Lecture 04

  • Uploaded by: api-3701823
  • 0
  • 0
  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Lecture 04 as PDF for free.

More details

  • Words: 1,317
  • Pages: 27
Lecture:04

Prepared by ~ Bikramjit Chakrabarty EEE,L-4,T-2,BUET Sem-2,Cisco Networking Academy.

1

Contents of today’s Adventure:      

2

Review of Lecture-3 Ethernet CSMA/CD (Carrier Sense Multiple Access Collision Detection) Repeater (Layer-1 device ) Hub (Layer-1 device) Detail Analysis of Encapsulation and decapsulation process at different layers by different devices. (~optional)

Key Terms: (review…)       

Dispersion. Physical medium. NIC. MAC Address. Driver Connector. System bus.

      

3

Logical Addressing Flat Addressing (BIA) Encapsulation. Dencapsulation. Packet switching (Connection less). Circuit Switching (Connection oriented). Acknowledgement

Networking Technology     

4

IEEE 802.3: Carrier Sense Multiple Access/Collision Detect (CSMA/CD) Access Method. IEEE 802.3u: Fast Ethernet. IEEE 802.3z: Gigabit Ethernet. IEEE 802.5: IBM Token Ring. FDDI: The ANSI X3T9.5 standards committee produced the Fiber Distributed Data Interface (FDDI) standard & submitted FDDI to the International Organization for Standardization (ISO), who, then created an international version of the FDDI that is completely compatible with the ANSI standard version.

Layers associated with different LAN protocols

5

Ethernet : it’s Origin.. 







6

In the late 1960s, the University of Hawaii developed a WAN called ALOHA. In 1972, Robert Metcalfe and David Boggs invented a cabling and signaling scheme at the Xerox Palo Alto Research Center (PARC) and in 1975 introduced the first Ethernet product s a system of 2.94 megabits per second (Mbps) to connect over 100 computers on a 1-kilometer (.62 miles) cable. In the 1980s the IEEE published Project 802. This project generated standards for design and compatibility for hardware components that operated within the OSI physical and data-link layers. The standard that pertains to Ethernet is the IEEE 802.3 specification.

Ethernet Features  

  



7

Best effort delivery-analogy with postal system. Comparison with Token-Ring~ Broadcasting-Token, Collision, analogy with autocracy & democracy. Ethernet is ‘democratic’ !! Baseband architecture. Bus topology, usually transmits at 10 Mbps. Relies on CSMA/CD to regulate traffic on the main cable segment. This will not fail unless the media is physically cut or improperly terminated.

Ethernet Summary        

8

Traditional topology: Linear bus Other topologies: Star bus Logical topology: Broadcast Type of architecture: Baseband Access method: CSMA/CD Specification: IEEE 802.3 Transfer speed: 10 Mbps or 100 Mbps Cable type: Thicknet, thinnet, UTP

Ethernet Specifications (IEEE 802.3) 10BaseT Topology:

Star bus Cable type: Category 3, 4, or 5 unshielded twisted-pair cable Connection to NIC: RJ-45 Maximum cable segment length:100 meters (328 feet) Maximum connected segments: 100 meters (328 feet)

9

Comparison of Frame Format:

10

Frame fields  

 

11

preamble - The alternating pattern of 1's and 0's tells receiving stations that a frame is Ethernet or IEEE 802.3. destination and source addresses -The source address is always a unicast (single-node) address. The destination address can be unicast, multicast (group), or broadcast (all nodes). type (Ethernet) - The type specifies the upper-layer protocol to receive the data after Ethernet processing is completed. length (IEEE 802.3) - The length indicates the number of bytes of data that follows this field.

Frame fields…. 





12

data (Ethernet) - After physical-layer and link-layer processing is complete, the data contained in the frame is sent to an upperlayer protocol, which is identified in the type field. Although Ethernet version 2 does not specify any padding, in contrast to IEEE 802.3, Ethernet expects at least 46 bytes of data. data (IEEE 802.3) - After physical-layer and link-layer processing is complete, the data is sent to an upper-layer protocol, which must be defined within the data portion of the frame. If data in the frame is insufficient to fill the frame to its minimum 64-byte size, padding bytes are inserted to ensure at least a 64-byte frame. frame check sequence (FCS) - This sequence contains a 4 byte CRC value that is created by the sending device and is recalculated by the receiving device to check for damaged frames.

13

Layer-1(Physical) Devices:

14

HUB

15

…HUB



 

16

The purpose of a hub is to regenerate and retime network signals. Multiport repeater. This is done at the bit level to a large number of hosts (e.g. 4, 8, or even 24) using a process known as concentration

…HUB  The

17

reasons for using hubs is to create a central connection point for the wiring media, and an increase in the reliability of the network.  The reliability of the network is increased by allowing any single cable to fail without disrupting the entire network.  This differs from the bus topology where having one cable fail will disrupt the entire network.

HUB- Layer 1 Device 

18

Hubs are considered Layer 1 devices because they only regenerate the signal and broadcast it out all of their ports (network connections).

Classification of Hub  



19

Active or Passive hubs Most modern hubs are active; they take energy from a power supply to regenerate network signals. Passive hubs do not regenerate bits, so they do not extend a cables length, they only allow two or more hosts to connect to the same cable segment.

… Classification of Hub  



20

Intelligent and Dumb hubs Intelligent hubs have console ports, which means they can be programmed to manage network traffic. Dumb hubs simply take an incoming networking signal and repeat it to every port without the ability to do any management.

Repeater 



21

The maximum length for UTP(CAT-5) cable in a network, is 100 meters (approximately 333 feet). If we need to extend our network beyond that limit, we must add a device called a repeater As signals travel along a cable, they degrade and become distorted in a process called “attenuation” .If a cable is long enough, attenuation will finally make a signal unrecognizable. Installing a repeater enables signals to travel farther.

How Repeaters Work A

repeater works at the physical layer of the OSI Reference Model to regenerate the network's signals and resend them out on other segments.

22

…Repeater  The

23

repeater takes a weak signal from one segment, regenerates it, and passes it to the next segment.  To pass data through the repeater from one segment to the next, the packets and the Logical Link Control (LLC) protocols must be identical on each segment.  A repeater will not enable communication, for example, between an 802.3 LAN (Ethernet) and an 802.5 LAN (Token Ring).

…Repeater  



24

Repeaters do not translate or filter signals. For a repeater to work, both segments that the repeater joins must use the same access method. The two most common access methods are carrier-sense multipleaccess with collision detection (CSMA/CD) and token passing. Repeaters can move packets from one kind of physical media to another, Ethernet packet coming from a thinnet coaxial-cable segment and pass it on to a fiber-optic segment.

Repeater Considerations  Repeaters

afford the least expensive way to expand a network.  No Isolation or Filtering  Repeaters will also pass a broadcast storm along from one segment to the next  network performance will be degraded.

25

Repeater~~ 

Use repeater – –



– –

26

use!! or not use!!

To extend broadcast domain. Connect two segments of similar or dissimilar media. Regenerate the signal to increase the distance transmitted. Pass all traffic in both directions. Connect two segments in the most cost-effective manner.



Don’t use - There is heavy network traffic. - Segments are using different access methods. - Data filtering is needed. - Collision domain consideration.

Packet Flowing: (To understand this should be reviewed)



27

Device: Hub (Layer-1) Repeater (Layer-1) Bridge (Layer-2) Switch (Layer-2) Router(Layer-3)







Hub transmits signal to all of its ports. Switch,Bridge take decision depending on Layer-2 address(MAC). Router takes decision depending on Layer-3 address(IP).

Related Documents

Lecture 04
November 2019 6
Lecture 04
June 2020 4
Lecture 04
December 2019 7
Lecture 04
May 2020 3
Lecture 04
November 2019 4
Lecture 04
May 2020 3