EEcourse 3
EEcourse 3
[email protected]
Department of Computer Engineering
King Fahd University of Petroleum &
Minerals
Dhahran, Saudi Arabia
Others
» Type (Peer-to-Peer or Server-based)
» Speed: in bits per second (bps)
» Span: distance between end stations
» Load: number of stations.
A E D
Ethernet
Data is Bridged/Routed from
the high-speed Backbone
Token Ring to destination LAN Token Ring
April 1999 LAN and WAN Standards/Habib Yo 20
ussef
FDDI Strengths
+ FDDI is tailor-made and very
effective as a high-speed LAN for
workstation traffic and as a
Backbone for LANs.
FDDI X
FDDI
X
FDDI
B B
B B
April 1999 LAN and WAN Standards/Habib Yo 33
ussef
100VG-AnyLAN
Intended to be a 100 Mbps extension to the 10
Mbps Ethernet and to support IEEE 802.3 frame
types.
Uses a MAC scheme known as demand priority;it
has been standardized under IEEE 802.12.
» Its MAC algorithm is a round-robin scheme with
two priority levels.
Single-Hub Network
» When a station wishes to transmit a frame, it
first issues a request to the central hub and
then awaits permission from the hub to
transmit.
April 1999 LAN and WAN Standards/Habib Yo 34
ussef
100VG-AnyLAN (contd.)
» A station must designate each request as
normal-priority or high-priority.
» The central hub continually scans all of its
ports for a request in round-robin fashion.
» The central hub maintains two pointers: a
high-priority pointer and a normal-priority
pointer.
» If at any time there are no pending high-
priority requests, the hub will grant any
normal-priority requests that it encounters.
Hierarchical Network
» All of the end-system ports on all hubs are treated
as a single set of ports for purposes of round-robin.
» Port ordering is done preorder traversal:
– Visit the root
– Traverse the subtrees from left to right.
Ethernet LAN
April 1999 LAN and WAN Standards/Habib Yo 38
ussef
MAC of 100VG-AnyLAN
(Single hub network)
The MAC algorithm for 802.12 is a
round-robin scheme with two priority
levels
A station wishing to transmit
» it first issues a request to the central hub
» it then awaits permission from the hub to
transmit
» A station must designate each request as
normal priority or high priority
Time-out High-priority
Request from . n 1 2 queue empty
port k placed in . 3
position k . Normal 4
REQ-N priority
C pointer 5
B 6
A 7
9 8
If a request remains in the normal priority buffer for too long (default=
500 ms), it is moved to the corresponding position in the high-priority
buffer.
April 1999 LAN and WAN Standards/Habib Yo 41
ussef
Hierarchical LAN
The set of all hubs are treated
logically as one single hub
» The port order is generated by performing a
pre-order traversal of the tree (depth-first)
– Visit the root
– traverse the subtrees from left to right
» Each hub is running its own round-robin
algorithm to service end-systems directly
attached to it.
R
1 2 3 4 5 6 7
1-6 1-7
1-1 1-2
A 1-4
B
1 2 k
1 2
k
Level 2 Repeater
Level 2 Repeater
100BASE-X
S D
S Switch Switch D
Examples:
» Cable Modems, and
» Satellite links.
14 12 3
3 2
6 5
4
7 6
13
11
16 1 2 15 8 7 10 1 8 5 4
9
1 2 Variable 2 1
Flags Address Data FCS Flags
Data packet
AAL
ATM
Physical Layer
April 1999 LAN and WAN Standards/Habib Yo 80
ussef
How ATM Works (Contd.)?
Overhead Cell
Physical Layer
Envelope
ATM
Backbone
Tower box
ATM- Workstation
Attached Workstation
LAN Workstation
Servers Tower box
Attached
Clients
April 1999 LAN and WAN Standards/Habib Yo 83
ussef
Internet
Is a large collection of interconnected networks, all of
which use TCP/IP protocol suite
Began with the development of ARPANET in 1969
(ARPA: Advanced Research Project Agency)
ARPANET protocols were not suitable for running
over multiple networks. This led to the invention of
the TCP/IP model and protocols by Cerf and Kahn in
1974.
TCP/IP became the only official protocol on Jan. 1,
1983. The glue that holds the Internet together is the
April 1999 LAN and WAN Standards/Habib Yo 84
TCP/IP protocol stack.
ussef
Internet (contd)
A machine is on the Internet if it runs the TCP/IP
protocol stack, has an IP address, and can send IP
packets to any machine on the Internet.
Until the early 1990s, Internet users were academic,
industrial, and government researchers. But, WWW
(World Wide Web) brought millions of nonacademic
users.
WWW made the underlying facilities of the Internet
easier to use.