categories of computer networks
TRANSCRIPT
-
8/8/2019 Categories of Computer Networks
1/34
Categories of computer networks
-
8/8/2019 Categories of Computer Networks
2/34
-
8/8/2019 Categories of Computer Networks
3/34
LAN
LAN is generally a privately owned network
with in a single office, building or campuscovering a distance of a few kms.
The main reason for designing a LAN is to
share resources such as disks, printers,
programs and data
-
8/8/2019 Categories of Computer Networks
4/34
MAN
A network spanning a physical area larger
than a LAN but smaller than a WAN, such asa city. A MAN might be owned and operated
by a single organization, but it usually will be
used by many individuals and organizations.
-
8/8/2019 Categories of Computer Networks
5/34
WAN
WAN spans a large geographic area, such as
a state, or country. WANs often connectmultiple smaller networks, such as local area
networks (LANs) or metro area networks
(MANs).
-
8/8/2019 Categories of Computer Networks
6/34
Error detection
CRC (cyclic redundancy check)
A mathematical algorithm is used on the data blockto be sent to arrive at the CRC (a small block of bitswhich are appended to the data block and sent bythe sender).
At the destination, the receiver separates the data
block, recomputes the CRC using the samealgorithm and matches the received CRC with thecomputed CRC.
A mismatch indicates an error.
-
8/8/2019 Categories of Computer Networks
7/34
LAN can use star, bus or ring topology. However,
bus topology is popular in the Ethernet LANs andToken Bus LANS and Ring topology is popular in
the Token Ring LANs.
A modified version of Token Ring is FDDI
Ethernet and Token Ring are the most popular LANs
-
8/8/2019 Categories of Computer Networks
8/34
LAN broad cast their message to all host on that
LAN. This is because, all the host share a singletransmission wire.
The address in the packet or frame enables the
destination host to receive that packet, while all
other hosts ignore it.
Broadcast network can be
1. Static
2. Dynamic
-
8/8/2019 Categories of Computer Networks
9/34
In static method each host is given a fixed
time slice to send the information. If a hostdoes not have anything to send, that timeslice is wasted. That is why this method isnot very popular.
In dynamic method, a host can send aframe any time. Thus, if two host send aframe at the same time, the two frames couldcollide with each other.
-
8/8/2019 Categories of Computer Networks
10/34
We need some arbitration to solve this problem. A protocolcalled MAC (Media Access Control) performs this job and
decides which node can access the medium and when.Dynamic method can be further subdivided into:
1. Centralized
2. Decentralized
In Centralized method, there is a single entity which decides
who would send the data next. This is typically a master-slavemethod. A host wanting to send data can explicitly request thisunit for the permission.
In star topology, the hub can play the role of the master.However if the arbitration unit goes down, the entire networkgoes down.
-
8/8/2019 Categories of Computer Networks
11/34
In decentralized method, we do not require
any external arbitrator for this.So, more efficient and more popular.
This can be implemented in two major ways
1. Ethernet
2. Token Passing
-
8/8/2019 Categories of Computer Networks
12/34
Ethernet
Ethernet is the name of a popular packet
switching LAN technology. Ethernet uses a single coaxial cable as the
transport medium. All hosts in the Ethernet
LAN connect to this cable.
A device called transceiveris used to
establish the connection between a computer
and Ethernet.
-
8/8/2019 Categories of Computer Networks
13/34
-
8/8/2019 Categories of Computer Networks
14/34
-
8/8/2019 Categories of Computer Networks
15/34
At any point of time, the Ethernet bus can be in any ofthe three states:
Bus is idle
Carries a legitimate signal i.e. it is busy
Carries a erratic signal generated by a collision
The transceiver constantly listens to the bus i.e. itmeasures the signal level to determine the state ofthe bus.
-
8/8/2019 Categories of Computer Networks
16/34
The transceiver does not connects to the hostdirectly. Instead, it connects to NIC, a small cardplugged on the motherboard of the host.
It has a small CPU, memory and a limited instructionset. It performs all the network related functions onbehalf of the host.
Each NIC bears a unique hardware address thatidentifies a host uniquely.
-
8/8/2019 Categories of Computer Networks
17/34
-
8/8/2019 Categories of Computer Networks
18/34
Ethernet properties
Broadcast network
Every message travels across the entire cable and all NICs
receive it, but only the NIC of the correct destination accepts it.
Best effort delivery
Ethernet hardware or software do not take care of missingframe.
Decentralized access controlThere is no single centralized authority that dictates if a hostcan transmit data. Instead, the Ethernet uses the approach ofcarrier sense multiple access with collision detection(CSMA/CD).
-
8/8/2019 Categories of Computer Networks
19/34
Multiple host can access the Ethernet bus simultaneouslythrough their transceivers and can determine if it is idle by
looking for the presence/absence of a carrier wave on the bus.For this reason it is called CSMA
When a host determines that no other host is using theEthernet, it transmits its own data on to the Ethernet.
When the transceiver of a host begins transmission, the signaldoes not immediately reach all parts of the network. It takensome finite time. Therefore, until the signal reaches anotherhost continues to believe that cable is idle. Thus, twotransceiver believe that Ethernet is free for transmission andcan transmit data almost exactly at the same time.
-
8/8/2019 Categories of Computer Networks
20/34
When this happens, the electrical signals of the twotransmissions intermingle and neither remains a meaningful
transmission. Such incidents termed as collisions, whichproduce erratic signals, which the transceiver of both thesending hosts can detect.
To resolve collisions, while a host transmits the data, thetransceiver of the host continues to listen to the Ethernet to seeis a collision has occurred. If it has, the transceiver informs itsNIC about it.
NIC stops wait for some time to retransmit the data. However, as soon as it detects a collision, it generates a
specific jamming signal across the bus, informing all thenodes of the collision.
-
8/8/2019 Categories of Computer Networks
21/34
The NIC of the other node trying to send some dataalso detects the jamming signal and backs off.
now, both the nodes wanting to send data wait for awhile. The question is : How long should they wait?
The Ethernet standard specifies a binaryexponential back off policy where a sender waits
for a random time after a first collision, twice as longif a retransmission also results in a collision, fourtimes as long if the retransmission also results in acollision and so on.
-
8/8/2019 Categories of Computer Networks
22/34
Ethernet Frame Format
Preamble
(8 bytes)
Destination
Address (6
bytes)
Source
Address (6
bytes)
Frame
Type
(2 bytes)
Frame data
(64-1500
bytes)
CRC (4
bytes)
-
8/8/2019 Categories of Computer Networks
23/34
Token ring
Token ring network is based on ring topology
A token ring network employs a mechanism called token
passing. All host on a token ring share the same physical medium, as all
the hosts are arranged to form a circular ring.
The sending computer transmits a frame, which travels acrossthe ring. Each host on the ring check the destination addressand if it is not meant for it, forward it along. Only the actualdestination makes a copy of it i.e. accepts it. In last framecomes back to the sender.
In this, only the host which have a token will be able to sendframe.
-
8/8/2019 Categories of Computer Networks
24/34
-
8/8/2019 Categories of Computer Networks
25/34
However, at the destination node, before it forwards a frame,that host checks the CRC to ensure that there are no errors and
then not only accepts the frame, but also changes a flag bit inthe frame to indicate the receipt of a correct frame.
The frame comes back to the sender, the sender can check theflag bit to verify if the frame was received by the destinationsuccessfully, or if there were any errors during transmission.
Such an acknowledgement scheme is implemented only in the
token ring, unlike Ethernet, where there is no such theme.
-
8/8/2019 Categories of Computer Networks
26/34
Medium Access Control (MAC)
Token ring does not employ CSMA/CD.
The token ring hardware ensures that the permissionfor data transmission is granted to each host on the
token ring in turn.
The hardware facilitates this coordination by using a
special three byte frame called token
A token contains a bit pattern that is completely
different from any other data frame, so that both can
be easily distinguished from each other.
-
8/8/2019 Categories of Computer Networks
27/34
Token ring frame format
Token ring describes three frame formats:
Data Token
Abort
-
8/8/2019 Categories of Computer Networks
28/34
Data Frame
Destination
Address
(6 bytes)
Source
Address
(6 bytes)
Frame Data
(up to
4,500 bytes)
CRC
(4 bytes)
ED
(1 byte)
FS
1byte
Preamble
(3bytes)
-
8/8/2019 Categories of Computer Networks
29/34
Token Frame
SD
(1 byte)
AC
(1 byte)
ED
(1 byte)
-
8/8/2019 Categories of Computer Networks
30/34
Abort Frame
SD
(1 byte)
ED
(1 byte)
-
8/8/2019 Categories of Computer Networks
31/34
FDDI
FDDI developed using optical fiber because
of optical fiber could support high data rates(100 mbps)
These days copper wires support such rates.So, the copper version of FDDI is calledCDDI.
FDDI uses glass fibers for data transmissiontherefore encodes data bits in the form ofpulses of light.
-
8/8/2019 Categories of Computer Networks
32/34
FDDI properties
1. Token passing for media access control
2. Self Healing MechanismThis is possible by second ring when a
network error occurs, or a host is down. In
such a case, the NIC uses the second ring,
which is used as backup for such failuresfor data transmission. This is called
loopback.
-
8/8/2019 Categories of Computer Networks
33/34
-
8/8/2019 Categories of Computer Networks
34/34
FDDIFrame
Same as token data frame