T4 Part1 LAN
T4 Part1 LAN
T4 Part1 LAN
LOCAL AREA
NETWORK
(LAN)
1
CHAPTER 4
LOCAL AREA NETWORK
LEARNING OUTCOME
• 4.1 Remember Local Area Network
• 4.2 Apply the knowledge of Media Access Control (MAC)
• 4.3 Understand IEEE Standard Project 802
2
4.1 Remember Local Area Network
3
DEFINITION OF LAN
Server
computer
ETHERNET LAN
14
MEDIA ACCESS CONTROL (MAC)
1) Provides a ............. identification and ............. control for
computers using Internet Protocol (IP) network.
The main task of MAC protocol is to minimize collisions in
order to utilize the bandwidth by determining when a
station can use the link (medium).
2) MAC sub layer provides ............ and ............ access control
The hardware that implements MAC is referred to as a
medium access controller. The MAC sub layer acts as an
interface between the logical link control (LLC) sub layer
and the network's physical layer.
3) In LAN or other network, the MAC address is your computer's
………… hardware number.
When you are connected to Internet from your computer
(or host), a correspondence table relates your IP address to
your computer's physical (MAC) address of LAN.
TYPES OF MAC
TOKEN PASSING
CSMA/CA
CSMA/CA Stands for Carrier Sense
Multiple Access with Collision Avoidance.
Every station must ……. (check) the carrier (at channel) before
executing a transmission.
If the ………. is not used, thus station can ……….. data. If the
channel is …….., then station will ……… until the channel is ………..
CSMA/CA cont…
CSMA/CA CHARACTERISTICS
1) Instead of ………… data collisions, CSMA/CA method attempts to
avoid them altogether.
2) On a network that uses the CSMA/CA access method, when a
computer has data to transmit, its Network Interface Card (NIC)
first ………… cable to determine if there is already data on wire.
3) So far, the process is identical to CSMA/CD. However, if the NIC
senses that cable is ……… in use, it still does not ……… its data
packet.
4) Instead, it send a signal of intent indicating that it is about to
transmit data out of the cable.
CSMA/CA cont…
ADVANTAGES DISADVANTAGES
……. than CSMA/CD ........... for large or active
networks.
………… in avoiding data
collisions and can be Distance ........... since it
operated in high data rate must listen for signals of
intent.
A ……….. data transmission
service because intent ......... in speed because
signals are sent until cable is intent signal must be sent
clear. everytime a computer wants
to transmit data.
CSMA/CD
◦ Stands for Carrier Sense Multiple Access
with Collision Detection. CSMA/CD
• Each device ……….. to media for
transmissions. When media is ……..,
initiates transmission and listens for
……….
• If ………… occurs, device ………. for
random amount of time before ………..
transmission again.
• Commonly used on physical networks.
CSMA/CD cont…
The following is configuration of CSMA/CD:
CSMA/CD cont…
CSMA/CD PROCESS
At first level where station A acts as a Sender station:-
Station A will …………. line before transmission to determines the
line is not used by other station at that time.
When another station has finished using the line, then station A
can send its message.
CSMA/CD cont…
CSMA/CD PROCESS
At second level is where message is heading to destination:-
Station A will …………. message and make sure there is no
…………. Collision occurs when 2 stations send data at similar
time.
This situation happens because both stations ………… line is not
used and both ………… send message.
ADVANTAGES DISADVANTAGES
Relatively .......... because ............. for large or active
computer does not have to networks because collisions
wait its turn to transmit slower down the network.
data.
Distance ............. because
A ………. data transmission the collision detection
service because collisions mechanism will restricts the
are detected and packets length of cable segment that
are resent, so no data lost. can be used.
TOKEN PASSING
The following is configuration of Token Passing:
TOKEN
PASSING
TOKEN PASSING cont…
TOKEN PASSING PROCESS
With token passing, a specific packet of data, called a …………, is circulated
around the ring from station to station, always in the same direction.
Before a station is allowed to transmit, it must first posses the token, then
fills it with address of destination station and data and ………… the token
as being used.
Each station, in turn, acquires the token and ……… the data frame to
determine if it is carrying a packet addressed to it.
When the destination station reads the message, it sends the message
back to the sender station with an …………….. to say that it has received the
data.
The sender station ………..the token and passes the token along to the next
station in the topology. In this process, when a station receives the token
and has no data to send, it just passes the data to the next station.
TOKEN PASSING cont…
TOKEN PASSING CHARACTERISTICS
When the data sent received back by computer A (after full
round), then it will ………… the token as ‘…………’ and send it to
the next station.
ADVANTAGES DISADVANTAGES
Ensure about …………. Not ………… for network
arrivals, where maximum where few stations generate
(‘round trip time’). ‘traffic burst’ while other
station ‘idle’ all the time.
If each station has message
to send every time it owns ........... at any station in the
the token, the real ‘……… network disturbs
trip time’ is less than the transmission and reception
maximum value (very of token.
small).
CSMA/CD CSMA/CA TOKEN PASSING
Carrier Sense Multiple Access/ Carrier Sense Multiple Access/ -
Collision Detection. Collision Avoiding
Suitable in BUS and STAR Suitable in BUS and STAR Suitable in RING Topology
Topology Topology
Have THREE steps: Have TWO steps only: • Each station have to use a
1)Each station ………… to send 1)Each station will ……….. the ………… to send the data.
the data. line is free from any • Only ONE token used in ONE
2)While sending the data, transmitting process before network .
each station will examine and sending the data. •IF no data to be sent, an
………… any collision of data 2)IF the line is surely ………… ………… token will round the
between the other data then only one station can do ring.
sending. the sending process. While •IF stations need to send data,
3)IF the collision occurred, another station have to ……….. ………….. for the token, GRAB
each station will ………… their after previous transmitting the token, SENT the data and
data sending for a while and process is done. RELEASE an empty token.
send back the previous data.
32
LAN Standards
Standards are required so that ………….. manufacturers can create equipment
that will interoperate without special configuration.
Standards will ………… different computers to communicate.
Standards will increase the market for products adhering to the standard,
resulting in mass production and cheaper prices .
Application
Application
Presentation
Session
Transport Host-to-Host
Data Link
Network Access
Physical
OSI Layers
OSI Model
Data unit Layer Function
7. Application Network process to application
Data representation, encryption
Data 6. Presentation
Host and decryption
layers 5. Session Interhost communication
End-to-end connections and
Segments 4. Transport
reliability, Flow control
Path determination and logical
Packet 3. Network
addressing
Media
Frame 2. Data Link Physical addressing
layers
Media, signal and binary
Bit 1. Physical
transmission
Application Layer
Application Layer
Presentation Layer TELNET, FTP, SMTP, POP3, SNMP,
NNTP, DNS,NIS, NFS, HTTP, ...
Session Layer
MAC layer
◦ Prepare data for transmission
◦ Error detection
◦ Address recognition
◦ Govern access to transmission medium
◦ Not found in traditional layer 2 data link control
Variation of LAN standard (IEEE 802)
• 802.1: Covering architecture, addressing,
internetworking and management.
• 802.2: Logical Link Control (LLC)
• 802.3: CSMA/CD
• 802.4: Token Bus LAN
• 802.5: Token Ring LAN
• 802.6: Metropolitan Area Network
• 802.7: Broadband Technical Advisory Group
• 802.8: Fiber-Optic Technical Advisory Group
• 802.9: Integrated Voice/Data Networks
• 802.10: Network Security
Variation of LAN standard (IEEE 802) …cont
• 802.11: Wireless Networks
• 802.12: Demand Priority Access LANs
Ex: 100BaseVG-AnyLAN
• 802.15: Wireless Personal Area Network
• 802.16: Wireless Mertopolitan Area Network
• 802.20: Mobile Broadband Wireless Access
MAC Frame Formats
The basic frame consists of seven elements split between ………..
main areas:-
Header
Payload
Trailer
• Trailer
– Frame Check Sequence (FCS) - This field is four bytes long. It
contains a …………. Cyclic Redundancy Check (CRC). A 32-bit
CRC provides ………….. detection in the case where line errors
(or transmission collisions in Ethernet) result in corruption of
the MAC frame. Any frame with an invalid CRC is discarded by
the MAC receiver without further processing.
Nine fields of MAC frame format
Field Description
Preamble Contains 7 octet field that is used to allow the PLS circuitry to reach its steady
state synchronization with the received ............ timing.
Start Frame Sequence of 10101011. It immediately follows the preamble pattern and indicates
Delimiter (SFD) the .......... of a frame.
Destination Specify the ............. addressee(s) for which the frame is intended. It may be an
Address individual or multicast (including broadcast) address.
Source ............ the station from which the frame was initiated. The Source Address
Address field is not interpreted by the CSMA/CD MAC sublayer.
Length/Type This ..........-octet field takes one of two meanings, depending on its numeric value.
For numerical evaluation, the first octet is the most significant octet of this field.
MAC Client …………. the original Length/Type field from the MAC frame prior to insertion
Data of the QTag Prefix. The QTag Prefix offsets this field exactly 4 octets from its
position in an untagged MAC frame.
PAD Data field is extended by appending extra bits (refers to pad) in units of octets
after data field but prior to calculating and appending FCS.
Frame Check Contains a 4-octet (32-bit) of ……….. value. This value is computed as a
Sequence (FCS) function of contents of source/destination address, length/type, LLC data and pad.
Follows the FCS field and is made up of a sequence of extension bits, which
Extension
are readily distinguished from data bits.
Generic MAC & LLC Format
Actual format differs from protocol to protocol
MAC layer receives data from LLC layer
13.52