cs56ch03.ppt

92
1 CS 56 • Networking Essentials Chapter 3 Understanding Network Architecture Sonny Huang

Upload: sammy17

Post on 28-Jan-2015

111 views

Category:

Documents


1 download

DESCRIPTION

 

TRANSCRIPT

Page 1: CS56ch03.ppt

1

CS 56 • Networking Essentials

Chapter 3 Understanding Network Architecture

Sonny Huang

Page 2: CS56ch03.ppt

2

Chapter 3 Understanding Network Architecture

Outline

Access Methods

How Networks Send Data

Ethernet

Page 3: CS56ch03.ppt

3

Access Methods

Access Methods1. Function of Access MethodsA. Overview

1. Rules that define how a computer puts data on and takes it from the network cable is known as access method.2. Access methods regulate the flow of network traffic.

B. Traffic Control on the Cable1. Access the cable without running into other data.

Page 4: CS56ch03.ppt

4

Access Methods

2. Receiving computer must access cable with reasonable assurance that data has not been destroyed in a data collision during transmission.

3. Prevents simultaneous access to the cable.Collision occurs if two computers put data on the cable at the same time

Page 5: CS56ch03.ppt

5

Access Methods

 Video Note c03dem01, c03dem02, and d03dem03 videos show how access methods help ensure orderly transmission of data on a network.

 2. Major Access MethodsA. Three methods to prevent simultaneous use of the

cable:1. Carrier-sense multiple access methods (with collision detection and with collision avoidance)2. Token-passing method3. Demand-priority method

Page 6: CS56ch03.ppt

6

Access Methods

B. Carrier-Sense Multiple Access with Collision Detection (CSMA/CD) Access Method

1. Each computer on the network, including clients and servers, checks the cable for network traffic.a. Only when there is no traffic, can data be sent.b. After data is sent, no other computer can transmit until original data reaches its destination.c. A data collision occurs when two or more computers send data at the same time.d. When this happens, each computer stops data transmission and waits to resend when it “senses” the cable is free.

Page 7: CS56ch03.ppt

7

Access Methods

Computers can transmit data only if the cable is free.

Page 8: CS56ch03.ppt

8

Access Methods

2. Contention Method.a. Computers on the network contend, or compete, for an opportunity to send data.b. If there is data on the cable, no other computer may transmit until the data reaches its destination and cable is free.c. Current implementations of CSMA/CD are so fast that users are not even aware they are using a contention access method.

 Video Note c03dem04 and c03dem05 videos show the CSMA/CD access method.

Page 9: CS56ch03.ppt

9

Access Methods

Video Note c03dem06 video show why CSMA/CD is considered a contention method.

 3. CSMA/CD Considerations.

a. More computers means more network traffic.b. Can be a slow access method depending on the number of users and the applications being used.

Page 10: CS56ch03.ppt

10

Access Methods

C. Carrier-Sense Multiple Access with Collision Avoidance (CSMA/CA) Access Method1. Least popular of the three major access methods.2. Each computer signals its intent to transmit before it actually transmits data to avoid transmission collisions.3. Broadcasting the intent to transmit data increases the amount of traffic on the cable and slows down network performance.

 Video Note c03dem07 video shows the CSMA/CA access method.

Page 11: CS56ch03.ppt

11

Access Methods

D. Token-Passing Access Method1. A special type of packet, called a token, circulates

around a cable ring from computer to computer.2. Computer wanting to send data must wait for the free

token.3. When computer obtains free token, it can transmit its

data.4. No other computer can transmit while this computer is

transmitting.5. No contention and no collisions take place.6. No time is spent waiting to resend data due to traffic.  

Page 12: CS56ch03.ppt

12

Access Methods

Token Passing access method

Page 13: CS56ch03.ppt

13

Access Methods

Receiving computer reads the data and sets a flag that says the data has been received. It then puts the packet back on the cable to the sending computer. The sending computer creates a new free token after it reads the flag that says the receiving computer has processed the data.

   

Video Note c03dem08, c03dem09, c03dem10, c03dem11, and c03dem12 videos show the token-passing access method.

Page 14: CS56ch03.ppt

14

Access Methods

E. Demand Priority Access Method1. Overview

a. Designed for 100 Mbps Ethernet, known as 100VG-AnyLAN.b. Sanctioned and standardized by the Institute of Electrical and Electronic Engineers (IEEE) in its 802.12 specification.c. Repeaters and end nodes are the two components that make up all 100VG-AnyLANs.d. Repeaters are responsible for searching for requests to send.e. Repeaters are responsible for noting all addresses, links, and end nodes, and verifying that they are all functioning.

Page 15: CS56ch03.ppt

15

Start-bus network access method for100VG-AnyLAN is demand priority

Access Methods

f. End node can be a computer, bridge, router, or switch.

Page 16: CS56ch03.ppt

16

Access Methods

2. Demand Priority Contentiona. Computers contend (transmit at the same time).b. Hub determines priority (could be based on data type).c. Higher priority is transmitted first; if same, then they are alternated.

3. Demand Priority Considerationsa. Uses four pairs of wires, allowing computers to transmit and receive at the same time.b. Transmissions through the hub.c. No network-wide broadcasts, only computer-to-hub-to-computer.

Page 17: CS56ch03.ppt

17

Access Methods

See major points of each of the access methods in the access methods summary on page 115.

   

Video Note c03dem13 and c03dem14 videos show the demand-priority access method.

Page 18: CS56ch03.ppt

18

How Networks Send Data

How Networks Send Data1. The Function of Packets in Network CommunicationsA. Data sent in small, manageable packets, each wrapped

with the essential information needed to get it from its source to the correct destination.1. Large files flood and tie up the network.

Large continuous streams of data slow down the network

Page 19: CS56ch03.ppt

19

Breaking data into packets

How Networks Send Data

2. Impact of retransmitting large units of data multiply network traffic.3. Small packets provide timely error recovery, and the network only has to resend small amount of data.

 Although the terms “packet” and “frame” are often used interchangeably, there are some differences based on the type of network. Packet is a unit of information transmitted as a whole from one device to another.

Page 20: CS56ch03.ppt

20

How Networks Send Data

 B. Sender breaks data into packets and adds special control

information to each packet making it possible to:1. Send original, disassembled data in small chunks.2. Reassemble data in proper order at destination.3. Check data for errors after it has been reassembled.

2. Packet StructureA. Packets contain several types of data, including:

1. Information, such as messages or files.2. Computer control data and commands, such as service requests.

Page 21: CS56ch03.ppt

21

How Networks Send Data

3. Session control codes (such as error correction) that indicate the need for retransmission.

B. Packet Components1. Common packet components:

a. Source address that identifies sending computerb. Data intended for transmissionc. Destination address that identifies the recipientd. Instructions telling network components how to pass datae. Information to receiving computer about how to reassemble the dataf. Error-checking information to ensure that packet arrives intact

Page 22: CS56ch03.ppt

22

How Networks Send Data

2. Headera. Alert signal indicating

packet is being transmitted

b. Source addressc. Destination addressd. Clock information to

synchronize transmission

3. Dataa. Actual data being sent: 0.5 KB to 4 KB in sizeb. Larger files broken into smaller multiple packets

Page 23: CS56ch03.ppt

23

How Networks Send Data

4. Trailera. Exact content of the trailer varies depending on the communication method, or protocol.

A protocol is a set of rules or standards designed to enable computers to connect with one another and to exchange information with as little error as possible.

 b. Contains error-check component called cyclical redundancy check (CRC), a number produced by mathematical computation at source.c If CRC number is calculated to be the same when it arrives, the data is assumed good; if not, it is retransmitted.

Page 24: CS56ch03.ppt

24

How Networks Send Data

C. Example: Packets in Printing1. Sending computer establishes a connection with the

print server.

Establishing a connection with a print server

Page 25: CS56ch03.ppt

25

Creating Packets

How Networks Send Data

2. Computer breaks the large print job into packets containing:a. Source and destination address.b. Data.c. Control

information.

Page 26: CS56ch03.ppt

26

How Networks Send Data

3. NIC in each computer examines the receiver’s address on all packets sent on its segment of the network.a. NIC compares the incoming packets destination address with its own address.b. NIC interrupts the computer only when it detects a packet addressed specifically to itself.

Examining the receiver’s address

Page 27: CS56ch03.ppt

27

How Networks Send Data

4. Packets enter the destination computer (print server) through the cable into the NIC.

Network interface card(NIC) accepts packets addressed to the printer server

Page 28: CS56ch03.ppt

28

How Networks Send Data

5. No computer resources are used until the NIC identifies a packet addressed to itself.

6. Network Operating System in the receiving computer reassembles the packets back into the original text file and moves the file into the computer’s memory.

Reassembled packets sent to the printer

Page 29: CS56ch03.ppt

29

Ethernet

Ethernet1. Origin of EthernetA. Late 1960’s, the University of Hawaii developed a

WAN called ALOHA using the CSMA/CD access method.

B. In 1972, a cabling and signaling scheme was invented at Xerox Palo Alto Research Center (PARC).

C. In 1975, the first Ethernet product was introduced; a system of 2.94 megabits per second (Mbps) to connect over 100 computers connected on one kilometer (.62 miles) of cable.

D. Xerox, Intel Corporation and Digital Equipment Corporation drew up standard for 10-Mbps Ethernet.

Page 30: CS56ch03.ppt

30

Ethernet

2. Ethernet SpecificationsA. International Organization for Standardization (ISO)

1. In 1978, ISO released a set of specifications for connecting dissimilar devices.2. This set of specifications is referred to as the Open System Interconnect (OSI) model.

 The OSI model is described in detail in Chapter 5.

 B. Ethernet specification performs the same functions as the OSI

physical and data-link layers of this model.1. These specifications affect how hardware links or passes information back and forth.2. Project 802 published by IEEE in 1980s.3. The IEEE 802.3 specification.

Page 31: CS56ch03.ppt

31

Ethernet

 Ethernet became the basis for IEEE 802.3.

3. Ethernet FeaturesA. Most Popular Network Architecture

1. Ethernet media is passive, which means it requires no power source.2. Will not fail unless the media is physically cut or improperly terminated.

Simple Ethernet bus network terminated at both end

Page 32: CS56ch03.ppt

32

Ethernet

B. Ethernet Basics1. Topology: Linear bus or star bus2. Architecture: Baseband (digital: bidirectional)3. Access method: CSMA/CD4. Specifications: IEEE 802.35. Transfer speed: 10 or 100 Mbps6. Cable type: ThickNet, ThinNet, UTP

 The most popular physical topology is a star, the manner a signal is transferred is still a bus.

Page 33: CS56ch03.ppt

33

Ethernet

 C. The Ethernet Frame Format1. Ethernet breaks data into frames.

a. Package of information transmitted in a single unit (between 64 and 1518 bytes long).b. Ethernet uses 18 bytes for itself; therefore, data is between 46 and 1500 bytes long.

  “Packet” and “frame” can be used interchangeably; in the context of Ethernet, the term “frame” is used.

 

Page 34: CS56ch03.ppt

34

Ethernet

2. Parts of the frame:a. Preamble, the start of the frameb. Destination and source addressc. Type of frame, usually IP or IPX (Novell’s Internetwork Packet Exchange)d. Error checking field (Cyclical redundancy check (CRC)

 Specifics of frame layout vary from one type to another.

Sample Ethernet II frame

Page 35: CS56ch03.ppt

35

Ethernet

4. 10-Mbps IEEE StandardsA. 10BaseT Standard 

See 10BaseT specifications summary in Table 3.4 on page 130.

 1. 10-Mbps, baseband, over twisted-pair cable.2. Usually unshielded twisted-pair, but STP will work.

 UTP is by far the most popular type of cable. STP is not recommended.

Page 36: CS56ch03.ppt

36

Ethernet

3. Uses hubs (multiport repeaters) from wiring closets.

4. Configured as star, but internally it is a bus.

A multiport Repeater can be used to extend an Ethernet LAN

Page 37: CS56ch03.ppt

37

A patch panel makes moving computer easy

Ethernet

5. Each computer has two pairs of wire: one pair receives data and one pair transmits.6. Cable type is Category 3, 4, or 5 UTP. Maximum length of 100 meters (328 feet); minimum of 2.5 meters (8 feet).7. 1024 computers maximum.

 

Page 38: CS56ch03.ppt

38

Ethernet

B. 10Base2 Standard 

See 10Base2 specifications summary in Table 3.5 on page 132.

 1. 10 Mbps, baseband, over thin coaxial cable.2. ThinNet with BNC connectors and terminators.3. BNC barrels to extend sections.

 Be careful to limit the number of BNC barrels to maintain signal strength.

Page 39: CS56ch03.ppt

39

Ethernet

4. Maximum length of 185 meters (607 feet); minimum of 0.5 meters (20 inches).5. ThinNet can support maximum of 30 nodes per populated segment.6. Repeaters used to extend to total of 925 meters (3035 feet).

 Repeaters count in the total number of 30 nodes per populated segment.

 7. Relatively inexpensive, easy to install, easy to configure.

Page 40: CS56ch03.ppt

40

The thinnet 5-4-3 rules: 5 segments, 4 repeaters, and 3 populated segments

Ethernet

8. Uses 5-4-3 rule.  The 5-4-3 rule can combine as many as five cable

segments connected by four repeaters; but only three segments can have stations attached. Thus, two segments are untapped and are often referred to as “inter-repeater links.”

Page 41: CS56ch03.ppt

41

Ethernet

C. 10Base5 Standard 

See 10Base5 specifications summary in Table 3.6 on page 135. 

1. 10 Mbps, baseband, over 500-meter (five 100-meter) segments.2. Called ThickNet or standard Ethernet.3. ThickNet uses bus topology and can support up to one hundred nodes per populated segment.4. ThickNet segment can be 500 meters (1640 feet) long for a total network length of 2500 meters (8200 feet).5. Transceivers are devices that transmit and receive, and also provide communications between the computer and the main LAN cable.

Thicknet cable composition

Page 42: CS56ch03.ppt

42

Ethernet

6. Transceiver cable uses a DIX or AUI 15-port to connect the transceiver to the NIC.

  “AUI,” an acronym for attachment unit interface, is a 15-pin (DB-15) connector commonly used to connect a NIC to an Ethernet cable; AUIs and DIXs are discussed in Chapter 2.

 

Page 43: CS56ch03.ppt

43

Ethernet

7. N-series connectors, including N-series barrel connectors, and N-series terminators.

Thicknet backbone with attached transceiver and cable

Page 44: CS56ch03.ppt

44

Ethernet

8. Uses 5-4-3 rule.

The thicknet 5-4-3 rules: 5 backbone segments , 4 repeaters, and 3 populated segments

Page 45: CS56ch03.ppt

45

Ethernet

9. Maximum length of 50 meters (164 feet); minimum of 2.5 meters (about 8 feet).

D. Combining ThickNet and ThinNet Cable1. ThickNet cable is good for backbones.2. ThinNet cable is used for branch segments.3. Branch segments connect the computer to the backbone.

Page 46: CS56ch03.ppt

46

Ethernet

E. 10BaseFL Standard1. Ethernet using fiber-optic cable to connect computers and repeaters.2. Accommodates long runs between buildings.3. Maximum segment length of 2000 meters (about 6800 feet).

 Speed is the same as standard Ethernet, but longer distances are possible due to fiber-optic cable.

 

Page 47: CS56ch03.ppt

47

Ethernet

5. 100-Mbps IEEE StandardsA. Able to support high-bandwidth applications:

1. Computer-aided design (CAD)2. Computer-aided manufacturing (CAM)3. Video4. Imaging and document storage

B. 100BaseVG AnyLAN Standard1. 100BaseVG AnyLAN Ethernet is IEEE 802.12 standard.

a. Combines Ethernet and Token Ring technology

b. Originally developed by Hewlett Packard

Page 48: CS56ch03.ppt

48

Ethernet

2. Specifications:a. Minimum data rate of 100 Mbpsb. Cascading star topology (parent/child) over Category 3, 4, and 5 twisted-pair and fiber-optic cablec. Demand priority access methodd. Ability to filter individually addressed frames at the hube. Support Ethernet frames and Token Ring

packets 

100BaseVG AnyLAN is also referred to as 100BaseVG, VG, and AnyLAN.

 

Page 49: CS56ch03.ppt

49

Ethernet

3. Topology.a. Star topology in which all computers are

attached to a hub.b. Add child hubs to the central hub to expand

the network. 

Parent hub controls transmission to computers attached by their child hubs.

Parents hubs with five attached child hubs

Page 50: CS56ch03.ppt

50

Ethernet

4. Limitations of 100BaseVG:a. Requires own hubs and cardsb. Two longest cables from hub to

computer less than or equal to 250 meters (810 feet)

c. Requires more wiring closets than 10BaseT

Page 51: CS56ch03.ppt

51

Ethernet

C. 100BaseX Ethernet Standard 

See 100BaseX Media Specification listed in Table 3.7 on page 138.

1. Fast Ethernet2. Uses UTP Category 5 wire3. Star bus topology like 10BaseT4. Incorporates three media specifications:

a. 100BaseT4 (4-pair Category 3, 4, 5 UTP)b. 100BaseTX (2-pair Category 5 UTP or STP)c. 100BaseFX (2-strand fiber optic)

 

Page 52: CS56ch03.ppt

52

Ethernet

6. Performance ConsiderationsA. Ethernet architecture can use multiple communication

protocols:1. NetWare2. UNIX3. Windows4. Macintosh

|B. Segmentation1. Divides crowded segment into two less crowded segments using bridge or router.2. Reduces traffic and improves access time.

Page 53: CS56ch03.ppt

53

Ethernet

 

Router actually breaks the single segment into two; the bridge just creates two collision domains. Bridges and routers are discussed in Chapter 7.

Using a bridge to segment a network and reduce network traffic.

Page 54: CS56ch03.ppt

54

Ethernet

C. NOSs on Ethernet1. Microsoft Windows 95, Windows 98, and Windows 20002. Microsoft Windows NT Workstation and Windows NT Server3. Microsoft Windows 2000 Professional and Windows 2000 Server4. Microsoft LAN Manager5. Microsoft Windows for Workgroups6. Novell NetWare7. IBM LAN Server8. AppleShare9. UNIX

Page 55: CS56ch03.ppt

55

Ethernet

 Review the table summarizing the specifications for Ethernet architecture on page 140.

Page 56: CS56ch03.ppt

56

Token Ring

 Token Ring1. OverviewA. General Information

1. Token Ring: 802.5 specifications2. Introduced by IBM in 1984 for all its computer environments, from PCs to mainframes (SNA)

 IBM Token Ring is one implementation of IEEE 802.5, which is covered in more detail in Chapter 5.

 3. Adopted by ANSI/IEEE in 1985

 

Page 57: CS56ch03.ppt

57

Token Ring

American National Standards Institute (ANSI) is an organization that was formed in 1918 for the development and adoption of trade and communication standards in the United States. ANSI is the American equivalent of the International Organization for Standardization (ISO).

 B. Token Ring Features1. Architecture

a. Logical ring is within the hub.b. Computers are wired in a star from the hub (star-wired ring topology).c. Token still passes in a ring from computer to computer.

Page 58: CS56ch03.ppt

58

Token Ring

 

Logical electrical mode of transmission. Hubs may be powered or not. All stations on a line must be same speed.

Logical ring, in which the physical ring is in the hub.

Page 59: CS56ch03.ppt

59

Token Ring

2. Token Ring Basicsa. Star-wired ring topologyb. Token passing access methodc. IBM Type 1, 2, 3 cabling (STP or UTP)d. Transfer rates of 4 Mbps or 16 Mbpse. Baseband transmissionf. IEEE 802.5 specifications

 

Page 60: CS56ch03.ppt

60

Token Ring

See Table 3.9, Components of a Token Ring Frame, on page 143.

 C. Frame Formats

1. Start delimiter indicates the start of the frame.2. Access Control and Frame Control.

 Instructor Note See Figure 5.8, Media Access Control, described in detail on page 223.

 3. Source and Destination Addresses.4. Information or Data.

Page 61: CS56ch03.ppt

61

Token Ring

5. CRC Error Checking.6. End delimiter indicates the end of frame.7. Frame status tells whether the frame was recognized, copied, or whether the destination address was available.

2. How Token Ring Network Works 

Token is a predetermined formation of bits that permits a computer to put data on the cable.

 

Page 62: CS56ch03.ppt

62

Token Ring

A. Overview1. First computer on the network generates a token.2. Token travels around the ring polling each computer.3. Computer signals that it wants to transmit data and takes control of the token.4. Computer cannot transmit unless it has possession of the token.5. No computer can transmit data while the token is in use.

Page 63: CS56ch03.ppt

63

Token Ring

 Token passing is considered deterministic, which means that a computer cannot force its way on the network as in CSMA/CD.

 |30|6. Each computer acts as a unidirectional repeater, regenerates the token, and passes it along.

7. After taking control of the token, it sends a data frame out on the network.8. Frame proceeds around the ring until it reaches the destination computer.9. Destination computer copies the frame into its receive buffer.10. Destination computer marks the status field as received.11. Frame continues around the ring until sending computer receives it.12. Sending computer removes the frame and generates a new token.13. Only one token at a time can be active on the network.14. Token travels in only one direction.

 Instructor Note Does the token flow clockwise or counterclockwise? The answer is that it doesn’t matter. The direction taken depends on hardware connections. Logically, one can make the token travel in any direction or order. The designers of hubs determine the order in which each port is addressed, and the administrator determines the order in which computers are connected to the hub. The IEEE 802.5 standard says clockwise; the IBM publication SC30-3374, section 3, says counterclockwise.

 B. Monitoring the System1. First computer online is assigned to monitor network activity by the Token Ring system and is responsible for:a. Frames being delivered and received correctly.b. Frames that have circulated the ring more than once.c. Ensuring only one token is on the network.2. Process of monitoring is called beaconing.a. Active monitor sends out a beacon announcement every seven seconds.b. Beacon passed from computer to computer throughout the ring.c. If station does not receive an expected announcement from its upstream neighbor it sends a message including:(1) Stations address(2) Address of neighbor that did not announce(3) Type of beacond. Ring attempts to diagnose and repair without disrupting the entire network.

 Instructor Note When troubleshooting, be aware the network is trying to bypass the problem. This can sometimes mask the real failure.

 e. If unable to reconfigure automatically, manual intervention is required.3. Recognizing a Computer.a. When a new computer comes online the initialization includes:(1) Checking for duplicate addresses.(2) Notifying others of its existence.3. Hardware Components

|31|A. The Hub1. Overviewa. Token ring hub is known by several names:(1) MAU (Multistation Access Unit)(2) MSAU (MultiStation Access Unit)(3) SMAU (Smart Multistation Access Unit)b. The hub’s internal ring automatically converts to an external ring at each connection point when a computer is connected.2. Capacitya. IBM MSAU has 10 connection ports creating a logical ring of eight stations (two other ports extend the ring).

 Instructor Note Some MSAU units are passive. For example, the IBM 8228.

 b. Up to 33 hubs on a ring supporting 72 computers that use UTP or 260 that use STP on a MSAU-based network.

 Instructor Note Other vendors offer hubs with more capacity; capacity depends on the vendor and the hub model.

 |32|c. Hubs must be connected in a ring; ring-out on one hub must connect to ring-in on the adjacent hub.

d. Patch cables connect many MSAUs on top of each other while still forming a continuous ring.3. Built-in Fault Tolerancea. NIC failure should bring down ring.b. MSAU will sense a failed NIC and disconnect from it.c. Faulty computer or connection will not affect rest of network.B. Cabling1. Overviewa. IBM Type 1, 2, 3; usually Type 3 UTP cabling.

|33|b. IBM states maximum cabling distance MSAU to computer is 46 meters (150 feet), although some vendors say 152 meters (500 feet).c. Maximum distance from one MSAU to another is 152 meters (500 feet).d. Single Token Ring can accommodate only 260 computers with STP cable and 72 computers with UTP cable.2. Patch Cablesa. Extend connection between computer and MSAU or between two MSAUs.b. IBM Type 6, up to a maximum of 46 meters (150 feet).3. Connectorsa. Media interface connectors (MICs), also known as universal data connectors, connect Types 1 and 2 cable.b. Neither male nor female so they can be connected together.c. RJ-45 for 8-pin connection for Type 3 cable.d. RJ-11 for 4-pin connection for Type 3 cable.e. Media filter required to make connection between Token Ring interface card and standard RJ-11/RJ-45 telephone jacks.4. Media Filtersa. Required with Type 3 telephone twisted-pair cable.b. Convert cable connectors and reduce line noise.5. Patch Panelsa. Organize cable that runs between a MSAU and a telephone punchdown block.b. Punchdown block is a kind of hardware that provides terminal connections for bare network cable ends.6. Repeatersa. Increase Token Ring cable distances.b. Actively regenerates and retimes the Token Ring signal.7. NICsa. Either 4 Mbps or 16 Mbps.b. If the network is a 4 Mbps network, the 16 Mbps cards can be used, but will revert to 4 Mbps mode (16 Mbps networks will not accept slower 4 Mbps cards because they cannot speed up).

 Instructor Note Different speed cards can exist on different logical segments.

 8. Fiber-Optic Cablea. Well suited for unidirectional, high-speed fiber-optic cable.b. Although more expensive, it greatly increases the range (up to 10 times that of copper).4. Future of Token Ring Networks

 Instructor Note See Chapter 6 for discussion of protocols, routers, and bridges.

 A. Overview1. Token ring is losing market share to Ethernet.2. Large companies are selecting Token Ring to support mission-critical applications.B. Users of token ring face the following challenges:1. Complexity, manageability, cost and space requirements2. Bridge and segment congestion3. Upgrading to high-speed technologies

 Instructor Note See Token Ring specifications in Table 3.10 on page 151.

Clockwise flow of the token around the logical ring

Page 64: CS56ch03.ppt

64

Token Ring

  6. Each computer acts as a unidirectional repeater, regenerates the token, and passes it along.7. After taking control of the token, it sends a data frame out on the network.8. Frame proceeds around the ring until it reaches the destination computer.9. Destination computer copies the frame into its receive buffer.10. Destination computer marks the status field as received.11. Frame continues around the ring until sending computer receives it.12. Sending computer removes the frame and generates a new token.

Page 65: CS56ch03.ppt

65

Token Ring

13. Only one token at a time can be active on the network.14. Token travels in only one direction.

 Does the token flow clockwise or counterclockwise? The answer is that it doesn’t matter. The direction taken depends on hardware connections. Logically, one can make the token travel in any direction or order. The designers of hubs determine the order in which each port is addressed, and the administrator determines the order in which computers are connected to the hub. The IEEE 802.5 standard says clockwise; the IBM publication SC30-3374, section 3, says counterclockwise.

Page 66: CS56ch03.ppt

66

Token Ring

B. Monitoring the System1. First computer online is assigned to monitor network

activity by the Token Ring system and is responsible for:a. Frames being delivered and received correctly.b. Frames that have circulated the ring more than once.c. Ensuring only one token is on the network.

2. Process of monitoring is called beaconing.a. Active monitor sends out a beacon announcement every seven seconds.b. Beacon passed from computer to computer throughout the ring.

Page 67: CS56ch03.ppt

67

Token Ring

c. If station does not receive an expected announcement from its upstream neighbor it sends a message including:

(1) Stations address(2) Address of neighbor that did not

announce(3) Type of beacon

d. Ring attempts to diagnose and repair without disrupting the entire network.

 When troubleshooting, be aware the network is trying to bypass the problem. This can sometimes mask the real failure.

Page 68: CS56ch03.ppt

68

Token Ring

e. If unable to reconfigure automatically, manual intervention is required.

3. Recognizing a Computer.a. When a new computer comes online the initialization includes:

(1) Checking for duplicate addresses.(2) Notifying others of its existence.

Page 69: CS56ch03.ppt

69

Hub showing the internal ring and clockwise token path

Token Ring

3. Hardware ComponentsA. The Hub1. Overview

a. Token ring hub is known by several names:(1) MAU (Multistation Access Unit)(2) MSAU (MultiStation Access Unit)(3) SMAU (Smart Multistation Access Unit)

b. The hub’s internal ring automatically converts to an external ring at each connection point when a computer is connected.

Page 70: CS56ch03.ppt

70

Token Ring

2. Capacitya. IBM MSAU has 10 connection ports creating a logical ring of eight stations (two other ports extend the ring).

 Some MSAU units are passive. For example, the IBM 8228.

 b. Up to 33 hubs on a ring supporting 72 computers that use UTP or 260 that use STP on a MSAU-based network.

 Other vendors offer hubs with more capacity; capacity depends on the vendor and the hub model.

Page 71: CS56ch03.ppt

71

Token Ring

c. Hubs must be connected in a ring; ring-out on one hub must connect to ring-in on the adjacent hub.

d. Patch cables connect many MSAUs on top of each other while still forming a continuous ring.

Page 72: CS56ch03.ppt

72

Token Ring

3. Built-in Fault Tolerancea. NIC failure should bring down ring.b. MSAU will sense a failed NIC and disconnect from it.c. Faulty computer or connection will not affect rest of network.

Page 73: CS56ch03.ppt

73

Token Ring

B. Cabling1. Overview

a. IBM Type 1, 2, 3; usually Type 3 UTP cabling.b. IBM states maximum cabling distance MSAU to computer is 46 meters (150 feet), although some vendors say 152 meters (500 feet).c. Maximum distance from one MSAU to another is 152 meters (500 feet).d. Single Token Ring can accommodate only 260 computers with STP cable and 72 computers with UTP cable.

Page 74: CS56ch03.ppt

74

Token Ring

2. Patch Cablesa. Extend connection between computer and MSAU or between two MSAUs.b. IBM Type 6, up to a maximum of 46 meters (150 feet).

3. Connectorsa. Media interface connectors (MICs), also known as universal data connectors, connect Types 1 and 2 cable.b. Neither male nor female so they can be connected together.c. RJ-45 for 8-pin connection for Type 3 cable.d. RJ-11 for 4-pin connection for Type 3 cable.

Page 75: CS56ch03.ppt

75

Token Ring

e. Media filter required to make connection between Token Ring interface card and standard RJ-11/RJ-45 telephone jacks.

4. Media Filtersa. Required with Type 3 telephone twisted-pair cable.b. Convert cable connectors and reduce line noise.

5. Patch Panelsa. Organize cable that runs between a MSAU and a telephone punchdown block.b. Punchdown block is a kind of hardware that provides terminal connections for bare network cable ends.

Page 76: CS56ch03.ppt

76

Token Ring

6. Repeatersa. Increase Token Ring cable distances.b. Actively regenerates and retimes the Token Ring signal.

7. NICsa. Either 4 Mbps or 16 Mbps.b. If the network is a 4 Mbps network, the 16 Mbps cards can be used, but will revert to 4 Mbps mode (16 Mbps networks will not accept slower 4 Mbps cards because they cannot speed up).

 Different speed cards can exist on different logical segments.

Page 77: CS56ch03.ppt

77

Token Ring

8. Fiber-Optic Cablea. Well suited for unidirectional, high-speed fiber-optic cable.b. Although more expensive, it greatly increases the range (up to 10 times that of copper).

Page 78: CS56ch03.ppt

78

Token Ring

4. Future of Token Ring Networks 

See Chapter 6 for discussion of protocols, routers, and bridges.

 A. Overview

1. Token ring is losing market share to Ethernet.2. Large companies are selecting Token Ring to support mission-critical applications.

B. Users of token ring face the following challenges:1. Complexity, manageability, cost and space requirements2. Bridge and segment congestion3. Upgrading to high-speed technologies

Page 79: CS56ch03.ppt

79

Token Ring

  See Token Ring specifications in Table 3.10 on page 151.

Page 80: CS56ch03.ppt

80

AppleTalk Network

  AppleTalk EnvironmentA. AppleTalk1. Overview

a. Apple Computer introduced AppleTalk in 1983 as proprietary network architecture for small groups.b. Built into Macintosh computers.c. AppleTalk Phase 2 is the current release of AppleTalk.

2. When a device attached to a LocalTalk network comes online, the following occurs in order:a. Device checks to see if it has stored an address from a previous networking session. If not, the new device assigns itself a random address from a range of allowable addresses.

Page 81: CS56ch03.ppt

81

AppleTalk Network

b. The device broadcasts the address to see if any other device is using it.c. If no other device is using the address, the device stores address for the next time it comes online.

AppleTalk network

Page 82: CS56ch03.ppt

82

AppleTalk Network

B. LocalTalk1. Overview

a. CSMA/CA access method in STP bus or tree topology.b. Cabling components include cables, connector modules, and cable extenders.c. Supports a maximum of 32 devices.d. Other vendors offer more robust solutions.

LocalTalk connector module with a LocalTalk cable

Page 83: CS56ch03.ppt

83

AppleTalk Network

Can also accept UTP or fiber-optic cable. 2. Not widely used by Ethernet or Token Ring because:

a. Maximum communication data rate is 230.4 Kbps.b. LocalTalk NICs for PC-compatible computers are obsolete.

C. AppleShare1. AppleShare is the file server on AppleTalk network.2. LocalTalk networks can be joined using zones.3. Each zone is a workgroup and is given a name.

 

Page 84: CS56ch03.ppt

84

AppleTalk Network

 

Workgroups are divided into zones to ease congestion.

Three zones joined together to form a larger network.

Page 85: CS56ch03.ppt

85

AppleTalk Network

D. EtherTalk1. EtherTalk allows AppleTalk to use Ethernet coaxial

cable (ThinNet or ThickNet).2. EtherTalk card allows a Macintosh computer to connect

and 802.3 Ethernet network.

E. TokenTalk1. TokenTalk connects Macintosh II to an 802.5 Token

Ring.2. Compatible with AppleTalk Phase 2.

F. AppleTalk considerations1. PCs and mainframes can use AppleTalk.2. Apple encourages third-party use of network.

Page 86: CS56ch03.ppt

86

AppleTalk Network

2. ArcNet EnvironmentA. Overview

1. Datapoint Corporation developed the Attached Resource Computer Network (ArcNet) in 1977.

 ArcNet predates IEEE Project 802 standards, but loosely maps to the 802.4 standard.

Simple Start-wired ArcNet network

Page 87: CS56ch03.ppt

87

AppleTalk Network

2. Simple, inexpensive, flexible network architecture designed for workgroup-sized networks.3. Token-passing bus networks using broadband cable.4. Star bus or bus topology.

 ArcNet is currently more expensive than Ethernet.

 B. How ArcNet works:

1. Token-passing access method in a star bus.2. 2.5 Mbps, although ArcNet Plus is 20 Mbps.3. Token moves in numerical order of card address, regardless of where it is on the network.

Page 88: CS56ch03.ppt

88

AppleTalk Network

| 4. ArcNet packet includes source and destination addresses, and up to 508 bytes of data.C. Hardware1. Hubs can be active, passive, or smart.

 Instructor Note Smart hubs have all the features of active hubs and usually add diagnostic features such as reconfiguration detection and operator control-of-port connections.

 2. Uses 93-ohm RG-62 A/U coaxial cable.

 Instructor Note Unlike active hubs, unused ports on passive hubs must be terminated; they can also use mixture of hubs and bus.

 3. Maximum cable length between active hub and workstation is 610 meters (2000 feet).4. Maximum distance between drops on a linear coaxial bus is 305 meters (1000 feet).5. Using UTP, maximum cable distance is 244 meters (800 feet) between devices on both star and bus topologies.

 Instructor Note Discuss ArcNet Specifications, Table 3.11 on page 159.

Page 89: CS56ch03.ppt

89

AppleTalk Network

| 4. ArcNet packet includes source and destination addresses, and up to 508 bytes of data.

Token movement based on numerical order

An ArcNet packet contains source and destination addresses

Page 90: CS56ch03.ppt

90

AppleTalk Network

C. Hardware1. Hubs can be active, passive, or smart. 

Smart hubs have all the features of active hubs and usually add diagnostic features such as reconfiguration detection and operator control-of-port connections.

 2. Uses 93-ohm RG-62 A/U coaxial cable. 

Unlike active hubs, unused ports on passive hubs must be terminated; they can also use mixture of hubs and bus.

Page 91: CS56ch03.ppt

91

AppleTalk Network

3. Maximum cable length between active hub and workstation is 610 meters (2000 feet).4. Maximum distance between drops on a linear coaxial bus is 305 meters (1000 feet).5. Using UTP, maximum cable distance is 244 meters (800 feet) between devices on both star and bus topologies.

 Discuss ArcNet Specifications, Table 3.11 on page 159.

Page 92: CS56ch03.ppt

92

AppleTalk Network

D. EtherTalk1. EtherTalk allows AppleTalk to use Ethernet coaxial cable (ThinNet or ThickNet).2. EtherTalk card allows a Macintosh computer to connect and 802.3 Ethernet network.E. TokenTalk1. TokenTalk connects Macintosh II to an 802.5 Token Ring.2. Compatible with AppleTalk Phase 2.F. AppleTalk considerations1. PCs and mainframes can use AppleTalk.2. Apple encourages third-party use of network.

|38|2. ArcNet EnvironmentA. Overview1. Datapoint Corporation developed the Attached Resource Computer Network (ArcNet) in 1977.

 Instructor Note ArcNet predates IEEE Project 802 standards, but loosely maps to the 802.4 standard.

 2. Simple, inexpensive, flexible network architecture designed for workgroup-sized networks.3. Token-passing bus networks using broadband cable.4. Star bus or bus topology.

 Instructor Note ArcNet is currently more expensive than Ethernet.

 B. How ArcNet works:1. Token-passing access method in a star bus.2. 2.5 Mbps, although ArcNet Plus is 20 Mbps.

|39|3. Token moves in numerical order of card address, regardless of where it is on the network.|40|4. ArcNet packet includes source and destination addresses, and up to 508 bytes of data.

C. Hardware1. Hubs can be active, passive, or smart.

 Instructor Note Smart hubs have all the features of active hubs and usually add diagnostic features such as reconfiguration detection and operator control-of-port connections.

 2. Uses 93-ohm RG-62 A/U coaxial cable.

 Instructor Note Unlike active hubs, unused ports on passive hubs must be terminated; they can also use mixture of hubs and bus.

 3. Maximum cable length between active hub and workstation is 610 meters (2000 feet).4. Maximum distance between drops on a linear coaxial bus is 305 meters (1000 feet).5. Using UTP, maximum cable distance is 244 meters (800 feet) between devices on both star and bus topologies.

 Instructor Note Discuss ArcNet Specifications, Table 3.11 on page 159.