UNIT 2-SCSA1502-Underlying LAN Concepts
UNIT 2-SCSA1502-Underlying LAN Concepts
DESIGN
UNIT - II
7/8/2024 1
SCSA1502-COMPUTER NETWORKS AND
DESIGN
7/8/2024 3
Definition of computer networks
Wireless Medium
Wire Connection
Typical network architecture
Image Courtesy:Basics of Computer Networking: What is, Advantages, Components, Uses (guru99.com)
SWITCHES / HUB
• Unlike a standard hub which simply replicates what it receives on one port
onto all the other ports, a switching hub keeps a record of the MAC
addresses of the devices attached to it.
• When the switch receives a data packet, it forwards the packet directly to
the recipient device by looking up the MAC address.
• In other words, say for instance you had a network of 5 PCs and a server all
connected with 10Mbps UTP cable, with a hub the throughput (10Mbps)
would be shared between each device, with a switch each device could
utilize the full 10Mbps connection.
HUBS
5. In bridge, routing table is not used. While in routers, routing table is used.
Bridges are good for segment network and While Routers are good for joining remote
10.
extends the existing network. networks.
GATEWAY
➢ Gateway is considered as a networked
device that acts as an entry point from
one network to other networks
➢ Gateway is a device that connects
dissimilar networks.
➢ Establishes intelligent connection
between a local network and external
networks with completely different
structures
➢ A gateway acts as a safeguard to all
local networks and connects the local
networks to public networks.
➢ It acts as the entry – exit point for a
network since all traffic that flows across
the networks should pass through the
gateway. Only the internal traffic between
the nodes of a LAN does not pass
through the gateway
CLASSIFICATIONS
Types of Computer Networks
• Networks are classified depending on the geographical area
covered by the network
Computer
Networks
• Mail server
• Application server
• Message server
• Proxy server
• Database server
• Web server
Peer to Peer network
➢This model does not differentiate the clients and
the servers
➢In this each and every node is itself client and
server.
➢In Peer-to-Peer Network, Each and every node can
do both request and respond for the services.
Peer to Peer network
➢ In the P2P (Peer-to-Peer) network, “peers” generally
represent computer system.
➢ These peers are connected to each other with help
of Internet.
➢ Files might be shared directly without requirement
of central server among these systems on the
network.
➢ In this architecture, system is generally
decomposed into various computational nodes that
contain the same and equivalent capabilities,
abilities, and responsibilities.
Advantages and disadvantages
• Topologies
• Transmission medium
• Layout
• Medium access control
Topology
➢Coaxial Cable
• If you must place cable in environments with lots of potential interference, or if you must
place cable in extremely sensitive environments that may be susceptible to the electrical
current in the UTP, shielded twisted pair may be the solution. Shielded cables can also help
to extend the maximum distance of the cables.
• There is a foil or braid shield inside the jacket covering all wires (as a group).
• There is a shield around each individual pair, as well as around the entire group of wires
(referred to as double shield twisted pair).
Coaxial Cable
• Test every part of a network as you install it. Even if it is brand new, it
may have problems that will be difficult to isolate later.
• Stay at least 3 feet away from fluorescent light boxes and other
sources of electrical interference.
• If it is necessary to run cable across the floor, cover the cable with
cable protectors.
• Use cable ties (not tape) to keep cables in the same location together.
Wireless LANs
❖ Open System Interconnection (OSI) reference model is the result of this effort.
❖ The OSI model describes how data flows from one computer,
through a network to another computer.
❖ The OSI model consists of seven separate but related layers, each of
which defines a part of the process of moving information across a
network.
Seven layers of the OSI model
Why so many layers?
➢ The physical layer is responsible for movements of individual bits from one
node to next.
Functions of Physical Layer
❖ The data link layer is responsible for moving frames from one node
to the next.
Functions of Data Link Layer
❖ Framing:- divides the data from N/W layer into frames.
❖ Feedback:- after transmitting the frames, the system waits for the feedback.
Network Layer
Functions of Network layer
❖ Error Control: Make sure that the entire message arrives without
errors else retransmit.
❖ Dialog Control: The session layer allows two systems to enter into a
dialog.
❖ Provides User interfaces and support for Services, like e- mail, file
transfer.
Functions of Application Layer
Requirements:
• A CPA firm with 5 departments
• Total of 560 employees
• One building
• No current LAN operating
• Need for easy future expansion
• Need for fast access for each department
• Reliability of the network
LAN design for Small business
Design goals
• Functionality - the network must work with reasonable speed
and reliability.
• Scalability - the network must be able to grow without any
major changes to the overall design.
• Adaptability - the network must be designed with an eye
toward future technologies, and should include no element
that would limit implementation of new technologies as
they become available.
• Manageability - the network would be designed to facilitate
network monitoring and management.
Network design outline
• Business issues
• Technology issues
• Administrative issues
Some datas to be gathered
➢ Corporate Structure – small CPA firm with 560 employees.
➢ Business information flow - ?
➢ Applications in use - ?
➢ Current topology - NONE
➢ Performance characteristics of current network - N/A
➢ Determine if documented policies are in place - ?
➢ Mission-critical data - ?
➢ Mission-critical operations - ?
➢ Approved protocols and platforms - ?
➢ Control versus distributed authority - ?
➢ Availability requirements –
➢ Throughput
➢ Response time
➢ Access to resources
Network load analysis
• Client/Server applications
• Host/terminal applications
• Routing protocols
• Regularly scheduled services, such as file backup
• Estimate worst-case traffic load during the busiest
times for users and during regularly scheduled
network services
Step 2: choosing and developing topology
• Keeping in mind the first step requirements
choose a suitable topology.
➢ 10BASE2 coax cables have a maximum length of 185 meters (607 ft).
➢ The maximum practical number of nodes that can be connected to a 10BASE2
segment is limited to 30 with a minimum distance of 50 cm.
10Base-T
➢ Cables look like thick phone cables, but with 8 copper wires instead of 2 or 4, and
they go from each computer' to a Hub or a Switch.
➢ The maximum length of the twisted cable here is defined as 100m,to minimize the
effect of attenuation in the twisted cable
10Base-F
89
Preamble
90
IEEE 802.3 Frame Format
Preamble SFD D Address S Address
• Source Address
– Contains either 2 bytes or 6 bytes
• Destination Address
– Contains either 2 bytes or 6 bytes
– For ordinary addressing the higher order bit is 0
– For group addressing the higher order bit is 1
i.e Multicasting
– For Broadcasting of the frame in the network all the
bits are made as 1’s
91
IEEE 802.3 Frame Format
Preamble SFD D Address S Address Length
Length
–Tells how many bytes are present in the data field 0 to a
maximum of 1500
92
IEEE 802.3 Frame
Format
Preamble SFD D Address S Address Length Data Pad Checksum
• Pad field
If the data portion is less than 46 bytes, the pad field
is used to fill out the frame to the minimum size of
64 bytes
• Checksum
The Checksum is used to detect if any data bits
have been corrupted during transmission
93
Types of Ethernet
Fast Ethernet
➢ Fast Ethernet is an Ethernet standard for 100-Mbps data transmission
defined by the IEEE 802.3u specification.
➢ It can transmit data 10 times faster at a rate of 100 Mbps.
➢ Fast Ethernet is used for departmental backbones, connections to
high-speed servers, and connections to workstations running
bandwidth-intensive software such as CAD or multimedia
applications.
➢ uses the same Carrier Sense Multiple Access with Collision
Detection (CSMA/CD)
➢ They are generally wired in a star topology using special Fast Ethernet
hubs and switches.
Topology used in Fast Ethernet
Varities of Fast Ethernet Cables
Gigabit Ethernet
➢ The need for higher data rate resulted in the design of the Gigabit Ethernet (1000
Mbps).
➢ The IEEE committee calls the standard 802.3z.
➢ All configurations of gigabit Ethernet are point to point.
➢ Point-to-point, between two computers or one computer – to –switch.
➢ It supports two different modes of operation: full duplex mode and half duplex
mode.
➢ Full duplex is used when computers are connected by a switch.No collision is there
and so CSMA/CD is not used.
Goals of Gigabit Ethernet
➢ Upgrade the data rate to 1Gbps.
➢ Make it compatible with standard or fast Ethernet.
➢ Use the same address ,frame format.
➢ Keep the same minimum and maximum frame length.
➢ To support auto negotiation as defined in Fast Ethernet
Gigabit Ethernet
to switch.
➢ The plug-in card checks to see if the frame is for the other
SOF fields.
➢ The destination and source addresses are inserted into the address
fields.
➢ The LLC data bytes are counted, and the number of bytes is inserted
➢ The LLC data bytes are inserted into the Data field. If the number of
LLC data bytes is less than 46, a pad is added to bring the Data field
length up to 64.
➢ An FCS value is generated over the DA, SA, Length/Type, and Data
the CSMA/CD.
Priority bits and reservation bits help in implementing priority. Priority bits =
reservation bits = 3. Eg:- server is given priority = 7 and client is given priority = 0.
Token bit is used to indicate presence of token frame. If token bit = 1 –> token frame
and if token bit = 0 –> not a token frame.
Monitor bit helps in solving orphan packet problem. It is covered by CRC as monitor
are powerful machines which can recalculate CRC when modifying monitor bit. If
monitor bit = 1 –> stamped by monitor and if monitor bit = 0 –> not yet stamped by
monitor.
Token Ring Frame Format
Frame control (FC) – First 2 bits indicates whether the frame
contains data or control information. In control frames, this byte
specifies the type of control information.
•Destination address (DA) and Source address (SA) – consist of two 6-byte fields
which is used to indicate MAC address of source and destination.
•Data – Data length can vary from 0 to maximum token holding time (THT)
according to token reservation strategy adopted. Token ring imposes no lower
bound on size of data i.e. an advantage over Ethernet.
•Cyclic redundancy check (CRC) – 32 bit CRC which is used to check for errors in
the frame, i.e., whether the frame is corrupted or not. If the frame is corrupted, then
its discarded.
Token Ring Frame Format
•End delimiter (ED) – It is used to mark the end of frame. In Ethernet, length field is
used for this purpose. It also contains bits to indicate a damaged frame and identify
the frame that is the last in a logical sequence.
It makes use of 2 copies of AC bits are used as a error detection mechanism (100%
redundancy) as CRC does not cover FS byte so that destination does not have to
recalculate CRC when modifying AC bits.
FRAME
Starting delimiter and ending delimiter mark the
beginning & ending of the frame.
Access control consist of token bit, monitor bit,
priority bit.
Destination address & source address fields gives the
address.
Checksum field is used to detect transmission errors.
132
Frame status field
133
IEEE 802.5 (Token Ring): Ring Topology
⚫ Shared ring medium: all nodes see all frames
⚫ Round Robin MAC Protocol: determines which station can transmit
⚫ A special 3-byte pattern, the token, circulates around the ring perpetually and
represents the "right to transmit"
⚫ This establishes round-robin media access
⚫ Data flow is unidirectional
⚫ All data flows in a particular direction
around the ring; nodes receive frames
from their upstream neighbor and forward
them to their downstream neighbor
⚫ Data rate: 4 or 16 Mbps
R
R R
R
IEEE 802.5 (Token Ring) Operation
⚫ The token bit sequence circulates around the ring.
⚫ Each station forwards the token if it does not have a frame to transmit.
⚫ A station with data to send seizes the token (repeater now in transmit state)
and begins sending it’s frame. It can transmit for length of time called the
Token Hold Time (THT) = 10 mseconds.
⚫ Each station forwards the frame.
⚫ The destination station notices its address and saves a copy of the frame as it
also forwards the frame.
⚫ When the sender sees its frame return, it drains it from the ring and reinserts
a token. When the last bit of the returning frame has been drained, the
repeater switches immediately to the listen state.
IEEE 802.5 (Token Ring) using a Hub
⚫ The star-wired ring topology uses the physical layout of a star in conjunction
with the token-passing data transmission method. Data are sent around the
star in a circular pattern. This hybrid topology benefits from the fault
tolerance of the star topology and the reliability of token passing.
IEEE 802.5 (Token Ring): Bypass relays
and Wire Center
⚫ Bypass relays protect ring topology from node failure at the hardware level.
IEEE 802.5 (Token Ring) Frame Format
• Start delimiter (1 byte): serves the same basic purpose as the preamble in an Ethernet frame.
• Access Control (1 byte): contains the token bit, monitor bit, and priority bits
• Frame Control (1 byte): contains access control information
• Destination Address (6 bytes)
• Source Address (6 bytes)
• Data (no size limit specified): this is the actual data being sent (IP packet). Since the THT = 10 mseconds, practical
size limit of the frame is 4500 bytes.
• Frame Check Sequence (4 bytes): CRC error checking bits
• End Delimiter (1 byte): signifies the end of the frame
• Frame Status Field (1 byte): serves as the ACK and indicates whether the address was recognized and the frame
copied, which is done by the receiving computer before being sent back around the ring
IEEE 802.5 (Token Ring): Ring
Maintenance
⚫ There is a special station on the ring called a monitor station. It is
responsible to identify and address situations dealing with a lost token and an
orphan frame.
⚫ Lost Token:
⚫ Monitor station knows the number of stations on the ring and so calculates
maxTHT = n * THT (n is the number of stations on the ring). It keeps a timer of
how long since it last saw the token pass by. If this is more than maxTRT, it drains
the ring and inserts a new token in the ring.
⚫ Orphan frame:
⚫ A frame can get orphaned if the sending station goes down before it can drain it’s
frame. As a frame passes by the monitor, it sets the "monitor" bit in the header of
the frame. If it sees a frame with this bit already set, it knows it is an orphan frame.
Then the monitor drains the ring and inserts a new token in the ring.
IEEE 802.5 (Token Ring)
Performance
⚫ Under light load conditions where few stations have data to send, token ring
performance is fair but there is an overhead of passing the token.
⚫ Under heavy load condition where most of the stations have data to send,
performance is excellent and utilization approaches 100%. The token is fully
utilized in this case.
IEEE 802.3 (Ethernet) vs IEEE
802.5 (Token Ring)
⚫ Ethernet is widely used at present (> 90% market share). People are
experienced in using this technology.
⚫ Ethernet uses CSMA/CD as the MAC protocol while Token Ring uses Round
Robin protocol.
⚫ Token Ring uses point-to-point connections between ring interfaces so that
the electronic hardware can be fully digital and simple. There is no need for
collision detection. The Ethernet NIC card requires some analog circuitry to
be able to detect collisions.
⚫ Token Ring has excellent throughput at high loads since there is no
possibility of collisions unlike 802.3.
⚫ Under light load, Token Ring experiences token passing overhead. Ethernet
has no such overhead and has excellent performance at light loads.
IEEE 802.5 (Token Ring) Token
Frame Format
IEEE 802.5 (Token Ring)Frame Format Details
⚫ The access control byte contains the priority and reservation fields, as well
as a token bit (used to differentiate a token from a data/command frame)
and a monitor bit (used by the active monitor to determine whether a frame
is circling the ring endlessly).
⚫ The frame control byte indicates whether the frame contains data or control
information. In control frames, this byte specifies the type of control
information.
⚫ The frame status byte is only present in Token Ring frames. It contains the
A and C bits.When a frame arrives at the interface of a station with the
destination address, the interface sets the A bit (=1), as it passes through. If
the interface copies the frame to the station, it also sets the C bit (=1). A
station might fail to copy a frame due to lack of buffer space or other
reasons.
⚫ When the station which sent the frame strips it from the ring, it
examines the A and C bits.The three possible combinations are;
1. A=0 and C=0; Destination not present or powered up.
2. A=1 and C=0; Destination present but frame not accepted.
3. A=1 and C=1; Destination present and frame copied.
⚫ This arrangement provides an automatic acknowledgment of the
delivery status of each frame.
IEEE 802.5 (Token Ring) Hierarchical
Setup
Integrating Voice and LAN
Infrastructures and Applications
➢ INTEGRATION OF VOICE AND LAN NETWORKS will be an
essential IT strategy for many businesses in the next three
to five years.
➢ Consolidating the long separate voice and data networks
has implications not only for the network infrastructure,
but also for the PC, the telephone set, the PBX, and the IT
organization itself.
➢ road map to guide organizations in making the right voice
LAN-related investment decisions.
PROBLEMS ADDRESSED
➢Voice LAN is the transmission of voice traffic over a
LAN infrastructure.
➢Voice LAN enables server-based telephony
architecture for voice switches, terminals/phone
sets, and Applications.
➢Today, voice traffic is transmitted across a separate
circuit-switched infrastructure with a PBX or key
system (for smaller offices) serving as a centralized
switch.
➢Under a voiceLAN scheme, both data and voice
traffic are interleaved and switched as frames or
cells over the same data network.
Reasons for running their voice traffic
over the LAN infrastructure
➢Single infrastructure
➢Single organization
➢Breaking PBX lock-in
MIGRATING THE LAN INFRASTRUCTURE
• A first step in deploying voiceLAN is to upgrade the present
LAN infrastructure to support the demands of voice traffic
without affecting the flow of existing data traffic.
• Infrastructure refers to the cabling plant and the local
networking equipment used to carry traffic from end station
to end station (i.e., hub, bridge, router, switches, and network
adapters).
• The PBX is not considered part of the infrastructure in a
voiceLAN environment; rather, the PBX will evolve into a call
server that can be considered another type of end station on
the LAN.
Solutions for Delay-Sensitive
Applications
➢ Voice needs only 64 Kbps, and compression or packetization reduces bandwidth
requirements further.
latency.
➢ Desktop Switching
➢ Minimize Routing
➢ ATM-centric approaches
Frame Switching/IP-based Solution
➢ RSVP, which was developed by the IETF and leading network product
vendors, operates by reserving bandwidth and router/switch buffer space
for certain high-priority IP packets such as those carrying voice traffic.
➢ ATM25 provides all of the QoS benefits of higher-speed ATM and can be
used to build end-to-end ATM networks.
➢ ATM25 can also operate over Category 3 UTC cable, whereas 155 Mbps
ATM and Fast Ethernet require organizations to upgrade their UTP cabling
to Category 5 UTP cable.
➢ The desktop switch then terminates the IP connection and converts the
voice payload to ATM cells for transmission across the backbone (or the
desktop switch may forward these IP datagrams across the ATM backbone
without terminating the IP connection).
➢ The desktop switch is also responsible for mapping the RSVP bandwidth
reservation request (at the IP level of the architecture) to an appropriate
ATM QoS for the ATM connection.
Ethernet CIF Access
➢ CIF allows a desktop application to place voice traffic in ATM
cells that are subsequently inserted into Ethernet frames by
the network adapter driver for transport over the link from
the adapter to switch. At the Ethernet switch, cells are
extracted from the frames and sent across the ATM
backbone.
➢ CIF’s ability to guarantee quality of service comes at a price.
CIF requires installation of special software or NIC drivers in
workstations to accomplish the framing of ATM cells. In
addition, transporting traffic inside of ATM cells, which are in
turn encapsulated by frames, entails significant overhead,
reducing the usable bandwidth on an Ethernet segment to 6
Mbps to 7 Mbps.
CONSOLIDATION OF THE CABLING
PLANT
➢No matter what technology is used for voice
transport (i.e., ATM or IP), voiceLAN deployment
requires optical fiber in the risers of buildings for
backbone connectivity.
➢Most large organizations have already installed fiber
for their LAN backbone and therefore no upgrade to
the cabling plant is necessary.
Legacy voice and data cabling
infrastructures
Consolidated cabling infrastructure
MIGRATING THE DESKTOP
• Next Generation:
– Thin coax cable (10Base2)
– Thinnet.
• Modern Ethernet:
– Twisted pair ethernet
(10BaseT)
– Uses hub: physical star but
logical bus.
Ethernet Components
Sender adds:
– Senders address is source
– Recepients addreess in destination
– Type of data in frame type
– Error check data (CRC)
Receiver NIC:
– Gets transmitted frame.
– Examines address and either accepts or rejects.
– Passes frame to system software.
Ethernet FRAME FORMAT
Ethernet FRAME FORMAT
1.PREAMBLE – Ethernet frame starts with a 7-Bytes Preamble. This is a pattern of
alternative 0’s and 1’s which indicates starting of the frame and allow sender and
receiver to establish bit synchronization. Initially, PRE (Preamble) was introduced to
allow for the loss of a few bits due to signal delays. But today’s high-speed Ethernet
doesn’t need Preamble to protect the frame bits. PRE (Preamble) indicates the
receiver that frame is coming and allow the receiver to lock onto the data stream
before the actual frame begins.
2.Start of frame delimiter (SFD) – This is a 1-Byte field that is always set to
10101011. SFD indicates that upcoming bits are starting the frame, which is the
destination address. Sometimes SFD is considered part of PRE, this is the reason
Preamble is described as 8 Bytes in many places. The SFD warns station or stations
that this is the last chance for synchronization.
3.Destination Address – This is a 6-Byte field that contains the MAC address of the
machine for which data is destined.
4.Source Address – This is a 6-Byte field that contains the MAC address of the source
machine. As Source Address is always an individual address (Unicast), the least
significant bit of the first byte is always 0.
Ethernet FRAME FORMAT
1.Length – Length is a 2-Byte field, which indicates the length of the
entire Ethernet frame. This 16-bit field can hold a length value
between 0 to 65534, but length cannot be larger than 1500 Bytes
because of some own limitations of Ethernet.
2.Data – This is the place where actual data is inserted, also known
as Payload. Both IP header and data will be inserted here if Internet
Protocol is used over Ethernet. The maximum data present may be as
long as 1500 Bytes. In case data length is less than minimum length
i.e. 46 bytes, then padding 0’s is added to meet the minimum possible
length.
3.Cyclic Redundancy Check (CRC) – CRC is 4 Byte field. This field
contains a 32-bits hash code of data, which is generated over the
Destination Address, Source Address, Length, and Data field. If the
checksum computed by destination is not the same as sent checksum
value, data received is corrupted.
Media Access Control - MAC
• Shared medium – stations take turns at sharing the medium.
• Media access control ensures fairness.
CSMA / CD
• Carrier Sense: wait till medium is idle before sending frame.
• 100Base-LX
– Long wavelength laser (1310 nm)
– Max distance = 5 km.
Beyond Gigabit Ethernet
• 10 Gb/s Ethernet
– No CSMS/CD, same frame format.
• Applications
– Upgrade LANs / Backbone.
– MAN applications.
ATM LAN Emulation
➢ LAN emulation allows users of an ATM network to run
any higher-layer protocol in its existing state without
requiring any changes.
➢ LANE is a method of performing basic bridging
functionality between a host on an ATM-attached
bridge and an ATM-attached host, or between two ATM
attached hosts.
➢ Because LANE masks much of the complexity from users
while allowing them to benefit from ATM, it has
become the standard of choice for transporting data
traffic across heterogeneous networks
GOALS OF LANE
• To provide seamless and transparent bridging between an
arbitrary number of hosts, where the hosts may be ATM
native or connected to the ATM cloud via an interworking
device.
• To support the goal of transparent operation, the
connection-oriented nature of ATM is concealed. To allow
seamless operation, features found in the shared-medium
domain such as broadcast are emulated.
• Ease of use is addressed at the outset by designing in
support for services, including automatic configuration and
address registration, that allow true plug-and-play
operation. A secondary goal is simplicity of design.
ATM LAN Emulation
LAN
ATM Network
LAN
LAN Emulation Emulation
LES/BUS Bridge
(LEC)
LECs
ELAN 2
(Ethernet) Ethernet
Bridge
LECs (LEC)
ELAN 3
(Token Ring)
LECS
LES/BUS
LAN Emulation
Configuration Server
(LECS)
Bridge
Workstation
LAN Emulation Server
(LES)
Control Connection
LUNI Interface
Data Connection