79
CNAP AT VCC Semester 1 Semester 1 CHAPTER 7 CHAPTER 7 Wael Yousif Wael Yousif Connecting The Internet Generation

Semester 1 CHAPTER 7 Wael Yousif

  • Upload
    dunn

  • View
    41

  • Download
    0

Embed Size (px)

DESCRIPTION

Semester 1 CHAPTER 7 Wael Yousif. Connecting The Internet Generation. Content. Token-ring. FDDI LAN. Ethernet and IEEE 802.3. Layer 2 devices and effects on data flow. BASIC OF TOKEN-RING. Variants. - PowerPoint PPT Presentation

Citation preview

Page 1: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Semester 1Semester 1

CHAPTER 7CHAPTER 7

Wael YousifWael YousifConnecting The Internet Generation

Page 2: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

ContentContent

• Token-ring.

• FDDI LAN.

• Ethernet and IEEE 802.3.

• Layer 2 devices and effects on data flow.

Page 3: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

BASIC OF TOKEN-RINGBASIC OF TOKEN-RING

Page 4: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

VariantsVariants

IBM developed the first IBM developed the first Token Ring network in Token Ring network in

the 1970s. It is still the 1970s. It is still IBM's primary LAN IBM's primary LAN technology, and is technology, and is

second only to Ethernet second only to Ethernet (IEEE 802.3) in terms of (IEEE 802.3) in terms of

LAN implementation. LAN implementation.

Page 5: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Ring topologyRing topology

Page 6: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Data passingData passing

• When a station has information to transmit, it seizes the token and sends data frame to the next station.

• When frame reaches the destination station, the data is copied for processing.

• Frame continues to circle the ring until it returns to the sending station.

• Sending station removes the frame from the ring, verifies receipt, and releases the token.

Page 7: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Token-Ring frame formatToken-Ring frame format

Page 8: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Start delimiter and End delimiterStart delimiter and End delimiter

• Start delimiter.

– Alert for the arrival of a token.

• End Delimiter

– Completes the token or data/command frame.

– Contains damage indicator.

– Last of logical sequence.

Page 9: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Access controlAccess control

• P: Priority bits

• T: Token bit

• M: Monitor bit

• R: Reservation bits

PP PP PP TT MM RR RR RR

Page 10: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Priority and reservation bitsPriority and reservation bits

• B'000' Normal User Priority

• B'001' Normal User Priority

• B'010' Normal User Priority

• B'011' Normal User priority

• B'100' Bridge/Router

• B'101' Reserved IBM

• B'110' Reserved IBM

• B'111' Station Management

Page 11: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Priority managementPriority management

• Using the priority field and the reservation field.

• Stations with a higher priority can reserve the token for the next network pass.

• Stations that raise a token's priority level must reinstate the previous priority after their transmission has been completed.

Page 12: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Frame controlFrame control

• Only present in data/command frames.• Indicates whether frame contains data

or control information.• If control, this byte specifies type of

control information.

• Only present in data/command frames.• Indicates whether frame contains data

or control information.• If control, this byte specifies type of

control information.

Page 13: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Destination and Source addressesDestination and Source addresses

• Universal Address.• Local Administered Address.• Broadcast Address• Functional Address (0x0C0000 00XXXX)

• Universal Address.• Local Administered Address.• Broadcast Address• Functional Address (0x0C0000 00XXXX)

Page 14: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

DataData

• Length limited by the maximum time a station may hold the token.

• Length limited by the maximum time a station may hold the token.

Page 15: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Frame checksumFrame checksum

• Frame Check Sequence.• Source fills field with calculated

value dependent on frame contents.• Destination recalculates to check

data integrity.• Frame is discarded if damaged.

• Frame Check Sequence.• Source fills field with calculated

value dependent on frame contents.• Destination recalculates to check

data integrity.• Frame is discarded if damaged.

Page 16: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Frame statusFrame status

• Address recognized / frame copied indicator.• Address recognized / frame copied indicator.

Page 17: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Management mechanismsManagement mechanisms

• Active Monitor

– One station acts as centralized source of timing information for other stations.

– Removes continuously circulating frames by set monitor bit to 1.

– Start a token, when token have been lost.

• Beaconing– Detects and repairs network faults.

– Initiates auto-reconfiguration.

Page 18: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Physical topologyPhysical topology

• Physical topology : Star.

• Logical topology : Ring.

• IBM Token Ring network stations are connected to MSAU (Multi-Station Access Unit).

• Many MSAU can be wired together to form one large ring.

Page 19: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Multi-MSAUMulti-MSAU

Page 20: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Physical connectionPhysical connection

Page 21: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

BASIC OF FDDIBASIC OF FDDI

Page 22: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

CharacteristicsCharacteristics

• Fiber Distributed Data Interface.

• FDDI is popular as a campus backbone technology.

100 Mbps

Token passing

Dual-ring

Fiber Optic Cable

Total fiber length of 200Km

Page 23: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

FDDI dual-ring (PR and SR)FDDI dual-ring (PR and SR)

Page 24: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Fiber-optic modesFiber-optic modes

Page 25: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

FDDI ConnectionsFDDI Connections

• Class A: connect directly with PR – SR.

– DAC: Dual Attachment Concentrator

– DAS: Dual Attachment Station

• Class B: connect via FDDI concentrator.

– SAS: Single Attachment Station

Page 26: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Operation mechanismsOperation mechanisms

• Connection Establishment– Station connect to neighbors to form the ring.

– Negotiate the length of the link.

• Ring Initialization– Station claim the right to generate a token.

• Steady-state Operation– Token passing

• Ring Maintenance– Detects and repairs token or network faults.

Page 27: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

FDDI topologyFDDI topology

Page 28: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

ETHERNET AND IEEE 802.3ETHERNET AND IEEE 802.3

Page 29: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Ethernet introductionEthernet introduction

• Ethernet is the most widely used local area network (LAN) technology.

• Ethernet was designed to carry data at high speeds for very limited distances.

• Ethernet is well suited to applications where a local communication medium must carry sporadic, occasionally heavy traffic at high peak data rates.

Page 30: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Datalink and Physical layersDatalink and Physical layers

Page 31: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Comparing Ethernet and IEEE 802.3Comparing Ethernet and IEEE 802.3

• Specify similar technologies.

• Broadcast network.

• Using CSMA/CD algorithm.

• Hardware implementation.

• Differences:– Ethernet provides services corresponding to

physical and datalink layer.

– IEEE 802.3 specifies the physical layer and the channel-access portion of the data link layer but does not define a LLC protocol.

Page 32: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Ethernet family: Ethernet family: 1000Base-SX-LX1000Base-SX-LX

Page 33: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Ethernet family: Ethernet family: 1000Base-T1000Base-T

Page 34: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Ethernet family: Ethernet family: 100Base-TX100Base-TX

Page 35: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Ethernet family: Ethernet family: 10Base-T10Base-T

Page 36: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Ethernet familyEthernet family

Page 37: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Ethernet frame formatEthernet frame format

Page 38: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

PreamblePreamble

• Note that a frame is Ethernet or IEEE 802.3.

• Note that a frame is Ethernet or IEEE 802.3.

Page 39: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Start of frame delimiter (SOF)Start of frame delimiter (SOF)

• The IEEE 802.3: synchronize the frame-reception portions of all stations on the LAN.

• Be explicitly specified in Ethernet.

• The IEEE 802.3: synchronize the frame-reception portions of all stations on the LAN.

• Be explicitly specified in Ethernet.

Page 40: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Source and destination addressesSource and destination addresses

• MAC addresses.• Unicast.• Multicast (D)• Broadcast (D)

• MAC addresses.• Unicast.• Multicast (D)• Broadcast (D)

Page 41: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

TypeType (Ethernet) (Ethernet)

• Specifies the upper-layer protocol to receive the data after Ethernet processing is completed

• Specifies the upper-layer protocol to receive the data after Ethernet processing is completed

Page 42: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Length Length (IEEE 802.3)(IEEE 802.3)

• The length indicates the number of bytes of data that follows this field

• The length indicates the number of bytes of data that follows this field

Page 43: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

DataData (Ethernet) (Ethernet)

• the data contained in the frame is sent to an upper-layer protocol

• the data contained in the frame is sent to an upper-layer protocol

Page 44: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

DataData (IEEE 802.3) (IEEE 802.3)

• Data send to LLC layer, including LLC header and upper-layer data

• Data send to LLC layer, including LLC header and upper-layer data

Page 45: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Frame check sequenceFrame check sequence (FCS) (FCS)

• This sequence contains a 4 byte CRC value that is created by the sender and is recalculated by the receiver to check for damaged frames

• This sequence contains a 4 byte CRC value that is created by the sender and is recalculated by the receiver to check for damaged frames

Page 46: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Media Access Control (MAC)Media Access Control (MAC)

• Shared-media broadcast technology.

• Ethernet’s MAC performs three functions:

1. transmitting and receiving data packets

2. decoding data packets and checking them for valid addresses before passing them to the upper layers of the OSI model

3. detecting errors within data packets or on the network

Page 47: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Broadcast technologyBroadcast technology

MAC

Page 48: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Broadcast addressBroadcast address

FF-FF-FF-FF-FF-FF

Page 49: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

CSMA/CDCSMA/CD

• When a station wishes to transmit, it checks the network to determine whether another station is transmitting.

• If network is free, the station proceeds with the transmission.

• While sending, the station monitors the network to ensure that no other station is transmitting.

• If a transmitting node recognizes a collision, it transmits a jam signal so that all other nodes recognize collision.

• All transmitting nodes then stop sending for a backoff time (randomly 0 .. 2n - 1 of 51.2s).

Page 50: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

CSMA/CD (cont.)CSMA/CD (cont.)

Page 51: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

CSMA/CD AlgorithmCSMA/CD Algorithm

Page 52: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Ethernet star topologyEthernet star topology

Page 53: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Ethernet star topology (cont.)Ethernet star topology (cont.)

Page 54: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

TIA/EIA-568-A HC StandardTIA/EIA-568-A HC Standard

Page 55: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

TIA/EIA-568-A:TIA/EIA-568-A: Distance limit Distance limit

Page 56: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

LAYER 2 DEVICESLAYER 2 DEVICES

ANDAND

EFFECTS ON DATAFLOWEFFECTS ON DATAFLOW

Page 57: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Layer 2 DevicesLayer 2 Devices

• NIC (Network Interface Card)

– Connect your computer with network.

– Provide MAC addresses to each connection.

– Implement CSMA/CD algorithm.

• Bridge

– Forward or filter frame by MAC address.

• Switch

– Multi-port bridge.

Page 58: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

NICNIC

Page 59: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

NIC (cont.)NIC (cont.)

• Provides ports for network connection.

• When selecting a network card, consider:1. Type of network:

• Ethernet• Token Ring• FDDI

2. Type of media • Twisted-pair• Coaxial• Fiber-optic

3. Type of system bus• PCI• ISA

Page 60: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

NIC: NIC: Layer 2 functionsLayer 2 functions

• Logical link control (LLC): communicates with upper layers in the computer

• Naming: provides a unique MAC address identifier

• Framing: part of the encapsulation process, packaging the bits for transport

• Media Access Control (MAC): provides structured access to shared access media

• Signaling: creates signals and interface with the media

Page 61: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

BridgeBridge

• Connects network segments.

• Make intelligent decisions about whether to pass signals on to the next segment.

• Improve network performance by eliminating unnecessary traffic and minimizing the chances of collisions.

• Divides traffic into segments and filters traffic based on MAC address.

• Often pass frames b/w networks operating under different Layer 2 protocols.

Page 62: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Bridge (cont.)Bridge (cont.)

Page 63: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Bridge (cont.):Bridge (cont.): Filter Filter

Page 64: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Bridge (cont.):Bridge (cont.): Forward Forward

Page 65: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

LAN SwitchLAN Switch

• Switches connect LAN segments.

• LAN switches are considered multi-port bridges with no collision domain.

• Use a MAC table to determine the segment on which a frame needs to be transmitted.

• Switches often replace shared hubs and work with existing cable infrastructures.

• Higher speeds than bridges.

• Support new functionality, such as VLAN.

Page 66: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

LAN Switch (cont.)LAN Switch (cont.)

Page 67: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

LAN Switch:LAN Switch: MAC table MAC table

Page 68: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

LAN Switch:LAN Switch: Micro-segmentation Micro-segmentation

Page 69: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Benefits of LAN SwitchBenefits of LAN Switch

• No collision domain, because of micro-segmentation.

• Low latency levels and a high rate of speed for frame forwarding

• Increases the bandwidth available on a network

• Is performed in hardware instead of in software, it is significantly faster.

• BUT: All hosts connected to the switch are still in the same broadcast domain.

Page 70: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Why segment LANs?Why segment LANs?

• Isolate traffic between segments.

• Achieve more bandwidth per user by creating smaller collision domains.

• LANs are segmented by devices like bridges, switches, and routers.

• Extend the effective length of a LAN, permitting the attachment of distant stations.

Page 71: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Segmentation with bridgesSegmentation with bridges

Page 72: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Segmentation with bridges (cont.)Segmentation with bridges (cont.)

• Bridges increase the latency (delay) in a network by 10-30%.

• A bridge is considered a store-and-forward device because it must receive the entire frame and compute the cyclic redundancy check (CRC) before forwarding can take place.

• The time it takes to perform these tasks can slow network transmissions, thus causing delay.

Page 73: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Segmentation with switchesSegmentation with switches

Page 74: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Segmentation with switches (cont.)Segmentation with switches (cont.)

• Allows a LAN topology to work faster and more efficiently.

• Uses bandwidth so efficiently, the available bandwidth can reach to 100%.

• Ease bandwidth shortages and network bottlenecks (such as client-server).

• A computer connected directly to an Ethernet switch is its own collision domain and accesses the full 10Mbps.

Page 75: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Segmentation with routersSegmentation with routers

Page 76: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Segmentation with routers (cont.)Segmentation with routers (cont.)

• Routers operates at the network layer

• Routers bases all of its forwarding decisions on the Layer 3 protocol address.

• Routers ability to make exact determinations of where to send the data packet.

• Router operate with a higher rate of latency.

Page 77: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Teaching topologyTeaching topology

Page 78: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C

Basic 10BaseT troubleshootingBasic 10BaseT troubleshooting

Page 79: Semester 1 CHAPTER 7 Wael Yousif

CN

AP

AT

VC

C