SlideShare a Scribd company logo
1 of 29
Download to read offline
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 1
LOCAL AREA NETWORK -LAN
Uses of LAN
As LAN provides the capability to route data between devices connected to a common network within a
relatively limited distance, numerous benefits can accrue to users of the network.
 Peripheral sharing: Peripheral sharing allows network users to access color laser printers and
other devices. Users of a LAN can obtain access to resources that would be too expensive to justify
for each individual workstation user.
 Common software access: The ability to access data files and programs from multiple
workstations can substantially reduce the cost of software and shared access to database
information allows network users to obtain access to updated files on a real-time basis.
 Internet access: Instead of supporting individual dial access to the Internet you could install a router
and leased line to an Internet Service Provider (ISP) that is a fraction of the cost associated with a
large number of individual Internet dial network accounts
Attributes of a LAN
i. Transmission technology
ii. Signalling methods
iii. Transmission medium
iv. Access Control
v. Topologies
i. Transmission Technology
 Two Transmission Technologies used by LANs are :
a. Broad cast: A single communication channel is shared by all the machines on the network
b. Point to Point: consists of many connections between individual pairs of machines.Packets have to follow
multiple routes of different lengths
ii. Signalling Methods
 Two signaling methods used by LANs are :
a. Broadband: The bandwidth of the transmission medium is subdivided by frequency to form two or
more sub-channels
b. Base-Band: only one signal is transmitted at any point in time
iii. Transmission Medium
 Transmission medium can be classified into 4 from physical cable connection to wireless systems.
a. Twisted Pair: consists of two individual insulated copper wires physically twisted together to
minimize unwanted electromagnetic signals from interfering with or radiating from
the pair
b. Coaxial cables: consists of a central copper core surrounded by a layer of insulating material.
c. Optical fiber cables: contains glass fiber and signals are transmitted in the form of light pulses.
d. Wireless transmission
iv. Access control
 Represents how the devices get permission to communicate on the network.
 Some of the access methods primarily employed in local area networks are :
 Polling
 Token-passing
 Slotted ring
 CSMA/CD
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 2
 Switching
v. Topology
 Refers to the way in which the end points, or stations, attached to the network are interconnected.
 The common topologies for LANs are:
i. Bus
ii. Tree
iii. Ring
iv. Star
LAN PROTOCOL ARCHITECTURE
 The LAN protocol architecture consists of layering of protocols that contribute to the basic functions of a
LAN
 The standardized LAN protocol architecture encompasses 3 layers
i. Physical layer
ii. Medium Access control layer (MAC)
iii. Logical Link control
IEEE 802 REFERENCE MODEL
 The layers of OSI Reference Model can be classified as Network Support Layers and User support
layers
 LAN protocols are concerned with the network support layers, mainly Physical and Data Link Layer
 IEEE 802 Reference Model is a modified reference model suitable for LANs built by IEEE.
 It corresponds to the lower 2 layers of OSI reference model
 Here the data link layer has been divided into two sub layers: logical link control (LLC) and media
access control (MAC)
Fig 2.1 IEEE 802 Protocol Layers Compared to OSI Model
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 3
Physical layer
 includes functions such as :
i. Encoding/decoding of signals
ii. Specification of the transmission medium and the topology
Logical Link Layer
 Acts as the interface between the Network layer and the MAC sub layer
 Functions:
i. Error Control
ii. Flow Control
iii. Sequencing & User Addressing Functions
 LLC standard is common to all LAN’s and offers three types of services for controlling the exchange
of data between two users.
i. Unacknowledged connectionless service: does not involve any of the flow- and error control
mechanisms and delivery of data is not guaranteed.
ii. Connection-mode service: A logical connection is set up between two users exchanging data, and
flow control and error control are provided.
iii. Acknowledged connectionless service: datagram are to be acknowledged, but no prior logical
connection is set up.
LLC Protocol Data Unit (PDU)
 which contains 4 fields
Fig 2.2 LLCPDU
 Destination Service Access Point (DSAP), Source Service Access Point (SSAP) : address fields
which specify the destination and source users of LLC.These identify the network protocol entities
which use the link layer service
 LLC control field: describes type of PDU(U,I and S) and includes other information such as
sequencing and flow control information
Medium Access Control
 It is lower sub-layer of data link layer closer to the physical layer
 Key parameters of MAC technique is where and how
a. Where: refers to whether control is exercised in a centralized or distributed fashion.
 Central: A controller is designated that has the authority to grant access to the network.
 Distributed: The stations collectively perform a MAC function to determine the order in which
stations transmit.
b. How: is constrained by the topology and competing factors like cost, performance, and
complexity.
 Basic functions of MAC Sub Layer are:
i. Media Access Control
ii. Error Detection
iii. Station Addressing
 Defines two medium access control techniques specific for each LAN.
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 4
i. Synchronous techniques: a specific capacity is dedicated to a connection.
ii. Asynchronous: allocate capacity in an asynchronous (dynamic) fashion, more or less in response to
immediate demand.
 Asynchronous techniques can be classified into three:
i. Round Robin
ii. Reservation
iii. Contention
i. Round Robin
 Each station in turn is given the opportunity to transmit.
 When it is finished, relinquishes its turn, and the right to transmit passes to the next station in logical
sequence.
 Control of sequence may be centralized or distributed.
 Efficient when many stations have data to transmit over an extended period of time
ii. Reservation
 Time on the medium is divided into slots.
 A station wishing to transmit reserves future slots for an
extended or even an indefinite period.
 Reservations may be made in a centralized or distributed
fashion.
iii. Contention
 Useful for bursty type traffic
 No control is exercised to determine whose turn it is.
 Stations send data by taking risk of collision (with others’ packets).however they understand
collisions by listening to the channel, so that they can retransmit.
 Efficient under light or moderate load, bad under heavy load
 Round-Robin and Contention techniques are the most commonly used in LANs.
MAC- Frame Format
 The MAC layer is responsible for performing functions related to medium access and for transmitting
the data.
Fig 2.3 MAC Frame
 MAC Control: contains any protocol control information needed for the functioning of the MAC
protocol
 Destination MAC Address: The destination physical attachment point on the LAN for this frame.
 Source MAC Address: The source physical attachment point on the LAN for this frame.
 LLC PDU: The LLC data from the next higher layer.
 CRC: The Cyclic Redundancy Check field
IEEE 802 STANDARDS
LAN standards proposed by the IEEE committee have the following goals in mind:
• To promote compatibility
• Implementation with minimum efforts
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 5
• Accommodate the need for diverse applications
For the fulfillment of the above mentioned goals, the committee came up with a bunch of LAN
standards collectively known as IEEE 802.The various standards differ at the physical layer & MAC sub-
layer but are compatible at the data link layer.
Fig 2.4 IEEE 802 standards
MULTIPLE ACCESS PROTOCOLS
 A MAC (Media Access Control) protocol is a set of rules to control access to a shared
communication medium among various users.
Fig 2.5 Multiple access protocols
Random Access
 In random access or contention methods, no station is superior to another station and none is assigned
the control over another.
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 6
 Two features give this method its name:
 First, there is no scheduled time for a station to transmit.
 Second, no rules specify which station should send next. Stations compete with one another to access
the medium
ALOHA
 When the user simply transmits a frame, there are chances of collision
 The user could simply retransmit, but this would not help, other user involved in the collision will
also retransmit, resulting in another collision
 One way to avoid this is to wait a random amount of time before retransmitting which forms the basis
of ALOHA
 There are two versions of ALOHA: pure and slotted.
Pure ALOHA
The system is working as follows:
1. Let users transmit whenever they have data to be sent.
2. Collisions will occur.
3. Using a feedback mechanism to know about the status of frame.
4. The collided frames will be destroyed.
5. Retransmit the destroyed frame.
 The number of collisions rises rapidly with increased load.
 After a maximum number of retransmission attempts Kmax station must give up and try later.
Fig 2.6 flow chart for pure ALOHA
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 7
Fig 2.7 Frames in a pure ALOHA network
Suppose L: the average frame length,
R: rate,
X=L/R: frame time
1. Transmit a frame at t=t0 (and finish transmission of the frame at t0+X )
2. If ACK does not come after t0+X+2tprop or detect collision, wait for random time: B
3. Retransmit the frame at t0+X+2tprop+B
Fig 2.8 timing diagram for pure aloha
 Vulnerable period: t0-X to t0+X, if any other frames are transmitted during the period, the collision will
occur.
 Therefore the probability of a successful transmission is the probability that there is no additional
transmission in the vulnerable period.
 Therefore, if a station generates only one frame in this vulnerable time (and no other stations generate a
frame during this time), the frame will reach its destination successfully.
 Max channel utilization is 18% - very bad.
Slotted ALOHA
 Slotted ALOHA was invented to improve the efficiency of pure ALOHA.
 Here, we divide the time into slots and force the station to send only at the beginning of the time slot
 If a station misses this moment, it must wait until the beginning of the next time slot.
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 8
 There is still the possibility of collision if two stations try to send at the beginning of the same time
slot
Fig 2.9 frames in slotted ALOHA
Fig 2.10 timing diagram for slotted ALOHA
 Max channel utilization is 37%,doubles Normal ALOHA, but still low
Carrier Sense Multiple Access (CSMA)
 A station wishing to transmit first listens to the medium if another transmission is in progress (carrier
sense).
 If the medium is in use, station waits
 if the medium is idle, station may transmit
 Collision probability depends on the propagation delay
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 9
 Longer propagation delay, worse the utilization
 Collisions can occur only when more than one user begins transmitting within the period of
propagation delay.
 The vulnerable time for CSMA is the propagation time .
 If collision occurs
 Wait random time and retransmit
 Suppose tprop is propagation delay from one extreme end to the other extreme end of the medium.
When transmission is going on, a station can listen to the medium and detect it.
Fig 2.11 vulnerable period in CSMA
 After tprop, A’s transmission will arrive the other end; every station will hear it and refrain from the
transmission, so A captures the medium and can finish its transmission.
 Following are some versions of CSMA protocol Based on how to do when medium is busy
i. 1-Persistent CSMA
ii. Non-Persistent CSMA
iii. p-Persistent CSMA
1-persistent CSMA
 if the medium is idle, transmit.
 if the medium is busy, continue to listen until the channel is sensed idle; then transmit immediately.
 If more than one station are sensing, then they will begin transmission the same time when channel
becomes idle, so collision. At this time, each station wait for a random time, and then re-senses the
channel again.
 Problem with 1-persistent CSMA is “high collision rate”.
Fig 2.12 flow chart for 1-persistent CSMA
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 10
Nonpersistent CSMA
 If the channel is busy the station does not continually check it for detecting the end of ongoing
transmission. It waits for a random time then checks the channel. If the channel is idle, sends the
frame.
Fig 2.13 flow chart for non persistent CSMA
P-persistent CSMA
 If medium is idle, station transmits with a probability p. otherwise it defers to the next slot with
probability 1-p. the process repeat until either the frame has been transmitted or another station has
begun transmission.
Fig 2.14 flow chart for P-persistent CSMA
Fig 2.15 Behaviour of three persistence methods
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 11
CSMA/CD (CSMA with Collision Detection)
 Drawback of CSMA: when two frames collide, the medium remains unusable for the duration of
transmission of both damaged frames.
 CSMA/CD:
1. If the medium is idle, transmit; otherwise, go to step 2.
2. If the medium is busy, continue to listen until the channel is idle then transmit.
3. if a collision is detected during transmission, transmit a brief jamming signal
4. After transmitting a jamming signal, wait a random amount of time, then attempt to transmit.
5.
Fig 2.16 flow chart for CSMA/CD
CSMA/CD efficiency
 tprop = max prop between 2 nodes in LAN
 ttrans = time to transmit max-size frame
 Efficiency = 1/(1+5 * tprop / ttrans)
 For 10 Mbit Ethernet, tprop = 51.2 us, ttrans = 1.2 ms
 Efficiency is 82.6%!
 Much better than ALOHA,
 simple, and cheap
 Efficiency goes to 1 as tprop goes to 0
 Goes to 1 as ttrans goes to infinity
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 12
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)
 In CSMA/CA once the channel is clear, it again waits for an additional time period before performing
the transmission.
 Before sending a frame, source senses the medium
 Backoff until the channel is idle.
 After the channel is found idle, the station waits for a period of time called the Distributed
Inter Frame Space (DIFS); then the station sends a control frame called Request To Send
(RTS).
 After receiving RTS, the destination waits for a period called Short Inter Frame Space (SIFS),
the destination station sends a control frame, called Clear To Send (CTS) to source. This
control frame indicates that the destination station is ready to receive data.
 Source sends data after waiting for SIFS
 Destination sends ACK after waiting for SIFS.
Fig 2.17 flowchart for CSMA/CA
 RTS frame indicates the duration of time that the source needs to occupy the channel.
 Stations that are affected by this transmission create a timer called a Network Allocation Vector
(NAV) that shows how much time must pass before these stations are allowed to check the channel
for idleness.
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 13
Fig 2.18 signals in CSMA/CA
Exponential Back off Algorithm
 used by a transmitting station to determine how long to wait following a collision before attempting
to retransmit the frame
 Each station generates a random number that falls within a specified range of values. This determines
the length of time it must wait before testing the carrier. The range of values increases exponentially
after each failed retransmission.
 After c collisions, the range is between 0 and 2c
– 1, it then waits that number of slot times before
attempting retransmission.
 If repeated collisions occur, the range continues to expand, until after 10 attempts when it reaches
1023. After that the range of values stays fixed .If a station is unsuccessful in transmitting after 16
attempts, then gives up if cannot transmit
 low delay with small amount of waiting stations
 large delay with large amount of waiting stations
CONTROLLED ACCESS
 In controlled access, the stations consult one another to find which station has the right to send
 A station cannot send unless it has been authorized by other stations.
 Three popular control access methods are:
i. Polling
ii. Reservation
iii. Token Passing
i. Polling
 Stations take turns accessing the medium
 Two models: Centralized and distributed polling
 Centralized polling
 One device is assigned as primary station and the others as secondary stations
 All data exchanges are done through the primary.
 If the primary wants to receive data, it asks the secondary's if they have anything to send; this
is called poll function.
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 14
 If the primary wants to send data, it tells the secondary to get ready to receive; this is called
select function
 Polling can be done in order (Round-Robin) or based on predetermined order
Fig 2.19 signals in polling
 ACK is the acknowledgment of the secondary's ready status.
 Secondary responds either with a NAK frame if it has nothing to send or with data (in the
form of a data frame) if it does
 Distributed polling
 No primary and secondary.
 Stations have a known polling order list which is made based on some protocol.
 station with the highest priority will have the access right first, then it passes the access right
to the next station (it will send a pulling message to the next station in the pulling list), which
will passes the access right to the following next station, …
ii. Reservation
 A station needs to make a reservation before sending data.
 Transmissions are organized into variable length cycles.
 Each cycle begins with a reservation interval that consists of (N) minislots. One minislot for each of
the N stations.
 When a station needs to send a data frame, it makes a reservation in its own minislot.
 By listening to the reservation interval, every station knows which stations will transfer frames, and
in which order.
 The stations that made reservations can send their data frames after the reservation frame.
Fig 2.20 reservation scheme
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 15
iii. Token Passing
 Here the stations in a network are organized in a logical ring.
 In this method, a special packet called a token circulates through the ring.
 token gives the station the right to access the channel and send its data
 When a station receives the token and has no data to send, it just passes the data to the next
station.
Fig 2.21 token ring
Fig 2.22 flow chart for token ring
LAN SYSTEMS
ETHERNET
 Ethernet is a dominant physical and data link layer technology for local area networks (LANs).
 It is a bus based broadcast network using co-axial cable operating at 10 or 100 Mbps.
 It uses a control method called Carrier Sense Multiple Access/Collision Detection (CSMA/CD) to
transmit data.
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 16
Fig 2.23 Ethernet standards
IEEE 802.3 MAC Frame
Fig 2.24 IEEE802.3 MAC frame
 Preamble: Alternating 0s and 1s; used for synchronizing; 7bytes (56 bits).
 Start Frame Delimiter (SFD): 10101011 indicates the start of the frame. Last two bits alerts that the
next field is destination address.
 Destination Address (DA): 6 bytes (48 bits) physical address of destination station(s)
 Source Address (SA): 6 bytes (48 bits) physical address of sender
 Length/Type: if less than 1500, it indicates the length of data field. If greater than 1536, it indicates
the type of PDU.
 Data: 46 to 1500 bytes;
 CRC: CRC-32 for error detection
Addressing
 Each station on an Ethernet network has its own network interface card( NIC) fits inside and provides
a 6-byte physical address
Eg:06:01:02:01:2C:4B.
 First three bytes from left specify the vendor. (Cisco 00-00-0C, 3Com 02-60-8C) and the last 24 bit
should be created uniquely by the company.
 A source address is always a unicast address where as destination address can be unicast, multicast,
or broadcast.
 Unicast: defines one recipient ,second digit from left is even
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 17
 Multicast: defines a group of recipients ,Second digit from left is odd
 Broadcast : defines a group of all stations in the same LAN ,All ones
 The transmission is left-to-right, byte by byte; however, for each byte, the least significant bit is sent
first and the most significant bit is sent last.
Physical Layer Implementation
 The Standard Ethernet defines several physical layer implementations; four of the most common, are
Fig 2.25 Ethernet standards
Physical Layer Signaling
 Uses Manchester encoding.
 At the sender, data are converted to a digital signal using the Manchester scheme; at the receiver, the
received signal is interpreted as Manchester and decoded into data.
 Helps synchronize sender and recvr.
Fig 2.26 Manchester encoding
10Base5: Thick Ethernet
 Use a bus topology with an external transceiver (transmitter/receiver) connected via a tap to a thick
coaxial cable.
 10-Mbps transmission speed and 5 represents 500 meters maximum cable segment length.
 The transceiver is responsible for transmitting, receiving, and detecting collisions
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 18
Fig 2.27 10base 5 Thick Ethernet
10Base2: Thin Ethernet
 Uses a bus topology, but the cable is much thinner and more flexible.
 The transceiver is normally part of the network interface card (NIC), which is installed inside the
station.
 Can transmit 10 Mbps digital signals over coaxial cable.
 More cost effective than 10Base5 because thin coaxial cable is less expensive than thick coaxial.
 The length of each segment cannot exceed 185 m (close to 200 m).
Fig 2.28 10 base2 thin Ethernet
10Base-T: Twisted-Pair Ethernet
 Uses a physical star topology.
 The stations are connected to a hub via two unshielded twisted pair cables; One for transmitting data,
and the other for receiving data
 Maximum length of the cable segment can be 100 meters.
Fig 2.29 10 base T twisted pair
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 19
10Base-F: Fiber Ethernet
 Although there are several types of optical fiber l0-Mbps Ethernet, the most common is called
10Base-F.
 It uses a star topology to connect stations to a hub.
 The stations are connected to the hub using two fiber-optic cables.
Fig 2.30 10BaseF
BRIDGED ETHERNET
 LAN can be divided using bridges. Bridges have two effects on an Ethernet LAN:
• They raise the bandwidth
• They separate collision domains
 Raising the Bandwidth
 Each network is independent.
 Suppose there are 12 stations. And bandwidth is 10 Mbps.
 If we divide the network into 2 networks using bridge, each network has a capacity of
10 Mbps.
 The 10 Mbps capacity is shared between 7 stations, 6+1(bridge acts as a station in each
segment), not 12 stations.
Fig 2.31 network with bridge and without bridge
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 20
 Separating collision domains:
 Collisions domains become much smaller and possibility of collision is reduced.
 With bridging, lesser number of channels competes for access to the medium.
Fig 2.32 separating domains using bridge
SWITCHED ETHERNET
 The heart of the system is a switch containing room for typically 4 to 32 plug-in cards, each
containing one to eight connectors that allow faster handling of packets.
 When a station wants to transmit a frame, it outputs a frame to switch.
 Half duplex
Fig 2.33 Switched Ethernet
 All ports on the same card are wired together to form a local on-card LAN.
 Collisions on this on-card LAN are detected and handled using CSMA/CD protocol.
 One transmission per card is possible at any instant. All the cards can transmit in parallel.
 With this design each card forms its own collision domain.
FULL-DUPLEX SWITCHED ETHERNET
 Each station is connected to the switch through two links: one to transmit and one to receive.
 Increases the capacity of each domain from 10 to 20 Mbps.
 no chances of collision, so CSMA/CD is not used
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 21
Fig 2.34 full duplexed switched Ethernet
FAST ETHERNET
 IEEE 802.3 u.
 same frame format, media access, and collision detection rules as 10 Mbps Ethernet
 Data transfer rate of 100 Mb/s .
 Compatible with Standard Ethernet.
MAC Sub Layer
 The only two changes made in the MAC layer are the data rate and the collision domain
 A new feature added called Auto negotiation;allows two devices to negotiate the mode or data rate of
operation.
 For example, a device with a maximum capacity of 10 Mbps can communicate with a device with a
100 Mbps capacity.
Physical Layer
 Implementation
Fig 2.35 Fast Ethernet classification
Fig 2.36 fast Ethernet description
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 22
 Topologies
Fig 2.37 fast Ethernet topologies
GIGABIT ETHERNET
 IEEE 802.3z.
 All configurations of gigabit Ethernet are point to point.
 Point-to-point, between two computers or one computer – to –switch.
 Compatible with 100BASE-T and 10BASE-T
MAC Sublayer
Fig 2.38 gigabit Ethernet access methods
 It supports two different modes of medium access: full duplex mode and half duplex mode.
 Half duplex is used when computers are connected by a hub. Collision in hub is possible and so
CSMA/CD is required.
 Full duplex is used when computers are connected by a switch. No collision is there and so
CSMA/CD is not used.
 Carrier Extension tells the hardware to add its own padding bits after the normal frame to extend the
frame to 512 bytes.
Fig 2.39 carrier extension
 Frame Bursting allows a sender to transmit a concatenated sequence of multiple frames in a single
transmission. If the total burst is less than 512 bytes, the hardware pads it again.
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 23
Fig 2.40 frame bursting
Physical Layer
 Topology.
Fig 2.41 gigabit Ethernet topology
Fig 2.42 gigabit Ethernet physical layer implementations
Fig 2.43 gigabit Ethernet physical layer implementation description
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 24
LAN CONNECTING DEVICES
Fig 2.44 classification of LAN connecting devices
Fig 2.45 network connecting devices at each layer
REPEATERS
 A repeater (or regenerator) is an electronic device that operates on only the physical layer of the OSI
model.
 A repeater installed on a link receives the signal before it becomes too weak or corrupted, regenerates
the original pattern, and puts the refreshed copy back on the link.
Fig 2.46 repeater in network
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 25
 A repeater does not actually connect two LANS; it connects two segments of the same LAN.
 A repeater forwards every frame; it has no filtering capability
Fig 2.47 function of repeater
HUBS
Passive Hubs
 A passive hub is just a connector which connects the wires coming from different branches
Active Hub
 A Hub is a multiport repeater. used to create connections between stations in a physical star topology.
 Connection to the hub consists of two pairs of twisted pair wire one for transmission and the other for
receiving.
 it copy the received frame onto all other links
Fig 2.48 hub in network
BRIDGES
 Bridges operate in both the physical and the data link layers of the OSI model.
 Bridges can divide a large network into smaller segments.
 When a frame (or packet) enters a bridge, the bridge not only regenerates the signal but checks the
destination address and forwards the new copy only to the segment the address belong.
 This is done by a bridge table (forwarding table) that contains entries for the nodes on the LAN
 The bridge table is initially empty and filled automatically by learning from frames
movements in the network
 A bridge runs CSMA/CD before sending a frame onto the channel
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 26
Fig 2.49 bridge in a network
Types of Bridges
1. Simple Bridge
2. Multiport Bridge
3. Transparent Bridge
1. Simple Bridge
 The address table must be entered manually
 Whenever a new station is added or removed, the table must modify.
 Installation and maintenance of simple bridges are time-consuming and potentially more.
2. Multiport bridges
 A multiport bridge can be used to connect more than two LANs.
3. Transparent Bridges
 A transparent, or learning, bridge builds its table of station addresses on its own as it performs its
bridge functions.
 The stations are completely unaware of the bridge’s existence.
 A transparent bridge must meet three criteria:
1. Frames must be forwarded from one station to another.
2. The forwarding table is automatically made by learning frame movements in the network.
3. Loops in the system must be prevented.
Fig 2.50 transparent bridge table updation
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 27
Loop Problem
 Multiple paths of bridges and local-area networks (LANs) exist between any two LANs in the
internetwork.
 Having more than one transparent bridge between a pair of LAN segments can create loops in the
system.
 Bridging Loops Can Result in Inaccurate Forwarding and Learning in Transparent Bridging
Environments.
Fig 2.51 loop problem in network
Step 1. Station-A sends a frame to Station-B. Both the bridges forward the frame to LAN Y and update the
table with the source address of A.
Step 2. Now there are two copies of the frame on LAN-Y. The copy sent by Bridge-a is received by Bridge-
b and vice versa. As both the bridges have no information about Station B, both will forward the frames to
LAN-X.
Step 3. Again both the bridges will forward the frames to LAN-Y because of the lack of information of the
Station B in their database and again Step-2 will be repeated, and so on.
So, the frame will continue to loop around the two LANs indefinitely.
 Looping problem Is avoided by using Blocking ports (no frame is send out of these ports).
SPANNING TREE ALGORITHM
 IEEE 802.1d
 In graph theory, a spanning tree is a graph in which there is no loop
 In a bridged LAN, this means creating a topology in which each LAN can be reached from any other
LAN through one path only
 A LAN can be depicted as a graph, whose nodes are bridges and LAN segments (or cables), and
whose edges are the interfaces connecting the bridges to the LAN segments
Steps
 Every bridge has a built-in ID and the bridge with smallest ID is selected as the root bridge
 The algorithm tries to find the shortest path (a path with the shortest cost) from the root bridge to
every other bridge or LAN
 The combination of the shortest paths creates the shortest tree
 Based on the spanning tree, we mark the forwarding ports and blocking ports
 The forwarding ports are shown as solid lines, whereas the blocked ports are shown as dotted lines.
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 28
Fig 2.52 Spanning tree of a network of bridges
TWO-LAYER SWITCHES
 Two-layer switch performs at the physical and data link layers.
 Is a bridge, with many ports and allows better (faster) performance.
 Able to allocate a unique port to each station, with each station on its own independent entity.
 It makes a filtering decision based on the MAC address of the frame it received.
 It can have a buffer to hold the frames for processing.
 More than one station transmitting at a time.
 It can have a switching factor that forwards the frames faster.
BACK BONE NETWORKS
 A backbone network allows several LANs to be connected.
 In a backbone network, no station is directly connected to the backbone; the stations are part of a
LAN, and the backbone connects the LANs.
 The backbone is itself a LAN that uses a LAN protocol such as Ethernet and each connection to
the backbone is itself another LAN.
 The two most common architectures are the bus backbone and the star backbone.
Bus Backbone
 In a bus backbone, the topology of the backbone is a bus.
 Bus backbones are normally used as a distribution backbone to connect different buildings in an
organization.
Fig 2. 53 bus backbone
MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15
Dept. of Computer Science And Applications, SJCET, Palai Page 29
Star Backbone
 The topology of the backbone is a star; the backbone is just a switch.
 Mostly used as a distribution backbone inside a building.
Fig 2.54 star backbone
CONNECTING REMOTE LANS
Another common application for a backbone network is to connect remote LANs. This type of backbone
network is useful when a company has several offices with LANs and needs to connect them. The
connection can be done through bridges sometimes called remote bridges. The bridges act as connecting
devices connecting LANs. These bridges have ports that have data rate and signal levels compatible to
telephone network standard. The bridges establish a data link connection through the leased circuit and
then carry out bridge operation
Fig 2.55 Connecting remote LANs with bridges

More Related Content

What's hot

Network protocol lectures
Network protocol  lecturesNetwork protocol  lectures
Network protocol lecturesmarwaeng
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...ijsrd.com
 
C08 wireless atm[1]
C08 wireless atm[1]C08 wireless atm[1]
C08 wireless atm[1]Rio Nguyen
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksIDES Editor
 
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...CSCJournals
 
Communication Networks 2 marks q &answers
Communication Networks  2 marks q &answersCommunication Networks  2 marks q &answers
Communication Networks 2 marks q &answersRaja Madhuvanthi
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)irjes
 
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...cscpconf
 
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VWC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VSURESHA V
 

What's hot (20)

Network protocol lectures
Network protocol  lecturesNetwork protocol  lectures
Network protocol lectures
 
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
Simulation and Performance Analysis of Long Term Evolution (LTE) Cellular Net...
 
C08 wireless atm[1]
C08 wireless atm[1]C08 wireless atm[1]
C08 wireless atm[1]
 
Note 6
Note 6Note 6
Note 6
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Lect4
Lect4Lect4
Lect4
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Handover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX NetworksHandover Behaviour of Transparent Relay in WiMAX Networks
Handover Behaviour of Transparent Relay in WiMAX Networks
 
4G Mobile Communications
4G Mobile Communications4G Mobile Communications
4G Mobile Communications
 
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
Tight Coupling Internetworking Between UMTS and WLAN: Challenges, Design Arch...
 
J0343073079
J0343073079J0343073079
J0343073079
 
Unit 6
Unit 6Unit 6
Unit 6
 
Communication Networks 2 marks q &answers
Communication Networks  2 marks q &answersCommunication Networks  2 marks q &answers
Communication Networks 2 marks q &answers
 
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
 
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...
SURVEYING BEST SUITABLE SCHEDULING ALGORITHM FOR WIMAX- WI-FI INTEGRATED HETE...
 
DCN Chapter 1
DCN Chapter 1DCN Chapter 1
DCN Chapter 1
 
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha VWC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
WC and LTE 4G Broadband module 3- 2019 by Prof.Suresha V
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
Computer netwrks
Computer netwrksComputer netwrks
Computer netwrks
 

Viewers also liked

Module 3 special purpose programmable devices and their interfacing
Module 3 special purpose programmable devices and their interfacingModule 3 special purpose programmable devices and their interfacing
Module 3 special purpose programmable devices and their interfacingDeepak John
 
Compuer organizaion processing unit
Compuer organizaion processing unitCompuer organizaion processing unit
Compuer organizaion processing unitDeepak John
 
Module 4 advanced microprocessors
Module 4 advanced microprocessorsModule 4 advanced microprocessors
Module 4 advanced microprocessorsDeepak John
 
Computer organization basics
Computer organization  basicsComputer organization  basics
Computer organization basicsDeepak John
 
Module 5 embedded systems,8051
Module 5 embedded systems,8051Module 5 embedded systems,8051
Module 5 embedded systems,8051Deepak John
 
Analysis and design of algorithms part 3
Analysis and design of algorithms part 3Analysis and design of algorithms part 3
Analysis and design of algorithms part 3Deepak John
 

Viewers also liked (7)

Psicologia
PsicologiaPsicologia
Psicologia
 
Module 3 special purpose programmable devices and their interfacing
Module 3 special purpose programmable devices and their interfacingModule 3 special purpose programmable devices and their interfacing
Module 3 special purpose programmable devices and their interfacing
 
Compuer organizaion processing unit
Compuer organizaion processing unitCompuer organizaion processing unit
Compuer organizaion processing unit
 
Module 4 advanced microprocessors
Module 4 advanced microprocessorsModule 4 advanced microprocessors
Module 4 advanced microprocessors
 
Computer organization basics
Computer organization  basicsComputer organization  basics
Computer organization basics
 
Module 5 embedded systems,8051
Module 5 embedded systems,8051Module 5 embedded systems,8051
Module 5 embedded systems,8051
 
Analysis and design of algorithms part 3
Analysis and design of algorithms part 3Analysis and design of algorithms part 3
Analysis and design of algorithms part 3
 

Similar to Module 2 lan,data link layer

Computer networks lan
Computer networks lanComputer networks lan
Computer networks lanDeepak John
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMazin Alwaaly
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Dân Chơi
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-mainRahul Singh
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPTAIRTEL
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...IOSR Journals
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106ijctet
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerDeepak John
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docDeepak John
 
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfAutomation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfGandhibabu8
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESsuthi
 
Wireless sensors networks protocols
Wireless sensors networks protocolsWireless sensors networks protocols
Wireless sensors networks protocolsRushin Shah
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...cscpconf
 

Similar to Module 2 lan,data link layer (20)

Computer networks lan
Computer networks lanComputer networks lan
Computer networks lan
 
Networks
Networks   Networks
Networks
 
Multimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communicationsMultimedia network services and protocols for multimedia communications
Multimedia network services and protocols for multimedia communications
 
Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011Ccna 1 chapter 7 v4.0 answers 2011
Ccna 1 chapter 7 v4.0 answers 2011
 
1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main1 s2.0-s1877050915029002-main
1 s2.0-s1877050915029002-main
 
Ccna day1
Ccna day1Ccna day1
Ccna day1
 
Ccna day 1
Ccna day 1Ccna day 1
Ccna day 1
 
Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01Ccna day1-130802165909-phpapp01
Ccna day1-130802165909-phpapp01
 
networking1.ppt
networking1.pptnetworking1.ppt
networking1.ppt
 
Ccna PPT
Ccna PPTCcna PPT
Ccna PPT
 
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
Survey and Analysis of Medium Access Control Protocols for Wireless Sensor Ne...
 
IJCTET2015123106
IJCTET2015123106IJCTET2015123106
IJCTET2015123106
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25doc
 
Lan architecture
Lan architectureLan architecture
Lan architecture
 
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdfAutomation and Robotics 20ME51I Week 3 Theory Notes.pdf
Automation and Robotics 20ME51I Week 3 Theory Notes.pdf
 
COMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTESCOMPUTER NETWORKS - SHORT NOTES
COMPUTER NETWORKS - SHORT NOTES
 
Wireless sensors networks protocols
Wireless sensors networks protocolsWireless sensors networks protocols
Wireless sensors networks protocols
 
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
OVERVIEW AND LITERATURE SURVEY ON ROUTING PROTOCOLS FOR MOBILE COGNITIVE RADI...
 
Cs6003 ahsn-add-qb
Cs6003 ahsn-add-qbCs6003 ahsn-add-qb
Cs6003 ahsn-add-qb
 

More from Deepak John

Network concepts and wi fi
Network concepts and wi fiNetwork concepts and wi fi
Network concepts and wi fiDeepak John
 
Web browser week5 presentation
Web browser week5 presentationWeb browser week5 presentation
Web browser week5 presentationDeepak John
 
Information management
Information managementInformation management
Information managementDeepak John
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theftDeepak John
 
Email,contacts and calendar
Email,contacts and calendarEmail,contacts and calendar
Email,contacts and calendarDeepak John
 
Module 2 instruction set
Module 2 instruction set Module 2 instruction set
Module 2 instruction set Deepak John
 
introduction to computers
 introduction to computers introduction to computers
introduction to computersDeepak John
 
Registers and counters
Registers and counters Registers and counters
Registers and counters Deepak John
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4Deepak John
 
Module 4 network and computer security
Module  4 network and computer securityModule  4 network and computer security
Module 4 network and computer securityDeepak John
 
Network and computer security-
Network and computer security-Network and computer security-
Network and computer security-Deepak John
 
Computer security module 3
Computer security module 3Computer security module 3
Computer security module 3Deepak John
 
Module 4 registers and counters
Module 4 registers and counters Module 4 registers and counters
Module 4 registers and counters Deepak John
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer securityDeepak John
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2Deepak John
 
Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1Deepak John
 
Network and Computer security
Network and Computer securityNetwork and Computer security
Network and Computer securityDeepak John
 
Combinational and sequential logic
Combinational and sequential logicCombinational and sequential logic
Combinational and sequential logicDeepak John
 
Module 2 logic gates
Module 2  logic gatesModule 2  logic gates
Module 2 logic gatesDeepak John
 

More from Deepak John (20)

Network concepts and wi fi
Network concepts and wi fiNetwork concepts and wi fi
Network concepts and wi fi
 
Web browser week5 presentation
Web browser week5 presentationWeb browser week5 presentation
Web browser week5 presentation
 
Information management
Information managementInformation management
Information management
 
It security,malware,phishing,information theft
It security,malware,phishing,information theftIt security,malware,phishing,information theft
It security,malware,phishing,information theft
 
Email,contacts and calendar
Email,contacts and calendarEmail,contacts and calendar
Email,contacts and calendar
 
Module 1 8086
Module 1 8086Module 1 8086
Module 1 8086
 
Module 2 instruction set
Module 2 instruction set Module 2 instruction set
Module 2 instruction set
 
introduction to computers
 introduction to computers introduction to computers
introduction to computers
 
Registers and counters
Registers and counters Registers and counters
Registers and counters
 
Computer security module 4
Computer security module 4Computer security module 4
Computer security module 4
 
Module 4 network and computer security
Module  4 network and computer securityModule  4 network and computer security
Module 4 network and computer security
 
Network and computer security-
Network and computer security-Network and computer security-
Network and computer security-
 
Computer security module 3
Computer security module 3Computer security module 3
Computer security module 3
 
Module 4 registers and counters
Module 4 registers and counters Module 4 registers and counters
Module 4 registers and counters
 
Module 2 network and computer security
Module 2 network and computer securityModule 2 network and computer security
Module 2 network and computer security
 
Computer security module 2
Computer security module 2Computer security module 2
Computer security module 2
 
Computer security module 1
Computer security module 1Computer security module 1
Computer security module 1
 
Network and Computer security
Network and Computer securityNetwork and Computer security
Network and Computer security
 
Combinational and sequential logic
Combinational and sequential logicCombinational and sequential logic
Combinational and sequential logic
 
Module 2 logic gates
Module 2  logic gatesModule 2  logic gates
Module 2 logic gates
 

Recently uploaded

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docxPoojaSen20
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
MENTAL STATUS EXAMINATION format.docx
MENTAL     STATUS EXAMINATION format.docxMENTAL     STATUS EXAMINATION format.docx
MENTAL STATUS EXAMINATION format.docx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Module 2 lan,data link layer

  • 1. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 1 LOCAL AREA NETWORK -LAN Uses of LAN As LAN provides the capability to route data between devices connected to a common network within a relatively limited distance, numerous benefits can accrue to users of the network.  Peripheral sharing: Peripheral sharing allows network users to access color laser printers and other devices. Users of a LAN can obtain access to resources that would be too expensive to justify for each individual workstation user.  Common software access: The ability to access data files and programs from multiple workstations can substantially reduce the cost of software and shared access to database information allows network users to obtain access to updated files on a real-time basis.  Internet access: Instead of supporting individual dial access to the Internet you could install a router and leased line to an Internet Service Provider (ISP) that is a fraction of the cost associated with a large number of individual Internet dial network accounts Attributes of a LAN i. Transmission technology ii. Signalling methods iii. Transmission medium iv. Access Control v. Topologies i. Transmission Technology  Two Transmission Technologies used by LANs are : a. Broad cast: A single communication channel is shared by all the machines on the network b. Point to Point: consists of many connections between individual pairs of machines.Packets have to follow multiple routes of different lengths ii. Signalling Methods  Two signaling methods used by LANs are : a. Broadband: The bandwidth of the transmission medium is subdivided by frequency to form two or more sub-channels b. Base-Band: only one signal is transmitted at any point in time iii. Transmission Medium  Transmission medium can be classified into 4 from physical cable connection to wireless systems. a. Twisted Pair: consists of two individual insulated copper wires physically twisted together to minimize unwanted electromagnetic signals from interfering with or radiating from the pair b. Coaxial cables: consists of a central copper core surrounded by a layer of insulating material. c. Optical fiber cables: contains glass fiber and signals are transmitted in the form of light pulses. d. Wireless transmission iv. Access control  Represents how the devices get permission to communicate on the network.  Some of the access methods primarily employed in local area networks are :  Polling  Token-passing  Slotted ring  CSMA/CD
  • 2. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 2  Switching v. Topology  Refers to the way in which the end points, or stations, attached to the network are interconnected.  The common topologies for LANs are: i. Bus ii. Tree iii. Ring iv. Star LAN PROTOCOL ARCHITECTURE  The LAN protocol architecture consists of layering of protocols that contribute to the basic functions of a LAN  The standardized LAN protocol architecture encompasses 3 layers i. Physical layer ii. Medium Access control layer (MAC) iii. Logical Link control IEEE 802 REFERENCE MODEL  The layers of OSI Reference Model can be classified as Network Support Layers and User support layers  LAN protocols are concerned with the network support layers, mainly Physical and Data Link Layer  IEEE 802 Reference Model is a modified reference model suitable for LANs built by IEEE.  It corresponds to the lower 2 layers of OSI reference model  Here the data link layer has been divided into two sub layers: logical link control (LLC) and media access control (MAC) Fig 2.1 IEEE 802 Protocol Layers Compared to OSI Model
  • 3. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 3 Physical layer  includes functions such as : i. Encoding/decoding of signals ii. Specification of the transmission medium and the topology Logical Link Layer  Acts as the interface between the Network layer and the MAC sub layer  Functions: i. Error Control ii. Flow Control iii. Sequencing & User Addressing Functions  LLC standard is common to all LAN’s and offers three types of services for controlling the exchange of data between two users. i. Unacknowledged connectionless service: does not involve any of the flow- and error control mechanisms and delivery of data is not guaranteed. ii. Connection-mode service: A logical connection is set up between two users exchanging data, and flow control and error control are provided. iii. Acknowledged connectionless service: datagram are to be acknowledged, but no prior logical connection is set up. LLC Protocol Data Unit (PDU)  which contains 4 fields Fig 2.2 LLCPDU  Destination Service Access Point (DSAP), Source Service Access Point (SSAP) : address fields which specify the destination and source users of LLC.These identify the network protocol entities which use the link layer service  LLC control field: describes type of PDU(U,I and S) and includes other information such as sequencing and flow control information Medium Access Control  It is lower sub-layer of data link layer closer to the physical layer  Key parameters of MAC technique is where and how a. Where: refers to whether control is exercised in a centralized or distributed fashion.  Central: A controller is designated that has the authority to grant access to the network.  Distributed: The stations collectively perform a MAC function to determine the order in which stations transmit. b. How: is constrained by the topology and competing factors like cost, performance, and complexity.  Basic functions of MAC Sub Layer are: i. Media Access Control ii. Error Detection iii. Station Addressing  Defines two medium access control techniques specific for each LAN.
  • 4. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 4 i. Synchronous techniques: a specific capacity is dedicated to a connection. ii. Asynchronous: allocate capacity in an asynchronous (dynamic) fashion, more or less in response to immediate demand.  Asynchronous techniques can be classified into three: i. Round Robin ii. Reservation iii. Contention i. Round Robin  Each station in turn is given the opportunity to transmit.  When it is finished, relinquishes its turn, and the right to transmit passes to the next station in logical sequence.  Control of sequence may be centralized or distributed.  Efficient when many stations have data to transmit over an extended period of time ii. Reservation  Time on the medium is divided into slots.  A station wishing to transmit reserves future slots for an extended or even an indefinite period.  Reservations may be made in a centralized or distributed fashion. iii. Contention  Useful for bursty type traffic  No control is exercised to determine whose turn it is.  Stations send data by taking risk of collision (with others’ packets).however they understand collisions by listening to the channel, so that they can retransmit.  Efficient under light or moderate load, bad under heavy load  Round-Robin and Contention techniques are the most commonly used in LANs. MAC- Frame Format  The MAC layer is responsible for performing functions related to medium access and for transmitting the data. Fig 2.3 MAC Frame  MAC Control: contains any protocol control information needed for the functioning of the MAC protocol  Destination MAC Address: The destination physical attachment point on the LAN for this frame.  Source MAC Address: The source physical attachment point on the LAN for this frame.  LLC PDU: The LLC data from the next higher layer.  CRC: The Cyclic Redundancy Check field IEEE 802 STANDARDS LAN standards proposed by the IEEE committee have the following goals in mind: • To promote compatibility • Implementation with minimum efforts
  • 5. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 5 • Accommodate the need for diverse applications For the fulfillment of the above mentioned goals, the committee came up with a bunch of LAN standards collectively known as IEEE 802.The various standards differ at the physical layer & MAC sub- layer but are compatible at the data link layer. Fig 2.4 IEEE 802 standards MULTIPLE ACCESS PROTOCOLS  A MAC (Media Access Control) protocol is a set of rules to control access to a shared communication medium among various users. Fig 2.5 Multiple access protocols Random Access  In random access or contention methods, no station is superior to another station and none is assigned the control over another.
  • 6. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 6  Two features give this method its name:  First, there is no scheduled time for a station to transmit.  Second, no rules specify which station should send next. Stations compete with one another to access the medium ALOHA  When the user simply transmits a frame, there are chances of collision  The user could simply retransmit, but this would not help, other user involved in the collision will also retransmit, resulting in another collision  One way to avoid this is to wait a random amount of time before retransmitting which forms the basis of ALOHA  There are two versions of ALOHA: pure and slotted. Pure ALOHA The system is working as follows: 1. Let users transmit whenever they have data to be sent. 2. Collisions will occur. 3. Using a feedback mechanism to know about the status of frame. 4. The collided frames will be destroyed. 5. Retransmit the destroyed frame.  The number of collisions rises rapidly with increased load.  After a maximum number of retransmission attempts Kmax station must give up and try later. Fig 2.6 flow chart for pure ALOHA
  • 7. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 7 Fig 2.7 Frames in a pure ALOHA network Suppose L: the average frame length, R: rate, X=L/R: frame time 1. Transmit a frame at t=t0 (and finish transmission of the frame at t0+X ) 2. If ACK does not come after t0+X+2tprop or detect collision, wait for random time: B 3. Retransmit the frame at t0+X+2tprop+B Fig 2.8 timing diagram for pure aloha  Vulnerable period: t0-X to t0+X, if any other frames are transmitted during the period, the collision will occur.  Therefore the probability of a successful transmission is the probability that there is no additional transmission in the vulnerable period.  Therefore, if a station generates only one frame in this vulnerable time (and no other stations generate a frame during this time), the frame will reach its destination successfully.  Max channel utilization is 18% - very bad. Slotted ALOHA  Slotted ALOHA was invented to improve the efficiency of pure ALOHA.  Here, we divide the time into slots and force the station to send only at the beginning of the time slot  If a station misses this moment, it must wait until the beginning of the next time slot.
  • 8. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 8  There is still the possibility of collision if two stations try to send at the beginning of the same time slot Fig 2.9 frames in slotted ALOHA Fig 2.10 timing diagram for slotted ALOHA  Max channel utilization is 37%,doubles Normal ALOHA, but still low Carrier Sense Multiple Access (CSMA)  A station wishing to transmit first listens to the medium if another transmission is in progress (carrier sense).  If the medium is in use, station waits  if the medium is idle, station may transmit  Collision probability depends on the propagation delay
  • 9. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 9  Longer propagation delay, worse the utilization  Collisions can occur only when more than one user begins transmitting within the period of propagation delay.  The vulnerable time for CSMA is the propagation time .  If collision occurs  Wait random time and retransmit  Suppose tprop is propagation delay from one extreme end to the other extreme end of the medium. When transmission is going on, a station can listen to the medium and detect it. Fig 2.11 vulnerable period in CSMA  After tprop, A’s transmission will arrive the other end; every station will hear it and refrain from the transmission, so A captures the medium and can finish its transmission.  Following are some versions of CSMA protocol Based on how to do when medium is busy i. 1-Persistent CSMA ii. Non-Persistent CSMA iii. p-Persistent CSMA 1-persistent CSMA  if the medium is idle, transmit.  if the medium is busy, continue to listen until the channel is sensed idle; then transmit immediately.  If more than one station are sensing, then they will begin transmission the same time when channel becomes idle, so collision. At this time, each station wait for a random time, and then re-senses the channel again.  Problem with 1-persistent CSMA is “high collision rate”. Fig 2.12 flow chart for 1-persistent CSMA
  • 10. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 10 Nonpersistent CSMA  If the channel is busy the station does not continually check it for detecting the end of ongoing transmission. It waits for a random time then checks the channel. If the channel is idle, sends the frame. Fig 2.13 flow chart for non persistent CSMA P-persistent CSMA  If medium is idle, station transmits with a probability p. otherwise it defers to the next slot with probability 1-p. the process repeat until either the frame has been transmitted or another station has begun transmission. Fig 2.14 flow chart for P-persistent CSMA Fig 2.15 Behaviour of three persistence methods
  • 11. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 11 CSMA/CD (CSMA with Collision Detection)  Drawback of CSMA: when two frames collide, the medium remains unusable for the duration of transmission of both damaged frames.  CSMA/CD: 1. If the medium is idle, transmit; otherwise, go to step 2. 2. If the medium is busy, continue to listen until the channel is idle then transmit. 3. if a collision is detected during transmission, transmit a brief jamming signal 4. After transmitting a jamming signal, wait a random amount of time, then attempt to transmit. 5. Fig 2.16 flow chart for CSMA/CD CSMA/CD efficiency  tprop = max prop between 2 nodes in LAN  ttrans = time to transmit max-size frame  Efficiency = 1/(1+5 * tprop / ttrans)  For 10 Mbit Ethernet, tprop = 51.2 us, ttrans = 1.2 ms  Efficiency is 82.6%!  Much better than ALOHA,  simple, and cheap  Efficiency goes to 1 as tprop goes to 0  Goes to 1 as ttrans goes to infinity
  • 12. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 12 Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA)  In CSMA/CA once the channel is clear, it again waits for an additional time period before performing the transmission.  Before sending a frame, source senses the medium  Backoff until the channel is idle.  After the channel is found idle, the station waits for a period of time called the Distributed Inter Frame Space (DIFS); then the station sends a control frame called Request To Send (RTS).  After receiving RTS, the destination waits for a period called Short Inter Frame Space (SIFS), the destination station sends a control frame, called Clear To Send (CTS) to source. This control frame indicates that the destination station is ready to receive data.  Source sends data after waiting for SIFS  Destination sends ACK after waiting for SIFS. Fig 2.17 flowchart for CSMA/CA  RTS frame indicates the duration of time that the source needs to occupy the channel.  Stations that are affected by this transmission create a timer called a Network Allocation Vector (NAV) that shows how much time must pass before these stations are allowed to check the channel for idleness.
  • 13. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 13 Fig 2.18 signals in CSMA/CA Exponential Back off Algorithm  used by a transmitting station to determine how long to wait following a collision before attempting to retransmit the frame  Each station generates a random number that falls within a specified range of values. This determines the length of time it must wait before testing the carrier. The range of values increases exponentially after each failed retransmission.  After c collisions, the range is between 0 and 2c – 1, it then waits that number of slot times before attempting retransmission.  If repeated collisions occur, the range continues to expand, until after 10 attempts when it reaches 1023. After that the range of values stays fixed .If a station is unsuccessful in transmitting after 16 attempts, then gives up if cannot transmit  low delay with small amount of waiting stations  large delay with large amount of waiting stations CONTROLLED ACCESS  In controlled access, the stations consult one another to find which station has the right to send  A station cannot send unless it has been authorized by other stations.  Three popular control access methods are: i. Polling ii. Reservation iii. Token Passing i. Polling  Stations take turns accessing the medium  Two models: Centralized and distributed polling  Centralized polling  One device is assigned as primary station and the others as secondary stations  All data exchanges are done through the primary.  If the primary wants to receive data, it asks the secondary's if they have anything to send; this is called poll function.
  • 14. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 14  If the primary wants to send data, it tells the secondary to get ready to receive; this is called select function  Polling can be done in order (Round-Robin) or based on predetermined order Fig 2.19 signals in polling  ACK is the acknowledgment of the secondary's ready status.  Secondary responds either with a NAK frame if it has nothing to send or with data (in the form of a data frame) if it does  Distributed polling  No primary and secondary.  Stations have a known polling order list which is made based on some protocol.  station with the highest priority will have the access right first, then it passes the access right to the next station (it will send a pulling message to the next station in the pulling list), which will passes the access right to the following next station, … ii. Reservation  A station needs to make a reservation before sending data.  Transmissions are organized into variable length cycles.  Each cycle begins with a reservation interval that consists of (N) minislots. One minislot for each of the N stations.  When a station needs to send a data frame, it makes a reservation in its own minislot.  By listening to the reservation interval, every station knows which stations will transfer frames, and in which order.  The stations that made reservations can send their data frames after the reservation frame. Fig 2.20 reservation scheme
  • 15. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 15 iii. Token Passing  Here the stations in a network are organized in a logical ring.  In this method, a special packet called a token circulates through the ring.  token gives the station the right to access the channel and send its data  When a station receives the token and has no data to send, it just passes the data to the next station. Fig 2.21 token ring Fig 2.22 flow chart for token ring LAN SYSTEMS ETHERNET  Ethernet is a dominant physical and data link layer technology for local area networks (LANs).  It is a bus based broadcast network using co-axial cable operating at 10 or 100 Mbps.  It uses a control method called Carrier Sense Multiple Access/Collision Detection (CSMA/CD) to transmit data.
  • 16. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 16 Fig 2.23 Ethernet standards IEEE 802.3 MAC Frame Fig 2.24 IEEE802.3 MAC frame  Preamble: Alternating 0s and 1s; used for synchronizing; 7bytes (56 bits).  Start Frame Delimiter (SFD): 10101011 indicates the start of the frame. Last two bits alerts that the next field is destination address.  Destination Address (DA): 6 bytes (48 bits) physical address of destination station(s)  Source Address (SA): 6 bytes (48 bits) physical address of sender  Length/Type: if less than 1500, it indicates the length of data field. If greater than 1536, it indicates the type of PDU.  Data: 46 to 1500 bytes;  CRC: CRC-32 for error detection Addressing  Each station on an Ethernet network has its own network interface card( NIC) fits inside and provides a 6-byte physical address Eg:06:01:02:01:2C:4B.  First three bytes from left specify the vendor. (Cisco 00-00-0C, 3Com 02-60-8C) and the last 24 bit should be created uniquely by the company.  A source address is always a unicast address where as destination address can be unicast, multicast, or broadcast.  Unicast: defines one recipient ,second digit from left is even
  • 17. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 17  Multicast: defines a group of recipients ,Second digit from left is odd  Broadcast : defines a group of all stations in the same LAN ,All ones  The transmission is left-to-right, byte by byte; however, for each byte, the least significant bit is sent first and the most significant bit is sent last. Physical Layer Implementation  The Standard Ethernet defines several physical layer implementations; four of the most common, are Fig 2.25 Ethernet standards Physical Layer Signaling  Uses Manchester encoding.  At the sender, data are converted to a digital signal using the Manchester scheme; at the receiver, the received signal is interpreted as Manchester and decoded into data.  Helps synchronize sender and recvr. Fig 2.26 Manchester encoding 10Base5: Thick Ethernet  Use a bus topology with an external transceiver (transmitter/receiver) connected via a tap to a thick coaxial cable.  10-Mbps transmission speed and 5 represents 500 meters maximum cable segment length.  The transceiver is responsible for transmitting, receiving, and detecting collisions
  • 18. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 18 Fig 2.27 10base 5 Thick Ethernet 10Base2: Thin Ethernet  Uses a bus topology, but the cable is much thinner and more flexible.  The transceiver is normally part of the network interface card (NIC), which is installed inside the station.  Can transmit 10 Mbps digital signals over coaxial cable.  More cost effective than 10Base5 because thin coaxial cable is less expensive than thick coaxial.  The length of each segment cannot exceed 185 m (close to 200 m). Fig 2.28 10 base2 thin Ethernet 10Base-T: Twisted-Pair Ethernet  Uses a physical star topology.  The stations are connected to a hub via two unshielded twisted pair cables; One for transmitting data, and the other for receiving data  Maximum length of the cable segment can be 100 meters. Fig 2.29 10 base T twisted pair
  • 19. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 19 10Base-F: Fiber Ethernet  Although there are several types of optical fiber l0-Mbps Ethernet, the most common is called 10Base-F.  It uses a star topology to connect stations to a hub.  The stations are connected to the hub using two fiber-optic cables. Fig 2.30 10BaseF BRIDGED ETHERNET  LAN can be divided using bridges. Bridges have two effects on an Ethernet LAN: • They raise the bandwidth • They separate collision domains  Raising the Bandwidth  Each network is independent.  Suppose there are 12 stations. And bandwidth is 10 Mbps.  If we divide the network into 2 networks using bridge, each network has a capacity of 10 Mbps.  The 10 Mbps capacity is shared between 7 stations, 6+1(bridge acts as a station in each segment), not 12 stations. Fig 2.31 network with bridge and without bridge
  • 20. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 20  Separating collision domains:  Collisions domains become much smaller and possibility of collision is reduced.  With bridging, lesser number of channels competes for access to the medium. Fig 2.32 separating domains using bridge SWITCHED ETHERNET  The heart of the system is a switch containing room for typically 4 to 32 plug-in cards, each containing one to eight connectors that allow faster handling of packets.  When a station wants to transmit a frame, it outputs a frame to switch.  Half duplex Fig 2.33 Switched Ethernet  All ports on the same card are wired together to form a local on-card LAN.  Collisions on this on-card LAN are detected and handled using CSMA/CD protocol.  One transmission per card is possible at any instant. All the cards can transmit in parallel.  With this design each card forms its own collision domain. FULL-DUPLEX SWITCHED ETHERNET  Each station is connected to the switch through two links: one to transmit and one to receive.  Increases the capacity of each domain from 10 to 20 Mbps.  no chances of collision, so CSMA/CD is not used
  • 21. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 21 Fig 2.34 full duplexed switched Ethernet FAST ETHERNET  IEEE 802.3 u.  same frame format, media access, and collision detection rules as 10 Mbps Ethernet  Data transfer rate of 100 Mb/s .  Compatible with Standard Ethernet. MAC Sub Layer  The only two changes made in the MAC layer are the data rate and the collision domain  A new feature added called Auto negotiation;allows two devices to negotiate the mode or data rate of operation.  For example, a device with a maximum capacity of 10 Mbps can communicate with a device with a 100 Mbps capacity. Physical Layer  Implementation Fig 2.35 Fast Ethernet classification Fig 2.36 fast Ethernet description
  • 22. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 22  Topologies Fig 2.37 fast Ethernet topologies GIGABIT ETHERNET  IEEE 802.3z.  All configurations of gigabit Ethernet are point to point.  Point-to-point, between two computers or one computer – to –switch.  Compatible with 100BASE-T and 10BASE-T MAC Sublayer Fig 2.38 gigabit Ethernet access methods  It supports two different modes of medium access: full duplex mode and half duplex mode.  Half duplex is used when computers are connected by a hub. Collision in hub is possible and so CSMA/CD is required.  Full duplex is used when computers are connected by a switch. No collision is there and so CSMA/CD is not used.  Carrier Extension tells the hardware to add its own padding bits after the normal frame to extend the frame to 512 bytes. Fig 2.39 carrier extension  Frame Bursting allows a sender to transmit a concatenated sequence of multiple frames in a single transmission. If the total burst is less than 512 bytes, the hardware pads it again.
  • 23. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 23 Fig 2.40 frame bursting Physical Layer  Topology. Fig 2.41 gigabit Ethernet topology Fig 2.42 gigabit Ethernet physical layer implementations Fig 2.43 gigabit Ethernet physical layer implementation description
  • 24. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 24 LAN CONNECTING DEVICES Fig 2.44 classification of LAN connecting devices Fig 2.45 network connecting devices at each layer REPEATERS  A repeater (or regenerator) is an electronic device that operates on only the physical layer of the OSI model.  A repeater installed on a link receives the signal before it becomes too weak or corrupted, regenerates the original pattern, and puts the refreshed copy back on the link. Fig 2.46 repeater in network
  • 25. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 25  A repeater does not actually connect two LANS; it connects two segments of the same LAN.  A repeater forwards every frame; it has no filtering capability Fig 2.47 function of repeater HUBS Passive Hubs  A passive hub is just a connector which connects the wires coming from different branches Active Hub  A Hub is a multiport repeater. used to create connections between stations in a physical star topology.  Connection to the hub consists of two pairs of twisted pair wire one for transmission and the other for receiving.  it copy the received frame onto all other links Fig 2.48 hub in network BRIDGES  Bridges operate in both the physical and the data link layers of the OSI model.  Bridges can divide a large network into smaller segments.  When a frame (or packet) enters a bridge, the bridge not only regenerates the signal but checks the destination address and forwards the new copy only to the segment the address belong.  This is done by a bridge table (forwarding table) that contains entries for the nodes on the LAN  The bridge table is initially empty and filled automatically by learning from frames movements in the network  A bridge runs CSMA/CD before sending a frame onto the channel
  • 26. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 26 Fig 2.49 bridge in a network Types of Bridges 1. Simple Bridge 2. Multiport Bridge 3. Transparent Bridge 1. Simple Bridge  The address table must be entered manually  Whenever a new station is added or removed, the table must modify.  Installation and maintenance of simple bridges are time-consuming and potentially more. 2. Multiport bridges  A multiport bridge can be used to connect more than two LANs. 3. Transparent Bridges  A transparent, or learning, bridge builds its table of station addresses on its own as it performs its bridge functions.  The stations are completely unaware of the bridge’s existence.  A transparent bridge must meet three criteria: 1. Frames must be forwarded from one station to another. 2. The forwarding table is automatically made by learning frame movements in the network. 3. Loops in the system must be prevented. Fig 2.50 transparent bridge table updation
  • 27. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 27 Loop Problem  Multiple paths of bridges and local-area networks (LANs) exist between any two LANs in the internetwork.  Having more than one transparent bridge between a pair of LAN segments can create loops in the system.  Bridging Loops Can Result in Inaccurate Forwarding and Learning in Transparent Bridging Environments. Fig 2.51 loop problem in network Step 1. Station-A sends a frame to Station-B. Both the bridges forward the frame to LAN Y and update the table with the source address of A. Step 2. Now there are two copies of the frame on LAN-Y. The copy sent by Bridge-a is received by Bridge- b and vice versa. As both the bridges have no information about Station B, both will forward the frames to LAN-X. Step 3. Again both the bridges will forward the frames to LAN-Y because of the lack of information of the Station B in their database and again Step-2 will be repeated, and so on. So, the frame will continue to loop around the two LANs indefinitely.  Looping problem Is avoided by using Blocking ports (no frame is send out of these ports). SPANNING TREE ALGORITHM  IEEE 802.1d  In graph theory, a spanning tree is a graph in which there is no loop  In a bridged LAN, this means creating a topology in which each LAN can be reached from any other LAN through one path only  A LAN can be depicted as a graph, whose nodes are bridges and LAN segments (or cables), and whose edges are the interfaces connecting the bridges to the LAN segments Steps  Every bridge has a built-in ID and the bridge with smallest ID is selected as the root bridge  The algorithm tries to find the shortest path (a path with the shortest cost) from the root bridge to every other bridge or LAN  The combination of the shortest paths creates the shortest tree  Based on the spanning tree, we mark the forwarding ports and blocking ports  The forwarding ports are shown as solid lines, whereas the blocked ports are shown as dotted lines.
  • 28. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 28 Fig 2.52 Spanning tree of a network of bridges TWO-LAYER SWITCHES  Two-layer switch performs at the physical and data link layers.  Is a bridge, with many ports and allows better (faster) performance.  Able to allocate a unique port to each station, with each station on its own independent entity.  It makes a filtering decision based on the MAC address of the frame it received.  It can have a buffer to hold the frames for processing.  More than one station transmitting at a time.  It can have a switching factor that forwards the frames faster. BACK BONE NETWORKS  A backbone network allows several LANs to be connected.  In a backbone network, no station is directly connected to the backbone; the stations are part of a LAN, and the backbone connects the LANs.  The backbone is itself a LAN that uses a LAN protocol such as Ethernet and each connection to the backbone is itself another LAN.  The two most common architectures are the bus backbone and the star backbone. Bus Backbone  In a bus backbone, the topology of the backbone is a bus.  Bus backbones are normally used as a distribution backbone to connect different buildings in an organization. Fig 2. 53 bus backbone
  • 29. MODULE 2 MCA-402 Computer Networks ADMN 2012-‘15 Dept. of Computer Science And Applications, SJCET, Palai Page 29 Star Backbone  The topology of the backbone is a star; the backbone is just a switch.  Mostly used as a distribution backbone inside a building. Fig 2.54 star backbone CONNECTING REMOTE LANS Another common application for a backbone network is to connect remote LANs. This type of backbone network is useful when a company has several offices with LANs and needs to connect them. The connection can be done through bridges sometimes called remote bridges. The bridges act as connecting devices connecting LANs. These bridges have ports that have data rate and signal levels compatible to telephone network standard. The bridges establish a data link connection through the leased circuit and then carry out bridge operation Fig 2.55 Connecting remote LANs with bridges