be extended with large, high-quality antennas Guide to Networking Essentials, Fifth Edition

  48. The Token Ring Architecture Guide to Networking Essentials, Fifth Edition

  49. Token Ring Function • A token passes around the ring • If an “in use” token is received from NAUN, andthe computer has data to send, it attaches its data to the token and sends it to its NADN • If received token is in use, NIC verifies if it is the destination station • If not, the computer re-creates the token and the data exactly and sends them to its NADN • If it is, data is sent to the upper-layer protocols • Two bits in data packet are toggled and token is sent to NADN; when original sender receives it, it frees the token and then passes it along Guide to Networking Essentials, Fifth Edition

  50. Beaconing Guide to Networking Essentials, Fifth Edition

More Related