T4 Part1 LAN

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 52

CHAPTER 4

LOCAL AREA
NETWORK
(LAN)

1
CHAPTER 4
LOCAL AREA NETWORK

LEARNING OUTCOME
• 4.1 Remember Local Area Network
• 4.2 Apply the knowledge of Media Access Control (MAC)
• 4.3 Understand IEEE Standard Project 802

2
4.1 Remember Local Area Network

3
DEFINITION OF LAN

1) ………….. of …………… that …………. hardware, software or data.


Widely used to link a personal computer (PC) or workstation
at homes, offices or plants to share sources and exchange
information.
2) Covers a ………………. for example, a computer laboratory,
school or a building.
Communication system which allows variety of devices to
communicate between each other in a limited geographic
area (in building or a nearby buildings).
3) Usually owned, used and organized by a ………….. organization.
DEFINITION OF LAN cont..
The following are configuration of Local Area Network (LAN):

Server
computer
ETHERNET LAN

 …………… is a way of connecting computers together


in a local area network or LAN.
 Ethernet was developed in 1972 in the renowned
PARC-research facility of Xerox in Palo Alto by Robert
Metcalfe.
 In the meantime the companies Intel, DEC and Xerox
have specified a common standard that has been
established in the IEEE-.............. 802.3.
GENERATION of ETHERNET LAN

The Ethernet LAN has gone through four generations:


GENERATION of ETHERNET LAN cont..
Standard Ethernet
We refer to the original …………. technology with the data
rate of …………. as the Standard Ethernet. ………. length
delivery distances. Used ………….. cable (UTP/ STP).
GENERATION of ETHERNET LAN cont..
Fast Ethernet
In the 1990s, Ethernet made a big jump by …………. the
transmission rate to ………….
The MAC sublayer was left unchanged.
The features of the Standard Ethernet that depend on the
transmission rate, had to be changed.
GENERATION of ETHERNET LAN cont..
Fast Ethernet Encoding
GENERATION of ETHERNET LAN cont..
Gigabit Ethernet
The need for an even …………. data rate resulted in the
design of the Gigabit Ethernet Protocol (…………..).
The IEEE committee calls it the ………… 802.3z.
The goals of the Gigabit Ethernet were to upgrade the data rate
to …………, but keep the address length, the frame format, and
the maximum and minimum frame length the same.
GENERATION of ETHERNET LAN cont..
Gigabit Ethernet Encoding
GENERATION of ETHERNET LAN cont..
10 Gigabit Ethernet
In recent years, there has been another look into the Ethernet
for use in …………. areas.
The idea is to ………. the technology, the data rate, and the
coverage distance so that the Ethernet can be used as LAN and
MAN (metropolitan area network).
The IEEE committee created ……….. Ethernet and called it
Standard 802.3ae.
4.2 Apply the knowledge of Media Access Control
(MAC)

14
MEDIA ACCESS CONTROL (MAC)
1) Provides a ............. identification and ............. control for
computers using Internet Protocol (IP) network.
The main task of MAC protocol is to minimize collisions in
order to utilize the bandwidth by determining when a
station can use the link (medium).
2) MAC sub layer provides ............ and ............ access control
The hardware that implements MAC is referred to as a
medium access controller. The MAC sub layer acts as an
interface between the logical link control (LLC) sub layer
and the network's physical layer.
3) In LAN or other network, the MAC address is your computer's
………… hardware number.
When you are connected to Internet from your computer
(or host), a correspondence table relates your IP address to
your computer's physical (MAC) address of LAN.
TYPES OF MAC

 CARRIER SENSE MULTIPLE ACCESS/


COLLISION AVOIDANCE (CSMA/CA)

 CARRIER SENSE MULTIPLE ACCESS/


COLLISION DETECTION (CSMA/CD)

 TOKEN PASSING
CSMA/CA
CSMA/CA Stands for Carrier Sense
Multiple Access with Collision Avoidance.

• Each device ……….. to media for transmissions.


When media is ……….., device ……….. an intent
to ………… signal. As this signal is small, chances
of collision are minimized.

• Used often in wireless networking.


CSMA/CA cont…
The following is configuration of CSMA/CA:
CSMA/CA cont…
CSMA/CA PROCESS
In this process, station will counts ‘start of ………. time’ for a data
to minimize the probability of …….. stations receives (or use)
network at …….. time.

Every station must ……. (check) the carrier (at channel) before
executing a transmission.

If the ………. is not used, thus station can ……….. data. If the
channel is …….., then station will ……… until the channel is ………..
CSMA/CA cont…
CSMA/CA CHARACTERISTICS
1) Instead of ………… data collisions, CSMA/CA method attempts to
avoid them altogether.
2) On a network that uses the CSMA/CA access method, when a
computer has data to transmit, its Network Interface Card (NIC)
first ………… cable to determine if there is already data on wire.
3) So far, the process is identical to CSMA/CD. However, if the NIC
senses that cable is ……… in use, it still does not ……… its data
packet.
4) Instead, it send a signal of intent indicating that it is about to
transmit data out of the cable.
CSMA/CA cont…

ADVANTAGES DISADVANTAGES
……. than CSMA/CD ........... for large or active
networks.
………… in avoiding data
collisions and can be Distance ........... since it
operated in high data rate must listen for signals of
intent.
A ……….. data transmission
service because intent ......... in speed because
signals are sent until cable is intent signal must be sent
clear. everytime a computer wants
to transmit data.
CSMA/CD
◦ Stands for Carrier Sense Multiple Access
with Collision Detection. CSMA/CD
• Each device ……….. to media for
transmissions. When media is ……..,
initiates transmission and listens for
……….
• If ………… occurs, device ………. for
random amount of time before ………..
transmission again.
• Commonly used on physical networks.
CSMA/CD cont…
The following is configuration of CSMA/CD:
CSMA/CD cont…
CSMA/CD PROCESS
At first level where station A acts as a Sender station:-
Station A will …………. line before transmission to determines the
line is not used by other station at that time.

If another station ……… the line for transmission, then station A


has to …….. for a while and ………… the line again.

When another station has finished using the line, then station A
can send its message.
CSMA/CD cont…
CSMA/CD PROCESS
At second level is where message is heading to destination:-
Station A will …………. message and make sure there is no
…………. Collision occurs when 2 stations send data at similar
time.
This situation happens because both stations ………… line is not
used and both ………… send message.

When collision happens, both stations have to send message


again after …………. for a while. Waiting time for both stations
are …………. to avoid another collision from occurs.
CSMA/CD cont…

ADVANTAGES DISADVANTAGES
Relatively .......... because ............. for large or active
computer does not have to networks because collisions
wait its turn to transmit slower down the network.
data.
Distance ............. because
A ………. data transmission the collision detection
service because collisions mechanism will restricts the
are detected and packets length of cable segment that
are resent, so no data lost. can be used.
TOKEN PASSING
The following is configuration of Token Passing:
TOKEN
PASSING
TOKEN PASSING cont…
TOKEN PASSING PROCESS
With token passing, a specific packet of data, called a …………, is circulated
around the ring from station to station, always in the same direction.
Before a station is allowed to transmit, it must first posses the token, then
fills it with address of destination station and data and ………… the token
as being used.
Each station, in turn, acquires the token and ……… the data frame to
determine if it is carrying a packet addressed to it.
When the destination station reads the message, it sends the message
back to the sender station with an …………….. to say that it has received the
data.
The sender station ………..the token and passes the token along to the next
station in the topology. In this process, when a station receives the token
and has no data to send, it just passes the data to the next station.
TOKEN PASSING cont…
TOKEN PASSING CHARACTERISTICS
When the data sent received back by computer A (after full
round), then it will ………… the token as ‘…………’ and send it to
the next station.

In this process, the token must always moves. For example, if


computer C receives the token but the system is down before it
can send the data; then the ………… will …………..

To overcome this problem, more than one control station must


be placed in the network to sense the token transmission.

If the token does …………… in time or during maximum duration,


thus control station must ………… a new token.
TOKEN PASSING cont…

ADVANTAGES DISADVANTAGES
Ensure about …………. Not ………… for network
arrivals, where maximum where few stations generate
(‘round trip time’). ‘traffic burst’ while other
station ‘idle’ all the time.
If each station has message
to send every time it owns ........... at any station in the
the token, the real ‘……… network disturbs
trip time’ is less than the transmission and reception
maximum value (very of token.
small).
CSMA/CD CSMA/CA TOKEN PASSING
Carrier Sense Multiple Access/ Carrier Sense Multiple Access/ -
Collision Detection. Collision Avoiding

Suitable in BUS and STAR Suitable in BUS and STAR Suitable in RING Topology
Topology Topology
Have THREE steps: Have TWO steps only: • Each station have to use a
1)Each station ………… to send 1)Each station will ……….. the ………… to send the data.
the data. line is free from any • Only ONE token used in ONE
2)While sending the data, transmitting process before network .
each station will examine and sending the data. •IF no data to be sent, an
………… any collision of data 2)IF the line is surely ………… ………… token will round the
between the other data then only one station can do ring.
sending. the sending process. While •IF stations need to send data,
3)IF the collision occurred, another station have to ……….. ………….. for the token, GRAB
each station will ………… their after previous transmitting the token, SENT the data and
data sending for a while and process is done. RELEASE an empty token.
send back the previous data.

***Each station will be given a


different time waiting to avoid
the same collision.
4.3 Understand IEEE Standard Project 802

32
LAN Standards
Standards are required so that ………….. manufacturers can create equipment
that will interoperate without special configuration.
Standards will ………… different computers to communicate.
Standards will increase the market for products adhering to the standard,
resulting in mass production and cheaper prices .

Standards groups include:


ISO. International Organization for Standardization establishes standards for
networking operation.
ANSI. American National Standards Institute is the US representative to ISO.
EIA/TIA. Electronics Industries Alliance/Telecommunications Industry Association
is an industry based standards group.
IEEE. Institute of Electrical and Electronics Engineers is an international
professional organization that sets communications standards. IEEE Project 802
sets standards for cabling and data transmission on local area networks.
LAN standard : IEEE 802

• IEEE 802 refers to a family of networking standard, developed by the


Institute of Electrical and Electronic Engineers (IEEE).
• IEEE 802 is a Standard for Local Area Network (LAN) and Metropolitan
Area Networks (MAN).
• IEEE 802 is subdivided into 22 parts ( 802.1 - 802.22) that cover or map
to the two layers of ISO/OSI model:
 ………… link layer
– Logical link control (LLC) sublayer
– Media Access Control (MAC) sublayer
 ………… layer
• In general, IEEE 802 standard define physical network interfaces such as
network interface cards, bridges, routers, connectors, cables, and all
signaling and access methods associated with physical network
connections.
• The most widely used ………… : The Ethernet family (802.3), Token Ring
(802.5), Wireless LAN (802.11), Wireless PAN (802.15) , WIRELESS MAN
(802.16)
OSI Model TCP/IP Model

Application

Application
Presentation

Session

Transport Host-to-Host

Network Internet IEEE 802

Data Link
Network Access

Physical
OSI Layers
OSI Model
Data unit Layer Function
7. Application Network process to application
Data representation, encryption
Data 6. Presentation
Host and decryption
layers 5. Session Interhost communication
End-to-end connections and
Segments 4. Transport
reliability, Flow control
Path determination and logical
Packet 3. Network
addressing
Media
Frame 2. Data Link Physical addressing
layers
Media, signal and binary
Bit 1. Physical
transmission

Going from layer 1 to 7: Please Do Not Throw Sausage Pizza Away


Going from layer 7 to 1: All People Seem To Need Data Processing
TCP/IP Layers
OSI TCP/IP

Application Layer
Application Layer  
Presentation Layer TELNET, FTP, SMTP, POP3, SNMP,
NNTP, DNS,NIS, NFS, HTTP, ...
Session Layer

 Transport Layer Transport Layer  


TCP , UDP , ...

Network Layer  Internet Layer  


 IP , ICMP, ARP, RARP, ...

Data Link Layer


Link Layer 
 FDDI, Ethernet, ISDN, X.25,...
Physical Layer
Position of the data-link layer
Data link layer duties
LLC and MAC
• Data Link Layer is divided into two sublayers:
a. Logical Link Control (LLC)
b. Media Access Control (MAC)

• Logical Link Control (LLC) :


 This sublayer is responsible to ………….. and ………… the integrity of data
transmissions ; provides data transmission method in different
network.
 LLC provide multiplexing mechanisms that make it possible for several
network protocol to be transported over the same network medium,
and optionally provides ……… control, ………………, and error
notification.
 The LLC provides addressing and ………….. of the data link. It specifies
which mechanisms are to be used for addressing stations over the
transmission medium and for controlling the data exchanged between
the originator and recipient machines.
LLC and MAC

• Media Access Control (MAC):


 MAC may refer to the sublayer that determines who is …………… to
access the media at any one time. Other times it refers to a frame
structure with MAC addresses inside.
 The Media Access Control sublayer also …………… where one frame of
data ends and the next one starts – frame synchronization.
Summarize
LLC layer
◦ Interface to higher levels
◦ flow control
◦ Based on classical Data Link Control Protocols (so we will cover later)

MAC layer
◦ Prepare data for transmission
◦ Error detection
◦ Address recognition
◦ Govern access to transmission medium
◦ Not found in traditional layer 2 data link control
Variation of LAN standard (IEEE 802)
• 802.1: Covering architecture, addressing,
internetworking and management.
• 802.2: Logical Link Control (LLC)
• 802.3: CSMA/CD
• 802.4: Token Bus LAN
• 802.5: Token Ring LAN
• 802.6: Metropolitan Area Network
• 802.7: Broadband Technical Advisory Group
• 802.8: Fiber-Optic Technical Advisory Group
• 802.9: Integrated Voice/Data Networks
• 802.10: Network Security
Variation of LAN standard (IEEE 802) …cont
• 802.11: Wireless Networks
• 802.12: Demand Priority Access LANs
Ex: 100BaseVG-AnyLAN
• 802.15: Wireless Personal Area Network
• 802.16: Wireless Mertopolitan Area Network
• 802.20: Mobile Broadband Wireless Access
MAC Frame Formats
The basic frame consists of seven elements split between ………..
main areas:-
 Header
 Payload
 Trailer

Header Payload Trailer


MAC frame formats cont…
• Header
– Preamble (PRE) - This is seven bytes long and it consists of a pattern
of alternating ……… and ………, and this informs the receiving
stations that a frame is starting as well as enabling synchronisation.
– Start Of Frame delimiter (pemisah) (SOF) - This consists of one byte
and contains an alternating ………….. of ones and zeros but ending in
two ones.
– Destination Address (DA) - This field contains the ………….. of station
for which the data is intended.
The left most bit indicates whether the destination is an individual
address or a group address.
An individual address is denoted by a zero, while a one indicates a
group address.
The next bit into the DA indicates whether the address is globally
administered, or local. If the address is globally administered the bit
is a zero, and a one of it is locally administered. There are then 46
remaining bits. These are used for the destination address itself.
MAC frame formats cont…
• Header …cont

– Source Address (SA) - The source address consists of six


bytes, and it is used to …………. the sending station.
As it is always an individual address the left most bit is
always a zero.

– Length / Type - This field is two bytes in length. It ………….


MAC information and ………….. the number of client data
types that are contained in the data field of the frame. It
may also indicate the frame ID type if the frame is
assembled using an optional format.(IEEE 802.3 only).
MAC frame formats cont…
• Payload
– Data - This block contains the …………. data and it may be up
to ……….. bytes long. If the length of the field is less than 46
bytes, then padding data is added to bring its length up to the
required minimum of 46 bytes.

• Trailer
– Frame Check Sequence (FCS) - This field is four bytes long. It
contains a …………. Cyclic Redundancy Check (CRC). A 32-bit
CRC provides ………….. detection in the case where line errors
(or transmission collisions in Ethernet) result in corruption of
the MAC frame. Any frame with an invalid CRC is discarded by
the MAC receiver without further processing.
Nine fields of MAC frame format
Field Description
Preamble Contains 7 octet field that is used to allow the PLS circuitry to reach its steady
state synchronization with the received ............ timing.
Start Frame Sequence of 10101011. It immediately follows the preamble pattern and indicates
Delimiter (SFD) the .......... of a frame.
Destination Specify the ............. addressee(s) for which the frame is intended. It may be an
Address individual or multicast (including broadcast) address.
Source ............ the station from which the frame was initiated. The Source Address
Address field is not interpreted by the CSMA/CD MAC sublayer.
Length/Type This ..........-octet field takes one of two meanings, depending on its numeric value.
For numerical evaluation, the first octet is the most significant octet of this field.

MAC Client …………. the original Length/Type field from the MAC frame prior to insertion
Data of the QTag Prefix. The QTag Prefix offsets this field exactly 4 octets from its
position in an untagged MAC frame.
PAD Data field is extended by appending extra bits (refers to pad) in units of octets
after data field but prior to calculating and appending FCS.

Frame Check Contains a 4-octet (32-bit) of ……….. value. This value is computed as a
Sequence (FCS) function of contents of source/destination address, length/type, LLC data and pad.

Follows the FCS field and is made up of a sequence of extension bits, which
Extension
are readily distinguished from data bits.
Generic MAC & LLC Format
Actual format differs from protocol to protocol
MAC layer receives data from LLC layer

MAC layer detects errors and discards frames


LLC optionally retransmits unsuccessful frames
The relationship of the 802 Standard to the
TCP/IP protocol suite

13.52

You might also like