SlideShare a Scribd company logo
1 of 42
Chapter 4
Real-World Networks
What is Meant By LAN
Architecture?
• LAN architecture is the overall design of a LAN.
It includes:
– LAN hardware
– LAN software
– LAN topology
– Media access control (MAC) protocol
• The LAN’s network operating system is
sometimes also considered to be part of LAN
architecture
LAN Topologies
• There are two types of LAN topologies: physical
and logical
• Physical LAN topology refers to the physical
layout of the network
– The way in which the communication is configured and
how nodes attach to the network
– Because the focus is on physical connections among
hardware component, physical topologies correspond to
the physical layer of the OSI reference model
• Logical topology is concerned with how messages
are passed from node to node within the network
LLC and MAC Sublayers
• LANs employ two primary data link protocols:
contention and token passing
• In IEEE 802 standards, the data link layer is
divided into two sublayers LLC and MAC (see
Figure 4-1)
– LLC (logical link control) is responsible for flow
control, message sequencing, message
acknowledgement, and error checking
– MAC (media access control) enables network nodes to
access the communication medium via contention or
token passing
Figure 4-1
4-1
How Ethernet Works-CSMA/CD
• CSMA/CD (Carrier Sense Multiple Access and Collision Detection) is
most widely used contention-based MAC used in LANs
– It is the MAC protocol used in Ethernet LANs
• In a true contention MAC (like CSMA/CD), each node has equal
access to the medium
• As noted in Table 4-1, each node monitors the medium for data traffic
and if none is detected, it begins transmitting data
• A collision occurs when two or more nodes begin to transmit at the
same time
• To avoid collision recurrence, each node waits a random time interval
(hardwired in its NIC) before attempting to retransmit
Table 4-1
10Mbps Ethernet
• The four commonly used 10Mbps Ethernet
cabling systems are:
– 10Base5, or thicknet, which uses thick coaxial cable
– 10Base2, or thinnet, which uses thin coaxial cable
– 10BaseT, which uses unshielded twisted pair cable
– 10BaseFL, which uses single or multimode optical fiber
10Base5 (Thicknet) Ethernet
• 10Base5 (thickenet) Ethernet has the following specifications:
– Maximum segment length 500 meters (1650 feet)
– Maximum taps 100
– Maximum segments 5
– Maximum segments with nodes 3
– Maximum distance between taps 2.5 meters (8.25 feet)
– Maximum repeaters 4
– Maximum overall length with repeaters 2.5 kilometers (1.5 miles)
– Maximum AUI drop cable length 50 meters (165 feet)
We use BNC connectors, DIX connectors, Transceiver, Transceiver cable,
BNC barrel connectors, one BNC terminator, one Grounded terminator.
10Base2 (Thinnet Coax) Ethernet
• 10Base2 (Thinnet) Ethetnet has the following
specifications:
– Maximum segment length 185 meters (610.5 feet)
– Maximum segments 5
– Maximum segments with nodes 3
– Maximum repeaters 4
– Maximum devices per segments 30
– Maximum overall length with repeaters 925 meters (3052.5 feet)
The term 10Base2 is little misleading since the maximum length is not actually
200 meters (660 feet) but only 185 meters (610.5 feet). The specification of
thinnet is 50 Ohms RG-85A/U or RG-85 Coaxial cable. You use in thinnet BNC
connectors, T connectors, and two terminators at both ends
10BaseT (Twisted-Pair) Ethernet
• 10BaseT(twisted-pair) Ethernet has the following
specifications:
– Maximum segments 1024
– Maximum segments with nodes 1024
– Maximum segment length 100 meters (330 feet)
– Maximum nodes per segments 2
– Maximum nodes per network 1024
– Maximum hubs in a chain 4
10BaseT is wired as a Star which means that each device has its own set
of wires connected directly to a hub. The connection to the hub and the
LAN cards is made with an RJ-45 connector. UTP cable is classified in
categories, Categories 1and 2 are voice grade cable, Categories 3, 4, and
5 are data-grade.
10BaseFL
• 10BaseFL Ethernet has the following specifications:
– Maximum segments 1024
– Maximum segments with nodes 1024
– Maximum segment length 2000 meters
– Maximum nodes per segments 2
– Maximum nodes per network 1024
– Maximum hubs in a chain 4
10BaseFL (10Mbps data rate, baseband signaling over a fiber-optic
cable) uses light rather than electricity to transfer Ethernet frame.
10BaseFL is a Star-wired network because it requires a hub (also called
a concentrator) to receive the light signal from each network station and
send the same signal to all stations.
100VG-AnyLAN
• 100VG-AnyLAN (aka 100BaseVG) is capable of transporting both IEEE
802.3 and IEEE 802.5 frames
• It is faster
• It provides a mechanism for interconnecting 100 Mbps token ring and
100BaseT Ethernet LANs via specialized hubs and routers (see Figure 4-2)
– 100VG-AnyLAN-compliant adapters are also needed
• It uses demand priority access (DPA) rather than CSMA/CD as the MAC
protocol in order to enable real-time voice and video frames to be given
priority over other data frames
• Hubs can filter individually addressed frames for enhanced privacy.
100VG-anyLAN can use over Categories 3, 4, and 5 Twisted-pair and Fiber-
optic cables. It uses a Star topology and defines how child hubs can be
connected to a parent hub to extend the network. Several Hubs are cascaded
in Figure 4-3.
Figure 4-2
4-2
100VG-AnyLAN
 100VG-AnyLAN (Figure 4-3)
4-3
100BaseT Ethernet
• 100BaseT, also called Fast Ethernet, is simply regular Ethernet
run at a faster data rate over category 5 twisted-pair cable.
100BaseT uses the CDMA/CD protocol in a star wired bus as
10BaseT.
100BaseT has been specified for three media types:
– 100BaseT4 (four pairs categories 3, 4, and 5 UTP or STP)
– 100BaseTX (two pairs category 5 UTP or STP)
– 100BaseFX (two-strand fiber-optic cable)
In addition to the faster data rate and the higher quality cable required,
100BaseX has the same advantages and drawbacks as 10BaseT.
Segmentation
• Segmentation is the process of splitting a
large Ethernet network into two or more
segments linked by bridges or router.
Token Passing
• Token passing is the other major MAC protocol found in LANs
• It is used in token ring and FDDI LANs and other networks with
logical ring topologies
• The token is a pre-defined bit pattern that is passed among network
attached computers until one of them wants to use the medium to
transmit data
• Token passing is summarized in Table 4-2
• In token ring networks that resemble physical star topologies, token
passing takes place within MAUs (see Figure 4-7)
• Token passing can be used in bus topologies as well as in physical ring
topologies.
• Table 4-3 compares token passing and CSMA/CD
Table 4-2
4-2
IEEE 802.5 and 802.6 LANs
• The most widely used microcomputer ring network is the
token passing ring. It conforms to the IEEE 802.5 standard
• Token ring networks physically look like a star topology,
but technically they are physical rings
– Token ring nodes attach to multistation access units (MAUs) – see
Figure 4-4
– MAUs can be described as “a ring in a box”, because nodes attach
to the physical ring by connecting to the MAU (see Figure 4-5)
– MAUs can be interconnected to form larger rings (see Figure 4-6)
• IEEE 802.6 addresses dual-ring metropolitan area network
(MAN) architectures.
Figure 4-4
4-4
Figure 4-5
4-5
Figure 4-6
4-6
Figure 4-7
4-7
Table 4-3
4-3
Cabling for Token Ring
• Type 1: STP cable used to connect terminals and distribution panel and to run through walls to
wiring closets in the same building. It is two twisted pairs of solid core 22 gauge copper wire
surrounded by a shield.
• Type 2: It is made just as type1 cable with the exception that it incorporates four twisted pairs of
telephone wires.
• Type 3: UTP cable with four pairs, each twisted two time for every 3.6 meters (12feet) of length. It
is cheaper than Type 1 and 2. It is made of either 22 or 24-gauge wire.
• Type 5: Optical cable used only on the main ring path. It consists of 62.5-micron diameter or 100-
micron diameter fiber-optic cable.
• Type 6: STP cable that does not carry signals as for as Type 1 and 2. It is generally used only as
patch cable or as extensions in wiring closets. It is made with 26-gauge copper wire twisted together
in shielded jacket.
• Type 8: Used for runs under carpets. Likes Type 6 cable, it is made of two 26-gauge stranded-core
wires twisted together.
• Type 9: Basically the fire-retardant version of Type 6 cable. It is made with two 26-gauge stranded-
core copper wires twisted together in a shielded jacket.
Token Ring
Token Ring has the following specification:
Cable type UTP, STP, or Fiber-optic
Maximum MSAUs 33
Maximum Nodes 260
Maximum distance between 45.5 meters (150 feet) for UTP; up to
nodes and MSAU 100 meters (330 feet) for STP or Fiber-Optic
cable
Maximum patch cable distance 45.5 meters with UTP cable; 200 meters
connecting MSAUs (660 feet) with STP, 1 kilometer (0.6 mile)
with Fiber-optic cable.
Minimum patch cable 2.5 meters (8 feet)
distance connecting MASUs
Maximum cumulative patch cable 121.2 meters (400 feet) with UTP cable;
distance connecting all MSAUs Fiber-optic cabling can span several
kilometers
How token Ring Works
Active Monitor and Standby Monitors
• Active Monitor in a Token Ring network (usually the device
that has been operating on the network for the longest time)
that periodically checks the status of the network and monitors
for the network errors. Whereas Standby Monitor in Token
Ring network monitors the status and may become the active
monitor in the case of failure of the active monitor.
Beaconing :
• The process on Token Ring network by which a device, in the
event of a cable fault, determines the state of the network and
location of the fault. (If a station does not hear from its
upstream neighbor in the seven seconds, it assume
something bad has happened and acts on its own. This action
is called beaconing.) It occurs when the Nearest Active
Upstream Neighbor Notification (NAUN) fails.
Token Ring
Advantages:
• Unlike Ethernet, Token Ring continuous to operate reliably
under heavy loads.
• Built-in diagnostic and recovery mechanism, such as
beaconing and auto-configuration, makes the protocol more
reliable.
• Token Ring makes connecting a LAN to an IBM mainframe
easier since IBM created it and supports it.
• Fault-tolerance features are provided through ring
reconfiguration, called ring-wrap. A single cable can create a
ring when attached to two MSAUs.
Disadvantages
• Token Ring cards and equipment are more expensive than
Ethernet or ARCnet system.
• Token Ring can be very difficult to troubleshoot and requires
considerable experience.
Medium Access Control Sublayer
 IEEE 802 Frame Formats
Medium Access Control Sublayer
 IEEE 802 Frame Formats
Some Key Ethernet Implementations
• Particularly important Ethernet
implementations include:
– Fast Ethernet (e.g. 100BaseT and 100BaseFX)
• The IEEE 802.3u specification covers Fast Ethernet
– Gigabit Ethernet (e.g. 1000BaseT,
1000BaseSX, and 1000BaseLX)
• The IEEE 802.3z specification addresses Gigabit
Ethernet
FDDI LANs
• Fiber Distributed Data Interface (FDDI) was first
recognized in ANSI’s X3T9.5 specification
• Physically, it has a dual ring topology
• It has a sequential/ring logical topology and uses a
variation of token passing as the MAC protocol
• Key FDDI technologies are identified in Figure 4-8
– These include single attached stations (SAS), dual attached
stations (DAS), FDDI concentrators, and FDDI/Ethernet bridges
• FDDI is often used as a backbone network architecture.
Figure 4-8
4-8
ATM LANs
• ATM (asynchronous transfer mode) is a switched network
architecture that employs 53-octet cells to transmit data
• Two data link layers are defined:
– ATM adaptation layer (AAL)
– ATM
• ATM physical topologies are stars
• ATM NICs with 25 speeds of 25, 100, or 155 mbps are
available for workstations
• Ethernet and token ring LANs can interface with an
organization’s ATM backbone network via ATM
gateway/access switches (see Figure 4-9)
ATM
• ATM is a circuit-based network, in that a virtual circuit is
setup between two devices to communicate over the network.
There are two types of circuits in an ATM network.
– Permanent Virtual Circuit (PVC): A circuit that is setup once in the
switches to allow communication between two devices.
– Switch Virtual Circuit (SVC): A circuit that is temporarily setup
just for the duration of a communication between two devices.
Several Classes of service have been defined for ATM
- Circuit emulation with constant bit rate.
- Audio and/or video with a variable bit rate.
- Connection-oriented service for data transmission.
- Connectionless service for data transmission
Figure 4-9
4-9
Wireless LAN Architectures
• IEEE 802.11x standards are the most important wireless LAN
(WLAN) specifications that exist today (see Table 4-4)
• WLANs are typically implemented as physical stars
– Nodes connect to wireless hubs called access points
• CSMA/CA is the MAC protocol for IEEE 802.11-compliant LANs
• IEEE 802.11 addresses FHSS (frequency hopping spread spectrum),
DSSS (direct sequence spread spectrum), and diffuse infrared
transmission
– User “roaming” capabilities are also addressed
• WiFi (Wireless Fidelity) certification has been developed to promote
interoperability among WLAN products
• The WISPR (Wireless ISP Roaming) standard is designed to enable
users to roam from one publicly accessible WLAN to another
Table 4-4
4-4
Choosing Among LAN
Architectures
• A number of factors should be considered when selecting among LAN
architectures
• Some of the major factors are described in Table 4-5.
• Especially important factors to consider include:
– Immediate and recurring LAN costs
– Total cost of ownership (TCO)
– Number of concurrent users that can be supported
– Transmission speed and data throughput
– Vendor support
– Manageability
– Scalability/expandability
– Security
– Adherence to widely accepted standards
Table 4-5
4-5
CSMA/CA
• CSMA/CA (Carrier Sense Multiple Access and
Collision Avoidance) is a variation of CSMA/CD
used in wireless LANs because it is difficult to
detect collisions in such networks
• When CSMA/CA is used, each node must wait a
random time interval (hardwired in the wireless
NIC) after detecting a clear medium before
transmitting

More Related Content

What's hot

Intro to Model Selection
Intro to Model SelectionIntro to Model Selection
Intro to Model Selection
chenhm
 

What's hot (20)

Neural networks.ppt
Neural networks.pptNeural networks.ppt
Neural networks.ppt
 
CS6010 Social Network Analysis Unit I
CS6010 Social Network Analysis Unit ICS6010 Social Network Analysis Unit I
CS6010 Social Network Analysis Unit I
 
Web mining (1)
Web mining (1)Web mining (1)
Web mining (1)
 
Social Network Analysis (SNA) 2018
Social Network Analysis  (SNA) 2018Social Network Analysis  (SNA) 2018
Social Network Analysis (SNA) 2018
 
Social Media Mining - Chapter 3 (Network Measures)
Social Media Mining - Chapter 3 (Network Measures)Social Media Mining - Chapter 3 (Network Measures)
Social Media Mining - Chapter 3 (Network Measures)
 
Community detection in graphs
Community detection in graphsCommunity detection in graphs
Community detection in graphs
 
Web mining
Web miningWeb mining
Web mining
 
1.9.association mining 1
1.9.association mining 11.9.association mining 1
1.9.association mining 1
 
Social Data Mining
Social Data MiningSocial Data Mining
Social Data Mining
 
Intro to Model Selection
Intro to Model SelectionIntro to Model Selection
Intro to Model Selection
 
Association rule mining
Association rule miningAssociation rule mining
Association rule mining
 
Temporal data mining
Temporal data miningTemporal data mining
Temporal data mining
 
3 Centrality
3 Centrality3 Centrality
3 Centrality
 
Social network analysis
Social network analysisSocial network analysis
Social network analysis
 
Exploratory Data Analysis
Exploratory Data AnalysisExploratory Data Analysis
Exploratory Data Analysis
 
A quick introduction to R
A quick introduction to RA quick introduction to R
A quick introduction to R
 
Community Detection
Community Detection Community Detection
Community Detection
 
CS6010 Social Network Analysis Unit III
CS6010 Social Network Analysis   Unit IIICS6010 Social Network Analysis   Unit III
CS6010 Social Network Analysis Unit III
 
Build Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and GraphsBuild Intelligent Fraud Prevention with Machine Learning and Graphs
Build Intelligent Fraud Prevention with Machine Learning and Graphs
 
Community detection in social networks
Community detection in social networksCommunity detection in social networks
Community detection in social networks
 

Viewers also liked

Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
Ashish Kumar
 

Viewers also liked (16)

P2P: Simulations and Real world Networks
P2P: Simulations and Real world NetworksP2P: Simulations and Real world Networks
P2P: Simulations and Real world Networks
 
Let's tak Productivity (Let's talk Apple #4)
Let's tak Productivity (Let's talk Apple #4)Let's tak Productivity (Let's talk Apple #4)
Let's tak Productivity (Let's talk Apple #4)
 
Arc gis network analyst tutorial
 Arc gis network analyst tutorial Arc gis network analyst tutorial
Arc gis network analyst tutorial
 
Digital Image Processing: Image Enhancement in the Spatial Domain
Digital Image Processing: Image Enhancement in the Spatial DomainDigital Image Processing: Image Enhancement in the Spatial Domain
Digital Image Processing: Image Enhancement in the Spatial Domain
 
FDDI
FDDIFDDI
FDDI
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
Enhancement in spatial domain
Enhancement in spatial domainEnhancement in spatial domain
Enhancement in spatial domain
 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
 
Image Enhancement in Spatial Domain
Image Enhancement in Spatial DomainImage Enhancement in Spatial Domain
Image Enhancement in Spatial Domain
 
Ethernet
EthernetEthernet
Ethernet
 
Apple talk
Apple talkApple talk
Apple talk
 
Multi-network Solutions in the Real World Forum at IBC 2013
Multi-network Solutions in the Real World Forum at IBC 2013Multi-network Solutions in the Real World Forum at IBC 2013
Multi-network Solutions in the Real World Forum at IBC 2013
 
The Real Life Social Network v2
The Real Life Social Network v2The Real Life Social Network v2
The Real Life Social Network v2
 
Slideshare.Com Powerpoint
Slideshare.Com PowerpointSlideshare.Com Powerpoint
Slideshare.Com Powerpoint
 
Slideshare Powerpoint presentation
Slideshare Powerpoint presentationSlideshare Powerpoint presentation
Slideshare Powerpoint presentation
 
State of the Word 2011
State of the Word 2011State of the Word 2011
State of the Word 2011
 

Similar to Real-World Networks

Open Elective MSE.pptx
Open Elective MSE.pptxOpen Elective MSE.pptx
Open Elective MSE.pptx
athars248
 
Chapter 3 Networking
Chapter 3 NetworkingChapter 3 Networking
Chapter 3 Networking
mlrbrown
 

Similar to Real-World Networks (20)

Lan technologies
Lan technologiesLan technologies
Lan technologies
 
IEEE standard
IEEE standardIEEE standard
IEEE standard
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Lan basic
Lan basicLan basic
Lan basic
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
01 coms 525 tcpip - networking concepts review
01   coms 525 tcpip - networking concepts review01   coms 525 tcpip - networking concepts review
01 coms 525 tcpip - networking concepts review
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
Open Elective MSE.pptx
Open Elective MSE.pptxOpen Elective MSE.pptx
Open Elective MSE.pptx
 
Ethernet lan
Ethernet lanEthernet lan
Ethernet lan
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Chapter10
Chapter10Chapter10
Chapter10
 
Ethernet
EthernetEthernet
Ethernet
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Chapter 3 Networking
Chapter 3 NetworkingChapter 3 Networking
Chapter 3 Networking
 
Technical Ethernet
Technical EthernetTechnical Ethernet
Technical Ethernet
 
Network topology architecturea
Network topology architectureaNetwork topology architecturea
Network topology architecturea
 
Network topology architectureb
Network topology architecturebNetwork topology architectureb
Network topology architectureb
 
Network topology architecture
Network topology architectureNetwork topology architecture
Network topology architecture
 
UTP and STP
UTP and STPUTP and STP
UTP and STP
 
Week 5 lan topology
Week 5 lan topologyWeek 5 lan topology
Week 5 lan topology
 

More from zaisahil (11)

The Basics of Network Troubleshooting
The Basics of Network TroubleshootingThe Basics of Network Troubleshooting
The Basics of Network Troubleshooting
 
Wide Area Network
Wide Area NetworkWide Area Network
Wide Area Network
 
Expending Networking
Expending NetworkingExpending Networking
Expending Networking
 
Remote Access
Remote AccessRemote Access
Remote Access
 
Administrating Your Network
Administrating Your NetworkAdministrating Your Network
Administrating Your Network
 
Configuring Network Clients
Configuring Network ClientsConfiguring Network Clients
Configuring Network Clients
 
Configuring The Network Server
Configuring The Network ServerConfiguring The Network Server
Configuring The Network Server
 
Designing Local Area Network
Designing Local Area NetworkDesigning Local Area Network
Designing Local Area Network
 
The Theoretical Network
The Theoretical NetworkThe Theoretical Network
The Theoretical Network
 
Network Components
Network ComponentsNetwork Components
Network Components
 
Introduction to Networks & Networking Concepts
Introduction to Networks & Networking ConceptsIntroduction to Networks & Networking Concepts
Introduction to Networks & Networking Concepts
 

Recently uploaded

Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in  Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in Uttam Nagar (delhi) call me [🔝9953056974🔝] escort service 24X7
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx21st_Century_Skills_Framework_Final_Presentation_2.pptx
21st_Century_Skills_Framework_Final_Presentation_2.pptx
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
General Principles of Intellectual Property: Concepts of Intellectual Proper...
General Principles of Intellectual Property: Concepts of Intellectual  Proper...General Principles of Intellectual Property: Concepts of Intellectual  Proper...
General Principles of Intellectual Property: Concepts of Intellectual Proper...
 

Real-World Networks

  • 2. What is Meant By LAN Architecture? • LAN architecture is the overall design of a LAN. It includes: – LAN hardware – LAN software – LAN topology – Media access control (MAC) protocol • The LAN’s network operating system is sometimes also considered to be part of LAN architecture
  • 3. LAN Topologies • There are two types of LAN topologies: physical and logical • Physical LAN topology refers to the physical layout of the network – The way in which the communication is configured and how nodes attach to the network – Because the focus is on physical connections among hardware component, physical topologies correspond to the physical layer of the OSI reference model • Logical topology is concerned with how messages are passed from node to node within the network
  • 4. LLC and MAC Sublayers • LANs employ two primary data link protocols: contention and token passing • In IEEE 802 standards, the data link layer is divided into two sublayers LLC and MAC (see Figure 4-1) – LLC (logical link control) is responsible for flow control, message sequencing, message acknowledgement, and error checking – MAC (media access control) enables network nodes to access the communication medium via contention or token passing
  • 6. How Ethernet Works-CSMA/CD • CSMA/CD (Carrier Sense Multiple Access and Collision Detection) is most widely used contention-based MAC used in LANs – It is the MAC protocol used in Ethernet LANs • In a true contention MAC (like CSMA/CD), each node has equal access to the medium • As noted in Table 4-1, each node monitors the medium for data traffic and if none is detected, it begins transmitting data • A collision occurs when two or more nodes begin to transmit at the same time • To avoid collision recurrence, each node waits a random time interval (hardwired in its NIC) before attempting to retransmit
  • 8. 10Mbps Ethernet • The four commonly used 10Mbps Ethernet cabling systems are: – 10Base5, or thicknet, which uses thick coaxial cable – 10Base2, or thinnet, which uses thin coaxial cable – 10BaseT, which uses unshielded twisted pair cable – 10BaseFL, which uses single or multimode optical fiber
  • 9. 10Base5 (Thicknet) Ethernet • 10Base5 (thickenet) Ethernet has the following specifications: – Maximum segment length 500 meters (1650 feet) – Maximum taps 100 – Maximum segments 5 – Maximum segments with nodes 3 – Maximum distance between taps 2.5 meters (8.25 feet) – Maximum repeaters 4 – Maximum overall length with repeaters 2.5 kilometers (1.5 miles) – Maximum AUI drop cable length 50 meters (165 feet) We use BNC connectors, DIX connectors, Transceiver, Transceiver cable, BNC barrel connectors, one BNC terminator, one Grounded terminator.
  • 10. 10Base2 (Thinnet Coax) Ethernet • 10Base2 (Thinnet) Ethetnet has the following specifications: – Maximum segment length 185 meters (610.5 feet) – Maximum segments 5 – Maximum segments with nodes 3 – Maximum repeaters 4 – Maximum devices per segments 30 – Maximum overall length with repeaters 925 meters (3052.5 feet) The term 10Base2 is little misleading since the maximum length is not actually 200 meters (660 feet) but only 185 meters (610.5 feet). The specification of thinnet is 50 Ohms RG-85A/U or RG-85 Coaxial cable. You use in thinnet BNC connectors, T connectors, and two terminators at both ends
  • 11. 10BaseT (Twisted-Pair) Ethernet • 10BaseT(twisted-pair) Ethernet has the following specifications: – Maximum segments 1024 – Maximum segments with nodes 1024 – Maximum segment length 100 meters (330 feet) – Maximum nodes per segments 2 – Maximum nodes per network 1024 – Maximum hubs in a chain 4 10BaseT is wired as a Star which means that each device has its own set of wires connected directly to a hub. The connection to the hub and the LAN cards is made with an RJ-45 connector. UTP cable is classified in categories, Categories 1and 2 are voice grade cable, Categories 3, 4, and 5 are data-grade.
  • 12. 10BaseFL • 10BaseFL Ethernet has the following specifications: – Maximum segments 1024 – Maximum segments with nodes 1024 – Maximum segment length 2000 meters – Maximum nodes per segments 2 – Maximum nodes per network 1024 – Maximum hubs in a chain 4 10BaseFL (10Mbps data rate, baseband signaling over a fiber-optic cable) uses light rather than electricity to transfer Ethernet frame. 10BaseFL is a Star-wired network because it requires a hub (also called a concentrator) to receive the light signal from each network station and send the same signal to all stations.
  • 13. 100VG-AnyLAN • 100VG-AnyLAN (aka 100BaseVG) is capable of transporting both IEEE 802.3 and IEEE 802.5 frames • It is faster • It provides a mechanism for interconnecting 100 Mbps token ring and 100BaseT Ethernet LANs via specialized hubs and routers (see Figure 4-2) – 100VG-AnyLAN-compliant adapters are also needed • It uses demand priority access (DPA) rather than CSMA/CD as the MAC protocol in order to enable real-time voice and video frames to be given priority over other data frames • Hubs can filter individually addressed frames for enhanced privacy. 100VG-anyLAN can use over Categories 3, 4, and 5 Twisted-pair and Fiber- optic cables. It uses a Star topology and defines how child hubs can be connected to a parent hub to extend the network. Several Hubs are cascaded in Figure 4-3.
  • 16. 100BaseT Ethernet • 100BaseT, also called Fast Ethernet, is simply regular Ethernet run at a faster data rate over category 5 twisted-pair cable. 100BaseT uses the CDMA/CD protocol in a star wired bus as 10BaseT. 100BaseT has been specified for three media types: – 100BaseT4 (four pairs categories 3, 4, and 5 UTP or STP) – 100BaseTX (two pairs category 5 UTP or STP) – 100BaseFX (two-strand fiber-optic cable) In addition to the faster data rate and the higher quality cable required, 100BaseX has the same advantages and drawbacks as 10BaseT.
  • 17. Segmentation • Segmentation is the process of splitting a large Ethernet network into two or more segments linked by bridges or router.
  • 18. Token Passing • Token passing is the other major MAC protocol found in LANs • It is used in token ring and FDDI LANs and other networks with logical ring topologies • The token is a pre-defined bit pattern that is passed among network attached computers until one of them wants to use the medium to transmit data • Token passing is summarized in Table 4-2 • In token ring networks that resemble physical star topologies, token passing takes place within MAUs (see Figure 4-7) • Token passing can be used in bus topologies as well as in physical ring topologies. • Table 4-3 compares token passing and CSMA/CD
  • 20. IEEE 802.5 and 802.6 LANs • The most widely used microcomputer ring network is the token passing ring. It conforms to the IEEE 802.5 standard • Token ring networks physically look like a star topology, but technically they are physical rings – Token ring nodes attach to multistation access units (MAUs) – see Figure 4-4 – MAUs can be described as “a ring in a box”, because nodes attach to the physical ring by connecting to the MAU (see Figure 4-5) – MAUs can be interconnected to form larger rings (see Figure 4-6) • IEEE 802.6 addresses dual-ring metropolitan area network (MAN) architectures.
  • 26. Cabling for Token Ring • Type 1: STP cable used to connect terminals and distribution panel and to run through walls to wiring closets in the same building. It is two twisted pairs of solid core 22 gauge copper wire surrounded by a shield. • Type 2: It is made just as type1 cable with the exception that it incorporates four twisted pairs of telephone wires. • Type 3: UTP cable with four pairs, each twisted two time for every 3.6 meters (12feet) of length. It is cheaper than Type 1 and 2. It is made of either 22 or 24-gauge wire. • Type 5: Optical cable used only on the main ring path. It consists of 62.5-micron diameter or 100- micron diameter fiber-optic cable. • Type 6: STP cable that does not carry signals as for as Type 1 and 2. It is generally used only as patch cable or as extensions in wiring closets. It is made with 26-gauge copper wire twisted together in shielded jacket. • Type 8: Used for runs under carpets. Likes Type 6 cable, it is made of two 26-gauge stranded-core wires twisted together. • Type 9: Basically the fire-retardant version of Type 6 cable. It is made with two 26-gauge stranded- core copper wires twisted together in a shielded jacket.
  • 27. Token Ring Token Ring has the following specification: Cable type UTP, STP, or Fiber-optic Maximum MSAUs 33 Maximum Nodes 260 Maximum distance between 45.5 meters (150 feet) for UTP; up to nodes and MSAU 100 meters (330 feet) for STP or Fiber-Optic cable Maximum patch cable distance 45.5 meters with UTP cable; 200 meters connecting MSAUs (660 feet) with STP, 1 kilometer (0.6 mile) with Fiber-optic cable. Minimum patch cable 2.5 meters (8 feet) distance connecting MASUs Maximum cumulative patch cable 121.2 meters (400 feet) with UTP cable; distance connecting all MSAUs Fiber-optic cabling can span several kilometers
  • 28. How token Ring Works Active Monitor and Standby Monitors • Active Monitor in a Token Ring network (usually the device that has been operating on the network for the longest time) that periodically checks the status of the network and monitors for the network errors. Whereas Standby Monitor in Token Ring network monitors the status and may become the active monitor in the case of failure of the active monitor. Beaconing : • The process on Token Ring network by which a device, in the event of a cable fault, determines the state of the network and location of the fault. (If a station does not hear from its upstream neighbor in the seven seconds, it assume something bad has happened and acts on its own. This action is called beaconing.) It occurs when the Nearest Active Upstream Neighbor Notification (NAUN) fails.
  • 29. Token Ring Advantages: • Unlike Ethernet, Token Ring continuous to operate reliably under heavy loads. • Built-in diagnostic and recovery mechanism, such as beaconing and auto-configuration, makes the protocol more reliable. • Token Ring makes connecting a LAN to an IBM mainframe easier since IBM created it and supports it. • Fault-tolerance features are provided through ring reconfiguration, called ring-wrap. A single cable can create a ring when attached to two MSAUs. Disadvantages • Token Ring cards and equipment are more expensive than Ethernet or ARCnet system. • Token Ring can be very difficult to troubleshoot and requires considerable experience.
  • 30. Medium Access Control Sublayer  IEEE 802 Frame Formats
  • 31. Medium Access Control Sublayer  IEEE 802 Frame Formats
  • 32. Some Key Ethernet Implementations • Particularly important Ethernet implementations include: – Fast Ethernet (e.g. 100BaseT and 100BaseFX) • The IEEE 802.3u specification covers Fast Ethernet – Gigabit Ethernet (e.g. 1000BaseT, 1000BaseSX, and 1000BaseLX) • The IEEE 802.3z specification addresses Gigabit Ethernet
  • 33. FDDI LANs • Fiber Distributed Data Interface (FDDI) was first recognized in ANSI’s X3T9.5 specification • Physically, it has a dual ring topology • It has a sequential/ring logical topology and uses a variation of token passing as the MAC protocol • Key FDDI technologies are identified in Figure 4-8 – These include single attached stations (SAS), dual attached stations (DAS), FDDI concentrators, and FDDI/Ethernet bridges • FDDI is often used as a backbone network architecture.
  • 35. ATM LANs • ATM (asynchronous transfer mode) is a switched network architecture that employs 53-octet cells to transmit data • Two data link layers are defined: – ATM adaptation layer (AAL) – ATM • ATM physical topologies are stars • ATM NICs with 25 speeds of 25, 100, or 155 mbps are available for workstations • Ethernet and token ring LANs can interface with an organization’s ATM backbone network via ATM gateway/access switches (see Figure 4-9)
  • 36. ATM • ATM is a circuit-based network, in that a virtual circuit is setup between two devices to communicate over the network. There are two types of circuits in an ATM network. – Permanent Virtual Circuit (PVC): A circuit that is setup once in the switches to allow communication between two devices. – Switch Virtual Circuit (SVC): A circuit that is temporarily setup just for the duration of a communication between two devices. Several Classes of service have been defined for ATM - Circuit emulation with constant bit rate. - Audio and/or video with a variable bit rate. - Connection-oriented service for data transmission. - Connectionless service for data transmission
  • 38. Wireless LAN Architectures • IEEE 802.11x standards are the most important wireless LAN (WLAN) specifications that exist today (see Table 4-4) • WLANs are typically implemented as physical stars – Nodes connect to wireless hubs called access points • CSMA/CA is the MAC protocol for IEEE 802.11-compliant LANs • IEEE 802.11 addresses FHSS (frequency hopping spread spectrum), DSSS (direct sequence spread spectrum), and diffuse infrared transmission – User “roaming” capabilities are also addressed • WiFi (Wireless Fidelity) certification has been developed to promote interoperability among WLAN products • The WISPR (Wireless ISP Roaming) standard is designed to enable users to roam from one publicly accessible WLAN to another
  • 40. Choosing Among LAN Architectures • A number of factors should be considered when selecting among LAN architectures • Some of the major factors are described in Table 4-5. • Especially important factors to consider include: – Immediate and recurring LAN costs – Total cost of ownership (TCO) – Number of concurrent users that can be supported – Transmission speed and data throughput – Vendor support – Manageability – Scalability/expandability – Security – Adherence to widely accepted standards
  • 42. CSMA/CA • CSMA/CA (Carrier Sense Multiple Access and Collision Avoidance) is a variation of CSMA/CD used in wireless LANs because it is difficult to detect collisions in such networks • When CSMA/CA is used, each node must wait a random time interval (hardwired in the wireless NIC) after detecting a clear medium before transmitting