0% found this document useful (0 votes)
123 views27 pages

Lecture 04

The document summarizes a lecture on networking technologies including Ethernet, CSMA/CD, repeaters, and hubs. It discusses key topics like Ethernet standards and specifications, frame formats, and how layer 1 devices like repeaters and hubs function. Specifically, it explains that repeaters regenerate signals to extend network distance while hubs broadcast signals to all ports, and both operate at the physical layer to pass packets but not filter or translate between different access methods.

Uploaded by

api-3701823
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
123 views27 pages

Lecture 04

The document summarizes a lecture on networking technologies including Ethernet, CSMA/CD, repeaters, and hubs. It discusses key topics like Ethernet standards and specifications, frame formats, and how layer 1 devices like repeaters and hubs function. Specifically, it explains that repeaters regenerate signals to extend network distance while hubs broadcast signals to all ports, and both operate at the physical layer to pass packets but not filter or translate between different access methods.

Uploaded by

api-3701823
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 27

Lecture:04

Prepared by ~
Bikramjit Chakrabarty
EEE,L-4,T-2,BUET
Sem-2,Cisco Networking Academy.

1
Contents of today’s Adventure:

 Review of Lecture-3
 Ethernet
 CSMA/CD (Carrier Sense Multiple Access Collision Detection)
 Repeater (Layer-1 device )
 Hub (Layer-1 device)
 Detail Analysis of Encapsulation and decapsulation process at
different layers by different devices. (~optional)

2
Key Terms: (review…)

 Dispersion.  Logical Addressing


 Physical medium.  Flat Addressing (BIA)
 NIC.  Encapsulation.
 MAC Address.  Dencapsulation.
 Driver  Packet switching
 Connector. (Connection less).
 System bus.  Circuit Switching
(Connection oriented).
 Acknowledgement

3
Networking Technology
 IEEE 802.3: Carrier Sense Multiple Access/Collision Detect
(CSMA/CD) Access Method.
 IEEE 802.3u: Fast Ethernet.
 IEEE 802.3z: Gigabit Ethernet.
 IEEE 802.5: IBM Token Ring.
 FDDI: The ANSI X3T9.5 standards committee produced the
Fiber Distributed Data Interface (FDDI) standard & submitted
FDDI to the International Organization for Standardization
(ISO), who, then created an international version of the FDDI
that is completely compatible with the ANSI standard version.

4
Layers associated with different LAN
protocols

5
Ethernet : it’s Origin..

 In the late 1960s, the University of Hawaii developed a WAN


called ALOHA.
 In 1972, Robert Metcalfe and David Boggs invented a cabling
and signaling scheme at the Xerox Palo Alto Research Center
(PARC) and in 1975 introduced the first Ethernet product s a
system of 2.94 megabits per second (Mbps) to connect over
100 computers on a 1-kilometer (.62 miles) cable.
 In the 1980s the IEEE published Project 802. This project
generated standards for design and compatibility for hardware
components that operated within the OSI physical and data-link
layers.
 The standard that pertains to Ethernet is the IEEE 802.3
specification.
6
Ethernet Features
 Best effort delivery-analogy with postal system.
 Comparison with Token-Ring~ Broadcasting-Token, Collision,
analogy with autocracy & democracy. Ethernet is ‘democratic’ !!

 Baseband architecture.
 Bus topology, usually transmits at 10 Mbps.
 Relies on CSMA/CD to regulate traffic on the main cable
segment.
 This will not fail unless the media is physically cut or
improperly terminated.

7
Ethernet Summary

 Traditional topology: Linear bus


 Other topologies: Star bus
 Logical topology: Broadcast
 Type of architecture: Baseband
 Access method: CSMA/CD
 Specification: IEEE 802.3
 Transfer speed: 10 Mbps or 100 Mbps
 Cable type: Thicknet, thinnet, UTP

8
Ethernet Specifications (IEEE
802.3) 10BaseT

Topology: Star bus


Cable type: Category 3, 4, or 5 unshielded twisted-pair cable
Connection to NIC: RJ-45
Maximum cable segment length:100 meters (328 feet)
Maximum connected segments: 100 meters (328 feet)

9
Comparison of Frame Format:

10
Frame fields
 preamble - The alternating pattern of 1's and 0's tells receiving
stations that a frame is Ethernet or IEEE 802.3.
 destination and source addresses -The source address is
always a unicast (single-node) address. The destination
address can be unicast, multicast (group), or broadcast (all
nodes).
 type (Ethernet) - The type specifies the upper-layer protocol to
receive the data after Ethernet processing is completed.
 length (IEEE 802.3) - The length indicates the number of bytes
of data that follows this field.

11
Frame fields….

 data (Ethernet) - After physical-layer and link-layer processing


is complete, the data contained in the frame is sent to an upper-
layer protocol, which is identified in the type field. Although
Ethernet version 2 does not specify any padding, in contrast to
IEEE 802.3, Ethernet expects at least 46 bytes of data.
 data (IEEE 802.3) - After physical-layer and link-layer
processing is complete, the data is sent to an upper-layer
protocol, which must be defined within the data portion of the
frame. If data in the frame is insufficient to fill the frame to its
minimum 64-byte size, padding bytes are inserted to ensure at
least a 64-byte frame.
 frame check sequence (FCS) - This sequence contains a 4
byte CRC value that is created by the sending device and is
recalculated by the receiving device to check for damaged
12 frames.
13
Layer-1(Physical) Devices:

14
HUB

15
…HUB

 The purpose of a hub is to regenerate and retime


network signals.
 Multiport repeater.
 This is done at the bit level to a large number of hosts
(e.g. 4, 8, or even 24) using a process known as
concentration

16
…HUB
 The reasons for using hubs is to create a
central connection point for the wiring media,
and an increase in the reliability of the
network.
 The reliability of the network is increased by
allowing any single cable to fail without
disrupting the entire network.
 This differs from the bus topology where
having one cable fail will disrupt the entire
network.
17
HUB- Layer 1 Device

 Hubs are considered


Layer 1 devices
because they only
regenerate the signal
and broadcast it out all
of their ports (network
connections).

18
Classification of Hub
 Active or Passive hubs
 Most modern hubs are active; they take energy
from a power supply to regenerate network
signals.
 Passive hubs do not regenerate bits, so they do
not extend a cables length, they only allow two
or more hosts to connect to the same cable
segment.

19
… Classification of Hub
 Intelligent and Dumb hubs
 Intelligent hubs have console ports, which means
they can be programmed to manage network traffic.
 Dumb hubs simply take an incoming networking
signal and repeat it to every port without the ability to
do any management.

20
Repeater

 The maximum length for UTP(CAT-5) cable in a network,


is 100 meters (approximately 333 feet). If we need to
extend our network beyond that limit, we must add a
device called a repeater
 As signals travel along a cable, they degrade and become
distorted in a process called “attenuation” .If a cable is
long enough, attenuation will finally make a signal
unrecognizable. Installing a repeater enables signals to
travel farther.

21
How Repeaters Work

A repeater works at
the physical layer of
the OSI Reference
Model to regenerate
the network's
signals and resend
them out on other
segments.

22
…Repeater
 The repeater takes a weak signal from one
segment, regenerates it, and passes it to the
next segment.
 To pass data through the repeater from one
segment to the next, the packets and the
Logical Link Control (LLC) protocols must be
identical on each segment.
 A repeater will not enable communication, for
example, between an 802.3 LAN (Ethernet)
and an 802.5 LAN (Token Ring).
23
…Repeater
 Repeaters do not translate or filter signals.
 For a repeater to work, both segments that the repeater
joins must use the same access method. The two most
common access methods are carrier-sense multiple-
access with collision detection (CSMA/CD) and token
passing.
 Repeaters can move packets from one kind of physical
media to another, Ethernet packet coming from a thinnet
coaxial-cable segment and pass it on to a fiber-optic
segment.

24
Repeater Considerations

 Repeaters afford the least expensive way to


expand a network.
 No Isolation or Filtering
 Repeaters will also pass a broadcast storm
along from one segment to the next
 network performance will be degraded.

25
Repeater~~ use!! or not use!!
 Use repeater  Don’t use
– To extend broadcast - There is heavy network
domain. traffic.
– Connect two segments of - Segments are using
similar or dissimilar different access methods.
media.
– Regenerate the signal to - Data filtering is needed.
increase the distance - Collision domain
transmitted. consideration.
– Pass all traffic in both
directions.
– Connect two segments in
the most cost-effective
manner.

26
Packet Flowing:
(To understand this should be reviewed)

 Device:  Hub transmits signal to


Hub (Layer-1) all of its ports.
Repeater (Layer-1)  Switch,Bridge take
Bridge (Layer-2) decision depending on
Layer-2 address(MAC).
Switch (Layer-2)
 Router takes decision
Router(Layer-3) depending on Layer-3
address(IP).

27

You might also like