0% found this document useful (0 votes)
16 views18 pages

Unit 3 Comp

Computers

Uploaded by

Jassi Saini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
16 views18 pages

Unit 3 Comp

Computers

Uploaded by

Jassi Saini
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 18
Introduction to lan technologie, SS local area network 1870s; as the technology Inufacturers. 80, A LAN has the folowing main Characterisatos * The geographical distance that a . AN covers is confined to less than § km, The data rates exceed 1 Mops, ‘The physical connection ‘medium is owned privately, ° The physical connection medium 'S shared by the connected stations, Components ° Hu ° Repeater * Bridge * Switches * Routers ° Gateways operating System an ing systems are erating van Linux jindows . wi 7.0 lovell Dos . 5/2. . os © unix i implementation) ission Media (or LAN imp! ‘Transmission LAN gh3 ‘Transmission media for LAN are : (a) Wired LAN © Coaxial Cable . Twisted Pair Cable e Fiber Optic Cable (b) Wireless LAN . Radiowave Transmission ¢ Infrared Transmission 8.1.4 LAN Topologies jes used for LAN are The Topol © Ring Topology © Bus Topology © Tree Topology © Star Topology 8.2 The IEEE Standard (or LAN Standard) LAN standards are dominated by four types of architectures Ethemet or CSMAICD, i) Token bus, i) Token Ring ‘) FDI (Fiber Distributed Data Interface) ‘These LAN standards are known as IEEE fe of Electrical and Ele, *CtOning Engineers) ‘ngineers) standards that are part of IEEE Project 802 IEEE Project ao2 he is set the the standards for various configurations of Lat NS. It coy vers layers of th W/o he Ot mal and pa of te ier, Pra ae he O5 mod io we pare: anes © MAC ‘ oS \C (Media Access Coy seh ore et eee ae Hog eee © LLC (Logical Link Control LLC is comm. 3Mmon for all conti figurations of LANs while MAC is specific t cific to each LAN n. The functions LAN management have been subdivided roups : One is is a set of tuncto ‘tions common to all networks and th 1e other speci to into following standards 'EEE 802.1 (Internetworking) IEEE 802.2 (Logical Link Cont) * IEEE 802.9 (Etnemot or CSMACD) © IEEE 802.4 (Token Bus) * IEEE 802.5 (Token Ring) © IEEE 602.6 ( uted Queu led Queue Dual Bus (0aDB) MAN) 4.3 Ethernet (or IEEE 802.3 standard) poieeeat? sponsors standards dealing wth broadoand LANs under 802.7, optical poor AN enor 802.8 and security aspects for LANs is 802.10, Wireless LANs jr so2-7t ave aso underdevelopment standard according to syllabus inthis chapter, we wil isu the «IEEE 802.3: Ethernet e_ IEEE 802.5 : Token ring ss LAN «IEEE 802.11 ferface (FDD!) e Fiber - distributed data the most popular rere are various technologies available in the LAN market but led as ethernet Thi 2 standard is popularly one of them is Ethernet. The IEEE 802. artier Sense Multiple Access/Colision Detect) or CSMAICD (CF hod of ethernet LAN 8.3.1 Access met! transmit, it works use CSMAICD. When a station wants sn waits uni it goes idle; otherwise Standard ethernet nel tne cable is busy, the stato 1 more stations simultaneously begin tans yasmission, sitting on tens to the cabl immediately two oF je. Allcolliding stations then’ whole process all over again. terminate th tran: anidle cabl wait a random time, and repeat the 1 model as shown in fig. 8.1. they wi SMAICD uses the concept fame. Any other station has finished transmitting il two of more stations decide t0 ‘At point marked fy & mo to send may now attempt t0 do So having a frat tranemi simutancousl, there wil De 2 coUlson. [1971 of time and then tries again, assuming that no othe! ion has started trangm in the meantime. Therefore, CSMA/CD model will consist of alternating con ter Frame Transmission Contention period period FIGURE 6.1 -3.2 802.3 Cabling ‘The name Ethernet refers to the cable (the ether). Four types of cabling are commoniy used. © 10Base 5 © 10Base2 © 10 Base-T © 10 Base-F (a) 10 Base 5 (or thick Ethernet) 10 Base 5 means that it operates at 10 mbps, uses baseband signaling, and can support segment of upto 500 meters. 10 Base 5 cabling, popularly call thick Ethernet or thicknet. The name thicknetis due to the use of thick coaxial cabie. It uses 50-ohm coaxial cable. The thicknet uses the bus topology. Type of signaling technique is Manchester digi ing, Maximum length of cable is 500 m. We have to use repeaters.f the length segmer seg to be increased further. At the most four repeaters are allowed to be used. Hence the effective length of the medium is 2.5 km. wW jo Base 2 (Thin Ethernet) ) walls @rando ™ Dey oy @ and age 2 means that it operates at 10 mbps, uses baseband sion yment of upto 200 It uses a relatively thin coaxial cable is also possible to combine 10 base 2 and 10 base 5 Iso uses a 50-ohm 408 ‘can support seat \d bus topology. network as they have same data rates. .d Manchester signalling. an segments ina coaxial cable an 40 Base-T ‘This is also called T -twisted-pair.Ituses of 10 Mbps and topology. The advantage of plein any building. visted:pair Ehemet and the Tin 10 Base-T stands for baseband Manchester sia supports 2 data length o uses a star is easily a sted by repeaters. This alternative iS expen: be connect is further divided multiple cables can putit has excellent noise immu into three specifications 40 Base FP (P for Passive) ink) ty. This standard 10 Base 4 Base FL (Lor for Backbone) 8.3.3 802.3 MAC frame format [MAC frame format for 802.3 is shown in figure 8.2: (Preamble ‘is 27-bytes pattem of atemating O's and 1's that are used for synchronic ization, Start Frame Delimiter (SFD) 'S of one byte, thatis, 8 sequence 1010101 to denote the actual star oft n Address (DA) 5 & 16-bit or 48-bit adress ofthe receivingdestinaton stations(s). Source Address (SA) tis the address of () Length ansmitting station, Length field tells how many bytes are 0f 0 to a maximum of 1500. (vi) Data resent inthe data feld, from a minimum Data field contains the actual data of a variable len u,b ‘ath of 6 to 1500 bytes. Padbyes added to ensure thatthe frame isof size a pashan }PPropriate for CD operation, (wi 52nd ce Ueno most certainly be ror 'eeksum algorithm ig Wrong, and the be detected. The example of chy 4 cyclic redundancy check, (200) fea ee idged Ethernet wo can evice 0 LAN Us tnernet LAN ‘Thai increase the bandwidth, i bridges. Bridges have following two effects on an ‘they separate the collision domains. increasing the Bandwidth : Cs -wise, each network is independent. For example, infigue 8.3, network with 10 Ts dvided into two networks, each with 5 stains. Now each network Ras 2 i capacity of 10 Mbps. ‘A. Without bridging ‘8. with bridging FIGURE 83 .g Collision Domains Separatin Ye 2 smes much smaller and the probability without bridging, 10 Jy 5 stations contend ou can see thatthe colsion domain Deco reduced tremendously. From figure 8:3, ‘medium; with bridging ont nis ‘scontend for access to the: .gs to the medium, for acces [201] FIGURE 84 8.5.1 Full Duplex Sw ied Ethernet ‘communication on them is always ct next step ethernet as shown in Transmit Receive yi FIGURE 8.5 The fi ful ‘duplex mode splex mode increase the capacity of each domai ‘one transmit and one to receive, was to move from switched etherné The 10 Base 5 and 10 Base 2 Ethemets have a serious limitations. Th 1 ups Hall plex cans a sat receive at a time. It cannot send and receive simi Ren sneoUsly. The duplex switched rom 10 to 20 mbps. In luplex ethernet, we hi ind the switch, Plex ethemet, we have to use two links between the station and the swit station and the switch, [202] ipa fulkduplex sulched ethernet, hers no need for CSMAD, vation an ser and Fei dependent cleat forying about collision, 46 rast Ethernet -qnore aro three generations of Ethernet 4, Traditional Ethernet ‘Traditional Ethernet was created in 1976 and has a data rate of 10 mbps. 2, Fast Ethernet ‘The fast Ethemet operates at the data rate 100 mbps. 3, Gigabit Ethernet ‘The Gigabit Ethemet operates at the dat rate of 1000 Mbps, In this section, we will discuss fast Ether under the name 802.3u. It can trans of Fast Ethernet are IEEE created Fast Ethernet data a arate of 100 Mbps. The goals Upgrade the data rate to 100 Mbps. ‘Make it compatible with Standard Ethemet, Keep the same 48-bit address. fv) Keop the same frame format. {o) Keep the same minimum and maximum ram lenghs MAC sublayer : MAC sublayer of the fast Ethemet is same as that ofthe traditional Ethernet However a decision was made to drop the bus 19prioge ‘and keep only the star topologies. ‘Access method shod also remains the same. Itis CSMACD. However the fast plex protocol and does not need the CSMACD. ‘The access Ethernet is a ful frame format of fast Ethernet is same 2S that of the traditional Ethernet ame format of fast Ethernet i 203) el ‘Minimum and maximum frame lengths of the fast Etheme 400 Base TX Me BT sag, 5 as those of traditional Ethemet. Autonegotiation : This is the new feature of the fast Ethernet. The autonegot ‘negotiation on the mode or data rate of operation between d Hon will make th Jevc08 pose Iwas designed parti “ iy forthe following purposes : To allow incompatible devices o connect to one another, Fo 2 device with 2 maximum capacity of 10 Mbps can communi device with a 100 Mbps capacity example, icate with a To allow one device to have multiple capal © Toal Ww station to check a hub's capabilities, Implementation : Categories of Fast Ethemet implementations are given by Figure 8.6 Fast Ethernet 100 Base -Tx 100 Base x a liber optic cable (100 Base-Fx) * unicrectonal data rate of 100 Mbps, uses two Shielded Twisted-Pair (STP) or Unshielded Twisted Pair (UTP) cable of high quality (category 5) to connect a used to carry frames in one direction only. nto the hub. Each cable is 100 Base FX ttuses two optical fibers, one to cary frames from stations to central hub and 7. The distance between the hub and one in the reverse di be less than 2000 metres. 100 Base-T4 400 BASE-T4 uses four twisted pair ines between any two nodes in order to over a low quality cable. 100 BASE-T4 provides achieve 100 Mbps data alow cost option because it uses category 3 voice grade UTP or a higher (category 5) UTP. raBLe es “oo BASETK | 100 BASERK | 100 BASETE pat toes | pi * eau see Sign 9.4.05 Ur eo ‘or 2 pair STP 2. bata ae “oo wipe | 100 Nps | 100 pe 7 om 3 Maxim 700m 700 coment length watwor Span | 200m com 0m 8.7. Gigabit Ethernet -The gigabit Ethernet protocol has been designed inorder 10 support the data rates vo 1000 Mops. The IEEE committee cals the Standard 802.32, The ‘goals of the upto Gigabit Ethernet are = (2051 Ne 1. Upgrade the data rate to 1000 Mbps (1 Gbps). 2. Make it compatible with Standard or Fast Ethemet. 3. Use the same 48-bit address. 4. Keep the same frame format 5. Kee ea 2met but it does not re 4 8 snot remain so when the rate of 1 Gbps isto be supp : iigabit Ethernet is capat arom “apable of operating in either half duplex or full di iple; = ene ‘operates in the half tuplex mode, then the access method used is C: *SMAICD. le full duplex: duplex mode is used then CSMA/CD is not required. ‘al Layer Implementation We can categorize the Gigabit Eth ther wire or a four wire igabit Ethernet as either a two wire oF ir implementation. The two wre implementation is know as 1000 Base and the four ‘tte implementation is known as 1000 Base-T as shown in igure ‘i kr Base-T as shown in fi in figure 8, 1000 Base - (Tso wire) ‘een gee 1000 Base" our io) ‘00008 c008a20-Sx soo Bake tx 1000 Baso cx FIGURE 87 8.8 classified into three categories as shown in figure 8.7. the 1000 Base-SX and 1000 Base - LX use two fiber optic cables. The sase-SX usos a shortwave laser whereas 1000 Base - LX uses the longwave 1000 jagor. The 1000 Base-CX uses wo-te copper (STP) cable, 1000 Base-T uses twised pair cable (UTP). 1000 Base-T was designed in response to those users who had already in telephone services. lied this wiring for other purposes such as fast Ethernet or Token Ring (IEEE Standard 802.5) Ina token ring, a special bit pattem, known as token, circulates around the ring ‘when all the stations are idle. Every station seizes the token, transmit data and the next node in the ring. The length of the token first and then transmit passes the token station has a frame to sen the frame. “Token ing LANis the most suitable networkin the office environment. Aline stations a linked in the form of a ring. Then the token is removed from the network by the token. After completing the Each station is connected to the ring intwo fansmission, the station ‘changing a single bi reforms the token and inserts lerace as shown in figure 8.8. A ring interface can operate fo the network. through a different modes = 1, Listen mode coming bits are simply transmitted tothe output line In the listen mode, the inc no further action taken 2, Talk or Transmit Mode he talk or tan as aequired a token. The di disconnected as shown in figure 8.6 i: AES =e ‘smit mode, when the station connected input to output connection Ring interface is 5 to the ring interface hi throuigh the single bit but (207) , 1. Starting Delimiter (SD) ‘This isthe one byte fild that is used to mark the start ofthe frame, 2. Access Control (AC) ‘The access contro is also of one byte Iong and it contains moni bi, token bit and reservation 3. Frame Control (FC) 80 of one byte long anditis used to distinguish between 4. Destination Address (DA) ‘Tne destination address field is of 2 or 6 bytes long. DA field consists the physical address of the destination station, 5. Source Address (SA) The source address field is of 2 or 6 bytes long. This field consists of the physical address of the sending station. 6. Data 1 The length ofthe data field may be as long as required, provided that the frame Can stil be transmitted within the token-holding time. 7. Checksum Checksum field is 4 bytes long. Checksum Id is used to crosscheck the data atthe sending station. This field contains the total number of bytes in the frame. The number is checked the received frame. the receiver end, after counting the bytes in Tis field is of one byte long and itis used to mark the last frame in a logical i last frame in a logical 9. Frame Status (FS) This field is of one byte fong and is us Token tsar sed 0 check the status of the frame. compare between IEEE 802.3, g92,5 XN 202.3 8025 7, The maximum size ofthe frame | 4 in 802.3 is 1572 bytes. 2, Twisted pai ‘cable and fiber optic are used 3, Cable length is 50 m to 2000 m 4, The maximum size of the data field is 0 to 1500 bytes. ‘Tho maximum size ofthe frame in 60255 is variable. ited pair cable and fiber ic are used 3. Cable length is 50m to 1000m 4. There isno able, co-axial | 2 maximum size can be sent. 5, There is no provision of setting | 5. Priorities are possible, 6. Nocontrol maintenance 6. Adesignated monitor: performs maintenance. 8. The minimum frame size 8. ce ve o ceaigsmele, | 8 Poel moa eos Itcan support shorter frames as 8.10 FDDI tic token fing Fiber Distributed Data Interface (FDD) isa high-performance fiber opt 10 802.5 token ring, except the diference that FODI runs on fiber, 802.5 token ring, © if 1s on fiber . . tances of upto 200 km with Upto LAN. Itis similar f rot copper. FDDI is operating at 100 mbps o¥= ‘er common use of FODI is that itact as a ‘backbone ions connected. Anothi 1000 st 1. to connect copper LANs, as shown in figure 8. Toten ing ms J FOD ani fe er ngs, one arsine det ad he other in ant ‘ rams nanos (or coutercciws)descton as shown In tigre 8.12. IFeither ther one breaks, other can be used in place of it If both the rings break at the same point, they can be joined into a single ring. “ ® FIGURE 8.12 FDDI defines two types of stations; A class station, and B class station, Class A tations; A class station, and B class station. Cl , . Class stati tion connects to both the rings, and class B st ns only connect to one of the rings. p10 | FDI Frame Format The FDDI frame format consists ofthe fields as shown in fique 8.13, pytes 28 206 20r6 Nott Destnaten | source secs (08) | Aaaoss sa | rr | ning Del Frame Satur Frame Convat Starting Dati FIGURE 8.13 1. Preamble Id is 8 bytes or more than 6 bytes long. Preambl Preambl synchronize the receivers clock with the senders clock. 2. Starting Delimiter (SD) 1 is used to mark the start of the frame. The starting 3. Frame Control (FC) FC field defines the frame type (whether data or contol frame). Destination Address (DA) 5 field is of 2 or 6 bytes. DA field the ‘The destination addres physical address of the destination machine. 5, Source Address (SA) dis of 2 or 6 bytes. Tis feld consists ofthe physical ‘The source address lions. sna condina sl ie 6 Data ‘The length ofthe data field may be as long as required, provided 1) hatte the token-holding time. an can sill be transmitted wi Checksum Checksum field is 4 bytes long. Checksum field is used to FOSsch, 1ECk the Sin the bytes in aaa the sending station. Tis fed contains the total numberof bya frame, The number is checked at the receiver cot oe 1e number is checked at end, after counti , inting the the received frame, 8. End Delimiter (ED) This elds of on 'e byte and itis used to mark the last frame in a lo gical sequen. ce, 8. Frame Status (FS) This field is of Cf one byte and itis used to check the status of th Is of the frame. 8.11 Wireless LANs (IEEE 802.11) ¥ fastest-growing technologies. The demand growing ies, . nc forconnectt ing devices witho Nt {he use of cables is increasing everyw where. Wireless LANs can be ound on college campuses, in office idings, in hospitals, stock lk S, in office buildings, in hospital 7 itals, ex: ‘changes and in many public a lic areas, Wireless LAN has become py ular due to ease of inst location r due to ea: st nm, and I freedom wit ith the gainin ing popularity of 'aptops, Wireless LAN uses wireless commun; IEEE has defined the speci ‘covers the physical and data link layer. FIGURE 6.14 for a wireless LAN, called IEEE 802.11, which 8.11.1 Architecture ‘The 802.11 standard (or Wireless Lan) defines two kinds of services Basic Service Set (BSS) Extended Service Set (ESS) Basic Service Set (BSS) ne basic series set contains stationery or wireless stations als led Access Point (AP). If a basic services set ‘0 contains central base station that is, contains Access Point, then only it ean communicate with other BS Js point ina basic services set, i is called "Stand alone network’. [215] eS shows a basic services set of 802.11 The figure 8 FIGURE 8.15 A BSS without an AP is cal 's called an Adhoe net called an infrastructure network. eee Vaan e Extended Service Set An extended service ice set (ESS) is made u c ip of two or more BS: is case, the BSSs are connected through a dis Se Usually a wired LAN as shown in figure 8.16. The. the APs in the BSSs. jon system, which is ution system connects [216] “The extended services sets can contain mobile and stationary terminals, Th ionary terminals. The mobile stations can belong to more than one BSS at a time. There are th main types of st : . ined in 802.11 architectures, No Tran! ‘The no-transition mobilty stations can either be immovable stations or the stations that can only move inside to BSS. BSS Transition Mo! ns can move from one BSS to other. The fed inside an ESS. ‘The BSS transition mobility movement of stations i ESS Transitional Mobility ‘The stations in this category can move from one ESS to the other. The ‘communication may or may not be continuous when a station moves from one to other ESS. $.11.2 Physical Properties 02.11 was designed to run over three physical media - two based on spread spectrum radio and one based on difused infrared, a tree of which run at either 1 or 2 Mbps. strum is to multiply the signal over a wider frequency devices. ‘The idea behind spread spect band than normal, s0 as to essen the 1108 oF interference from other ‘There are two spread spectrum methods: 4. Frequeney Hopping ‘This method involves t 1g the signal over a arbitrary sequence of St one frequency, then a second, then a (217) 4 Jing a carter requency and the In this mots, data is sent by using a carer Frequency and then by 55 ther carer frequency. Ate his, an ial tne is there in the Commuica, on, THis yt is repeated ater regulrinoras. TH Way, the UnaUThOF Zed pay, cannot tap the data or make sense of 2 Direct Sequence In this method, every data bit is roplaced by a chip code that is actuay a {70up otis. The tme taken to send a chip code is same as the time taken y 0 send 1 bit of data 802.11 detines one physical layer using frequency hopping and a secong I using direc sequence. Both standards run in the 2.4 GHz frequency band ot a the electromagnetic spectrum, The third physical standard for i Physical standard for 802.11 is based on infrared signals, The {transmission is dit ‘used, meaning that the sender and receiver do not have to be aimed at each other and do not need a clear 1¢ of Sight. This method has 3 choice of up to about 10 m and is restricted tothe indoors of bx 8.11.3 Frame Format of IEEE 802.11 Standard Awirel less LAN defined by IEEE 802.11 has tree types of frames, and access points, (b) (©) Control Frames are used for handshakin, ig and f ir sue ‘or acknowledgements during [218] o 1. ‘The format of MAG laryer frame is zovies 2h Frame Control Data Frames are used for tho transmission o a shot Proiccll type | suenpe Bois abi abs Frame Control (FC) Fi ‘The frame control the MAC head FIGURE @.17 (2 bytes) long and defines Subfild of frame control field are : Explanation | Protocol Version | It defines the protocol version. Current version is \ 0 Type ‘management | ‘Subtype defines the Subtype of each type. For example type = "management’, subtype = “association” or type = “contro'", subtype = "ACK" To DS Tndicates Frame is going to distributed system | ‘From DS indicates Frame is coming from distributed system | ‘More flag When set to 1, means more fragments i} Retry ‘When set to 1, means retransmitted frame ‘| Pwr mgt When set to 1, means station is in power | management mode More data ‘When set to 1, means station has more data to \ send WEP Wired equivalent privacy. When set to 1, means encryption implemented. Revd Reserved lars 7 f 2. Duration (0) Field the MAC header is 16 bits long. It usually conta, a used in the MAC protocol. In one special CONtO| fra, , The duration field uration valu this field defines the ID of the frame. 3. Addresses Fielés There are four adress felis, each 6byteslong. The meaning ofeach acs, Ids. Addross field depends on the value of the To DS and From DS sul always the address of te next device, Address 2 is always the address gy the previous device. Address 3 is the address of the final destination | 1d by adcress 1. Adcress 4is the address of the original souroe station if itis not the same as address 2. 4. Sequence Control ‘This eld defines the sequence number ofthe frame to be used inflow conto, 5. Frame Body This fel, can be between 0 and 2312 bytes. It contains infromation based on the type and the subtype defined in the FC field. 6 FCS ‘TheFCS fields 4 bytes long and contains a CRC-32 error detection sequence. 1.4 Benefit Benefits of wireless LANs are : 1. Convenience a 4 5. 8.11.5 Y aM Users can access the internet even outside their normal work environment. productivity less network can maintain a neary constant Users connected toa with their desired network as they move from place to place. This im ly be mote productive as his or her work can be an employee can poter accomplished from any convenient lo ion, Expandat Wireless networks can serve a suddeniy-increased number of ing equipment. In a wired network, additional clients would require ents with the e) additional wiring. Cost Cost is less as compare to wired network. Disadvantages Main disadvantages of wireless LAN are 1. Security In wireless LAN, security is major problem. standard equipment is on the order of tens of metres, Like any rao frequency transmission, wireless networking signals are subject to.a wide variety of interference, as well as complex propagation effects that of the network administrator. This problem can affect are beyond the co the stability and rel 4. Speed 3 networks (typically 1-108 Mbits) is less ) is teasona ‘The speed on most compared othe slowest common wired networks (100 Mt slow compared the (00 MPS UP to sy 8.12 Bluetooth Bizetoothis a short range, wire tee, secure and international standardized wir eles, technology that provides wireless communication system Between the Bluotog,. eraledeves in shor ranged aver ett develops shot range nga less reless communication dovicg ‘connections between the laptops, handheld pos, 4nd mobie phones, Bluetooth is only avaliable fo the personal area network ‘otfce oF a home network i: Buitooth is ree technology andi is provided bythe mobile phone operators wh, are having he capabilly of GSM and CDMA technology Bluetooth uses radio wa, : : io waves eavency 8s & medium and is suitable forthe 1, 10 and 100 meters distan ce, , Wi-Fi uses high so it produces Bluetooth enabled devices have builtin microct ‘o transfer th les from the mobile phones or PDA devices to the ‘computers, the Service pack 2 has the built-in support for the defines the wireless standards to maintain the ‘secure the most commonly Bluetooth held devices are Mobile Phones: Personal Computers Laptops headsets Access points Car kits ‘Speaker Phone Streaming Video MPS players ) SIM cards Push-2-talk, PDA bi camera 8.12.2 Architecture of Bluetooth The architecture of Bluetooth defines two types of networks Piconet ‘A small Bluetooth network is called as Piconet. A piconet have one master ‘and maximum seven slaves as piconet address is 3 bits long as shown in figure 8.18. The communication between master and slave may be one to one ‘or one to many communication. FIGURE 6.18 (i) Scatternet A scatter forme mt a A 12d by combining various piconets. A slave of a picor — net can act as 2 master in other piconet. Thi m other piconet. This way, it receives all messages tro m the master ofits piconet and delivers packets toils slaves in other pic piconet and delivers packets to pi onet as, re jovice cannot 2.19. A device cannot be a master in two piconets. Picanol FIGURE 8.19 3ph ysiea! Links sp puetooth, a master and slave can have any of the two types of links, synchronous Connection Oriented (SCO) Link ‘This type of link is created between master and slave when the speed of data transfer Is more important than the accuracy of data transfer. In SCO links the damaged packets are never retransmitted. Tis ype of commurication is generally used in transmission of realtime sound transmission (i) Asynchronous Connectionless Link ‘The ACL link is used in case of transmissions where the covrect delivery is preferred over fast delivery. In this typeof link, the Fame 8 only accepted, ‘when it is fully correct. 8.12.4 Bluetooth Frame Format Bluetooth Frame Format is shown in figure 8 20. FIGURE 820 (225) (Access Cont This ie a 72 bit fold rame of ane piconet from other, distinguishing the (i) Header Header is repeated 3 times. The (a) Address : Ths subfield is 3 bits 1ona station (slave) addressos. ota tnt defines the typeof data which i coming used to define up to seven (0) Type: This is a4 from the upper layer. (e)_F (Flow Control): This is a1 it subfield that is used for flow cont ihn set 1, means the device isnot ready to receive more frames, is a1 bit subfield th used for (d) A (Acknowledgement acknowledgement purpose. (©) § (Sequence number) : This is also 1 bit long and used to hold a sequence number. () HEC : This subfield is an 8 bit long and it contains header (checksum) to detect errors in header section. mation ‘The header has 3 identical 18-bit sections. The sender generates three sections. ver on bit by bit basis. If the individual accepted, the three ‘These sections are compared by the re bits of these sections are matched, the ty value is taken. occurrences are not same, the maj Data (or Payload) This subfield can have any length from 0 to 2740. It contains data or control information, 8.13 Virtual LANs a Avi el Wirlual local area network (VLAN) is a local area network configured by software, y ‘ot by physical wiring VLAN'S allow a network manager to logically segment a LAN into domains. Since rent broadcast isis a logical seqmer and not a physical one, workstations do not have to be physically located together. Users on different building, oF even in different buildings can now belong to the same LAN, rs of the same 413.1 Distinguish between LAN and VLAN Figure 8.21 shows a switched LAN in an engineering firm in which 4 tations are grouped into three LANs that are connected by a switch. Each station has an engineer. From figur three engineers work together as the second group and three engineer work together as the third group. clear ive engineers work together as the first group, But what would happen if the administrators needed to move two engineers from the first group to the third group, to speed up the project being done by the third group? The LAN configuration would need to be changed. The network techni must rewire. Hence, in a switched LAN, changes in the work group mean physical changes in the network configuration. cups 10 group 10 gecurll o an entra measure of 5 can send braod ly. People belonging to the same ft rmessar need assuranc {igers in othr GFOUPS 2 that not receive these messages. creating Virtual Work Groups VLANs can be used fo create virtual work groups. performance tn networks where ic consists of a high percentage of broadcasts and 15 can reduce the need to send such trafic to unnecessary fions. For example, in a broadcast domain broadcast sasts, VLAN’ dosti ‘consisting of 10 usors, ifthe is intended only for 5 of the user ‘on a soparate VLAN can reduce tr then placing those 5 users which resul is better performance. Simplified Administration Sovonty porcent of notwork costs area result of ‘adds, moves and changes of tasors In the network. Every time a user is moved In ‘a LAN, recabling, nev station addrossing, and 0°! ontiguration of hubs and routers becomes nocossary. Some of these tasks can be Si .d-with the use of VLAN. or EEE 802.3 standard in deta 15 of cablos used in Ethernet. rernot? What aro its advantages? duplox switched Eternal, Pa

You might also like