Local Area Network
(LAN)
Ethernet (IEEE 802.3)
The Ethernet LAN standard was
originally developed by DEC, Intel,
and Xerox, but has since become a
formalized standard by the Institute
of Electrical and Electronics
Engineers as IEEE 802.3.
Inventors of Ethernet
Robert Metcalfe (1946, US)
David R. Boggs (1950, US)
- Developed at Xerox PARC, 1973-1974
• Metcalfe identifies the day Ethernet: May 22,
1973, circulated a memo titled "Alto
Ethernet" containing a rough scheme.
• Boggs identifies another date as birth of
Ethernet: November 11, 1973, the first day
the system actually functioned.
• The two would co-invent Ethernet, with
Metcalfe generating the ideas and Boggs
figuring out how to build the system.
• Patented with the 2 & Thacker, Lampson (75)
• Metcalfe, Boggs, "Ethernet: Distributed
Packet Switching for Local Computer
Networks". Communications of the ACM
(1976)
Ethernet Topology
Ethernet Topology
• Ethernet uses a bus topology (a high speed
circuit and a limited distance between the
computers, such as within one building).
• From the outside, an ethernet LAN appears to be
a star, because all cables connect to the central
hub.
• Most ethernet LANs span sufficient distance to
require several hubs, but some ethernet LANs
are build without the use of hubs (coax bus).
Ethernet Media Access Control
• Ethernet use a contention-based MAC called
CSMA/CD.
• Every station must wait until the bus is free
and then transmit.
• If no collision, transmission is completed.
• If the collision is detected, send a jamming
signal.
• Wait a random amount of time, then re-
broadcast.
Ethernet Wiring
segment
Thick Ethernet wiring (Thicknet)
- the first generation
- use thick coax cable (1cmD)
- AUI cable connects NIC to transceiver
- digital signal in AUI
(Attachment Unit Interface)
- analog signal in coax
- 10Base5
10Mbps
max segment: 500m
computer spacing: 2.5m
Thin Ethernet wiring (Thinnet)
- the second generation
- use thin coax cable (0.5cmD)
- BNC connects to thin cable
- 10Base2
10Mbps
max segment: 185m
computer spacing: 0.5m
Ethernet Wiring, cont...
Hub Ethernet wiring
- the third generation, most popular
- use hub
a device with connections to computers
physically star topology, logically bus
same frame format, follow CSMA/CD
→ “Ethernet-in-a-box”
- 10Base-T Hub
10Mbps, twisted pair, RJ-45 connector
max wire length: 100m
number of computers: port number
- 100Base-Tx/T4
100Mbps, twisted pair
max wire length: 100m
- 1000Base-T/CX
1000Mbps, twisted pair
max wire length: 25m
- 1000Base-SX/LX
1000Mbps, optical fiber
max fiber length: 550m
Comparison of Wiring Schemes
Thicknet
Thinnet
Hub Ethernet
-Hybrid Wiring in practical-
Ethernet Components
•First Generation :
• Thick Ethernet Cable.
• N Connector.
• Transceiver.
• Terminator.
• AUI Cable.
• NIC with AUI.
Ethernet Components
•Second Generation :
• RG-58 Cable.
• BNC Connector.
• BNC Tap.
• BNC Terminator.
• NIC with BNC.
Ethernet Components
•Third Generation :
• Twisted Pair Cable.
• RJ-45 Connector.
• Switch/Hub.
• NIC with RJ-45.
Twisted Pair Cables
•Cat1 :
• Used for standard telephone wiring.
• 1 MHz frequency.
• Unshielded.
•Cat2 :
• Used for 1st gen token ring networks (4
Mbps).
• 10 MHz frequency.
• Shielded & Unshielded.
• Maximum cable length is 22.5 meters.
Twisted Pair Cables
• Cat3 :
• Used for 10Base-T (10 Mbps).
• 16 MHz frequency.
• Shielded & Unshielded.
• Maximum cable length is 100 meters.
• Cat4 :
• Used for 2nd gen token ring networks (16
Mbps).
• 20 MHz frequency.
• Shielded & Unshielded.
• Maximum cable length is 100 meters.
Twisted Pair Cables
•Cat5 :
• Used for 100Base-T (100 Mbps).
• 100 MHz frequency.
• Shielded & Unshielded.
• Maximum cable length is 100 meters.
•Cat5e :
• Used for 1000Base-T (1000 Mbps).
• 100 MHz frequency.
• Shielded & Unshielded.
• Maximum cable length is 100 meters.
Twisted Pair Cables
•Cat6 :
• Used for 1000Base-T (1000 Mbps).
• 250 MHz frequency.
• Shielded & Unshielded.
• Maximum cable length is 100 meters.
•Cat6A :
• Used for 10GBase-T (10 Gbps).
• 500 MHz frequency.
• Shielded & Unshielded.
• Maximum cable length is 50 meters.
Twisted Pair Cables
•Cat7 :
• Used for 10GBase-T (10 Gbps).
• 600 MHz frequency.
• Shielded only.
• Maximum cable length is 100 meters.
•Cat7A :
• Used for 25GBase-T (25 Gbps).
• 1000 MHz frequency.
• Shielded only.
• Maximum cable length is 100 meters.
Twisted Pair Cables
•Cat8 :
• Used for 40GBase-T (40 Gbps).
• 2000 MHz frequency.
• Shielded only.
• Maximum cable length is 30 meters.
Ethernet Frame Format
Preamble: 64bits (8 bytes) for receiver synchronization with
incoming signal
Destination address and source address
Frame type (2 bytes):
- 0000~05DC Reserved for use with IEEE LLC/SNAP
- 0800 Internet IP Version 4
- 8008 AT&T Corporation
- 8014 Silicon Graphics Corporation network games
- 8137-8138 Novell Corporation IPX
-…
Data or Payload: Minimum 46 bytes and maximum 1500 bytes
CRC (4 bytes): Cyclic redundancy check
Token Ring (IEEE 802.5)
Token Ring was originally developed by
IBM, and have since been standardized by
IEEE as IEEE 802.5.
Token Ring Topology
Token Ring Media Access Control
• Token ring uses a controlled-access technique called
token passing.
• The “token” is a series of bits, travels between the
computers in a predetermined sequence.
• A computer with a message waits to transmit until it
receives a free token. The computer changes the
free token to a busy token and attaches its message
to it. Then it retransmits it on the circuit to the next
computer in the sequence.
• The computer receiving the message, changes the
acknowledgement to ACK (or NAK) and sends the
message back to the sender, who creates a new free
token.
Token Ring Media Access Control
Token Ring Media Access Control
Token Ring Media Access Control
Token loss:
• The token crashes before being transmitted - lost a free
token.
• A computer in the ring crashes - lost a busy token.
• A token is always busy.
A solution for the “lost” token problem:
• Designate one computer to be the token monitor and
another computer to be a backup token monitor.
• If no token circulated through the network for a certain
length of time or if a busy token circulates too often, the
token monitor will create a new free token (and destroy
the busy token if necessary.).
FDDI - Ring Topology
SD FC ED Token frame (3 bytes)
Data frame
SD FC DAdd SAdd Payload CRC ED FS
Up to 4550 bytes
Features: multiple frames for MM data or RT trans.
• Fiber Distributed Data Interconnect (FDDI) using fiber optics cable and Copper
Distributed Data Interconnect (CDDI) using copper cable.
• Topology : Two rings.
• Transmit : Bits can flow in 2 directions for improving reliability.
• Speed : 100 Mbps.
• Status : ANSI standard, expensive than Ethernet and Token Ring.
• Token : A permission to send data across the ring :
Only one token in a ring and the token rotates one by one.
If no data to be sent, computer passes received token to the next.
When a computer obtains the token, it can send a single packet.
A packet travels around entire ring and finally arrives source.
ATM LAN - Star Topology
• ATM : Asynchronous Transmission Mode.
• Media : Fiber.
• Topology : Star.
• Transmit : More than one can transmit because of using switch.
• Speed : 25, 45, 155, 622 Mbps.
• Status : ATM Forum and ATM Consortium, high speed for multimedia com.
• Switch : Each station connects to switch with full-duplex connections. :
Computers send data independently and simultaneously.
Packet size is very small, 53 bytes, called cell.
Very expensive
Wireless LANs
•Use wireless transmission media.
• Infrared (IR): limited to indoors and
single room.
(IR is light -- doesn’t penetrate walls).
• Radio :
• Narrowband microwave.
• Spread Spectrum LANs.
Wireless LANs
(a) Wireless networking with a base station.
(b) Ad hoc networking.
Wireless LANs
• The range of a single radio may not
cover the entire system.
Wireless LANs
•A multicell 802.11 network.
Wireless LAN Applications
• Nomadic access (e.g., users roaming
around campus).
• LAN interconnection (e.g., across
buildings).
• Ad Hoc Networks (e.g., disaster relief
crew).
• Sensor Networks
MAC in Wireless LANs
• Standardized by IEEE as IEEE 802.11.
• Distributed access control mechanism
(DCF) based on CSMA with optional
centralized control (PCF).
Contention-free
Service (polling)
MAC PCF Contention
layer Service
DCF
(CSMA)
Physical Layer
MAC in Wireless LANs
• Distributed coordination function (DCF) uses
CSMA-based protocol (e.g., ad hoc networks).
• CD does not make sense in wireless.
It is hard for transmitter to distinguish its own
transmission from incoming weak signals and noise.
• Point coordination function (PCF) uses polling to
grant stations their turn to transmit (e.g., cellular
networks).
MAC in Wireless LANs
• Distributed coordination function (DCF) uses
CSMA-based protocol (e.g., ad hoc networks).
• CD does not make sense in wireless.
It is hard for transmitter to distinguish its own
transmission from incoming weak signals and noise.
• Point coordination function (PCF) uses polling to
grant stations their turn to transmit (e.g., cellular
networks).
The 802.11 Protocol Stack
•Part of the 802.11 protocol stack.
The 802.11 MAC Sublayer Protocol
(a) The hidden station problem.
(b) The exposed station problem.
The 802.11 MAC Sublayer Protocol (2)
•The use of virtual channel sensing
using CSMA/CA.
The 802.11 MAC Sublayer Protocol (3)
•A fragment burst.
The 802.11 MAC Sublayer Protocol (4)
•Interframe spacing in 802.11.
The 802.11 Frame Structure
•The 802.11 data frame.
The 802.11 Services
• Distribution Services :
• Association.
• Disassociation.
• Reassociation.
• Distribution.
• Integration.
• Intracell Services
• Authentication.
• Deauthentication.
• Privacy.
• Data Delivery.
The 802.16 Protocol Stack
•The 802.16 Protocol Stack.
The 802.16 Physical Layer
•The 802.16 transmission
environment.
The 802.16 Physical Layer (2)
•Frames and time slots for time
division duplexing.
The 802.16 MAC Sublayer Protocol
•Service Classes
•Constant bit rate service
•Real-time variable bit rate service
•Non-real-time variable bit rate
service
•Best efforts service
The 802.16 Frame Structure
(a) A generic frame.
(b) A bandwidth request frame.
Bluetooth
•Bluetooth Architecture
•Bluetooth Applications
•The Bluetooth Protocol Stack
•The Bluetooth Radio Layer
•The Bluetooth Baseband Layer
•The Bluetooth L2CAP Layer
•The Bluetooth Frame Structure
Bluetooth Architecture
•Two piconets can be connected to
form a scatternet.
Bluetooth Applications
•The Bluetooth profiles.
The Bluetooth Protocol Stack
•The 802.15 version of the
Bluetooth protocol architecture.
The Bluetooth Frame Structure
•A typical Bluetooth data frame.