Lan Wan
Lan Wan
Five
Local and Wide Area
Networks
Topics to be discussed
5.1 .LAN topologies (bus, ring, star)
5.2. LAN technologies (Ethernet, token Ring,
Gigabit Ethernet)
5.3 .Large networks and wide areas
Chapter Objectives
To briefly discuss the technology of dominant
wired LANs, Ethernet, including traditional,
fast, gigabit, and ten-gigabit Ethernet.
To identify topologies of LAN technologies
such as bus star and ring
To differentiate LAN technologies like
Ethernet, token Ring, Gigabit Ethernet
To understand WANS and their technologies
Local and wide area networks
A local area network (LAN) is a computer network that is
designed for a limited geographic area such as a
building or a campus.
Although a LAN can be used as an isolated network to
connect computers in an organization for the sole
purpose of sharing resources, most LANs today are also
linked to a wide area network (WAN) or the Internet.
A LAN can range from simple (two computers connected
by a cable) to complex (hundreds of connected
computers and peripherals throughout a major
corporation).
The LAN market has seen several technologies such as
Ethernet, token ring, token bus, FDDI, and ATM LAN.
Some of these technologies survived for a while, but
Ethernet is by far the dominant technology.
LAN topologies (bus, ring,
star)
The term topology, or more specifically, network
topology, refers to the arrangement or physical
layout of computers, cables, and other
components on the network. "Topology" is the
standard term that most network professionals
use when they refer to the network's basic
design.
Four basic topologies that are used to construct
LANs;
Bus Topology
A network that uses a bus topology usually consists of a
single cable to which computers attached. Any
computer attached to a bus can send a signal down the
cable, and all computers receive the signal.
Because all computers attached directly to the cable,
any computer can send data to any other computer.
Of course, the computers attached to a bus network
must coordinate to ensure that only one computer
sends a signal at any time
Computers on a bus topology network communicate by
addressing data to a particular computer and sending
out that data on the cable as electronic signals.
To understand how computers communicate on a
bus, you need to be familiar with three concepts:
Sending the signal
Signal bounce
Terminator
Access Methods
The set of rules that defines how a computer puts
data onto the network cable and takes data from the
cable is called an access method.
Once data is moving on the network, access methods
help to regulate the flow of network traffic.
Access methods need to be consistent in the way they
handle data. If different computers were to use
different access methods, the network would fail
because some methods would dominate the cable.
Access methods prevent computers from gaining
simultaneous access to the cable.
By making sure that only one computer at a
time can put data on the network cable, access
methods ensure that the sending and receiving
of network data is an orderly process.
Major Access Methods
The four methods designed to prevent
simultaneous use of the network media include:
Carrier-sense multiple access methods with
collision detection
Carrier-sense multiple access methods with
collision avoidance
Token-passing methods that allow only a single
opportunity to send data.
Demand-priority methods.
Carrier-Sense Multiple Access with Collision
Detection (CSMA/CD) Access Method
Using the method known as carrier-sense multiple
access with collision detection (CSMA/CD), each
computer on the network, including clients and
servers, checks the cable for network traffic.
Only when a computer "senses" that the cable is
free and that there is no traffic on the cable can it
send data.
Once the computer has transmitted data on the
cable, no other computer can transmit data until
the original data has reached its destination and
the cable is free again.
Remember, if two or more computers happen to
send data at exactly the same time, there will be a
data collision.
When that happens, the two computers involved
stop transmitting for a random period of time and
Each computer determines its own waiting
period; this reduces the chance that the
computers will once again transmit
simultaneously.
With these points in mind, the name of the access
method—carrier-sense multiple access with
collision detection (CSMA/CD)—makes sense.
Computers listen to or "sense" the cable (carrier-
sense). Commonly, many computers on the
network attempt to transmit data (multiple
access); each one first listens to detect any
possible collisions.
If a computer detects a possible collision, it waits
for a random period of time before retransmitting
(collision detection).
Carrier-Sense Multiple Access with Collision
Avoidance (CSMA/CA) Access
Carrier-sense multiple access with collision
avoidance (CSMA/CA) is the least popular of the
major access methods.
In CSMA/CA, each computer signals its intent to
transmit before it actually transmits data.
In this way, computers sense when a collision
might occur; this allows them to avoid
transmission collisions.
Unfortunately, broadcasting the intent to transmit
data increases the amount of traffic on the cable
and slows down network performance
Token-Passing Access Method
In the access method known as token passing, a
special type of packet, called a token, circulates
around a cable ring from computer to computer.
When any computer on the ring needs to send
data across the network, it must wait for a free
token.
When a free token is detected, the computer will
take control of it if the computer has data to
send.
The computer can then transmit data. Data is
transmitted in frames, and additional information,
such as addressing, is attached to the frame in
the form of headers and trailers.
Ethernet
Fast Ethernet
Gigabit Ethernet
10 Gig Ethernet
Ethernet:- a system for connecting a number of computer
systems to form a local area network, with protocols to control the
passing of information and to avoid simultaneous transmission by two
or more systems.
is the network technology invented to connect network device
together.
It was developed by Robert Metcalfe at Xerox Company in 1976
Eventually became an IEEE standard (IEEE 802.3)
Has been modified for wireless applications (IEEE 802.11)
And for higher speeds (IEEE 802.3ae for 10 Gigabit Ethernet)
Ethernet is based on the Datagram and functions at the physical and
data link layer
Ethernet Datagram Structure
6 bytes 46 to 1500
8 bytes Source bytes
Preamble Address Data
4 bytes
6 bytes 2 bytes Frame
Destination Type Field Check
Address Sequence
Ethernet Datagram Structure
Preamble: Repeating Flag that ID’s the sequence
as an Ethernet datagram
Destination Address: Unique identifier found
nowhere else but on the Network Interface Card to
whom the datagram is being sent
Source Address: Who originated the datagram
Type Field: Tells the recipient what kind of
datagram is being received (IP, UDP, etc)
Data: What it is that you are trying to send (text,
JEPG, MP3, etc)
Frame Check Sequence: Detects and corrects
errors
Frame Format
The packet sent in an Ethernet LAN is called a frame.
The Ethernet frame contains seven fields: preamble, SFD,
DA, SA, length or type of data unit, upper-layer data, and
the CRC.
Ethernet does not provide any mechanism for acknowledging
received frames, making it what is known as an unreliable
medium.
Acknowledgments must be implemented at the higher layers.
Preamble. The first field of the 802.3 frame contains 7 bytes (56 bits) of
alternating 0s and 1s that alerts the receiving system to the coming frame
and enables it to synchronize its input timing.
The pattern provides only an alert and a timing pulse.
The preamble is actually added at the physical layer and is not
(formally)part of the frame.
Start frame delimiter (SFD).
The second field (1 byte: 10101011) signals the beginning of the
frame.
The SFD warns the station or stations that this is the last chance for
synchronization.
The last 2 bits are 11 and alert the receiver that the next field is the
destination address.
The SFD is also added at the physical layer.
Destination address (DA).
The DA field is 6 bytes and contains the physical address of the destination
station or stations to receive the packet.
Source address (SA).
The SA field is also 6 bytes and contains the physical address of the sender of
the packet.
Length or type.
This field is defined as a type field or length field.
The original Ethernet used this field as the type field to define the upper-layer
protocol using the MAC frame.
The IEEE standard used it as the length field to define the number of
bytes in the data field. Both uses are common today (IP, UDP, etc).
Data. This field carries data encapsulated from the upper-layer protocols.
It is a minimum of 46 and a maximum of 1500 bytes.
What is it that you are trying to send (text, JEPG, MP3, etc)
CRC. The last field contains error detection information, in
this case a CRC-32bit.
Ethernet Tidbits
If a message has less than 46 bytes of data,
“padding” is added
Ethernet is often referred to as 100 Base T
First digit is the speed of the system in Mbps
Base refers to a cable or wire system
T refers to the system is UTP: Unshielded Twisted Pair
10 Base 5 stands for 10 Mbps on a cable that can go
500 m (multiply the last number by 100 meters)
10 Base 2 stands for 10 Mbps for 2 hundred meters
10 Base 5 and 10 Base 2 identifies Ethernet LANs
using thick net and thin net coax cables, respectively
Standard Ethernet
10 Base 5 (Thicknet) (Bus Topology)
10 Base 2 (Thinnet) (Bus Topology)
10 Base T (UTP) (Star/Tree Topology)
10 Base FL (Fiber) (Star/Tree Topology)
Ethernet
Physical Media :-
10 Base5 - Thick Co-axial Cable with Bus Topology
10 Base2 - Thin Co-axial Cable with Bus Topology
10 BaseT - UTP Cat 3/5 with Tree Topology
10 BaseFL - Multimode/Singlemode Fiber with Tree
Topology
Maximum Segment Length
10 Base5 - 500 m with at most 4 repeaters (Use Bridge to extend
the network)
10 Base2 - 185 m with at most 4 repeaters (Use Bridge to extend
the network)
10 BaseT - 100 m with at most 4 hubs (Use Switch to extend the
network)
Fast Ethernet
100 Mbps bandwidth
Uses same CSMA/CD media access protocol and
packet format as in Ethernet.
100BaseTX (UTP) and 100BaseFX (Fiber) standards
Physical media :-
100 BaseTX - UTP Cat 5e
100 BaseFX - Multimode / Singlemode Fiber
Full Duplex/Half Duplex operations.
Fast Ethernet
Provision for Auto-Negotiation of media speed:
10 Mbps or 100Mbps (popularly available for copper media
only).
Maximum Segment Length
100 Base TX - 100 m
100 Base FX - 2 Km (Multimode Fiber)
100 Base FX - 20 km (Singlemode Fiber)
Gigabit Ethernet
1 Gbps bandwidth.
Uses same CSMA/CD media access protocol as in
Ethernet and is backward compatible (10/100/100
modules are available).
1000BaseT (UTP), 1000BaseSX (Multimode Fiber) and
1000BaseLX (Multimode/Singlemode Fiber) standards.
Maximum Segment Length
1000 Base T - 100m (Cat 5e/6)
1000 Base SX - 275 m (Multimode Fiber)
1000 Base LX - 512 m (Multimode Fiber)
1000 Base LX - 20 Km (Singlemode Fiber)
1000 Base LH - 80 Km (Singlemode Fiber)
10 Gig Ethernet
10 Gbps bandwidth.
Uses same CSMA/CD media access protocol as in
Ethernet.
Maximum Segment Length
10GBase-T - Not available
10GBase-LR - 10 Km (Singlemode Fiber)
10GBase-ER - 40 Km (Singlemode Fiber)
Token Rings
A token ring network consists of a set of nodes connected in a
ring
Data always flows in a particular direction around the ring,
with each node receiving frames from its upstream neighbor
and then forwarding them to its downstream neighbor.
the ring is viewed as a single shared medium; it does not
behave as a collection of independent point-to-point links that
just happen to be configured in a loop.
token, which is sequence of bits, circulates around the ring;
each node receives and then forwards the token.
When a node that has a frame to transmit sees the token, it
takes the token off the ring (i.e., it does not forward the special
bit pattern) and instead inserts its frame into the ring.
Wide Area networks
WAN is a network that connects two or more
geographically distinct LANs.
WAN technologies generally function at the
lower three layers of the OSI reference model:
the physical layer, the data link layer, and the
network layer.
Similarities to LANs
Interconnect computers.
Use some form of media for the
interconnection.
Support network applications.
Differences to LANs
Include both data networks, such as the
Internet, and voice networks, like telephone
systems.
Interconnect more workstations, so that any
A node is a device that allows one or more
stations to access the physical network and is a
transfer point for passing information through a
network. A node is often a computer, a router, or a
telephone switch.
Types of WAN Network
A switched network consists of a series of
interlinked nodes, called switches. Switches are
devices capable of creating temporary
connections between two or more devices linked
to the switch. In a switched network, some of
these nodes are connected to the end systems
(computers or telephones, for example). Others
are used only for routing.
A network categorized by the way it transfers
information from one node to another as
Circuit switched network
1. Circuit switched network - a network in
which a dedicated circuit is established
between sender and receiver and all data
passes over this circuit. The connection is
dedicated until one party or another
terminates the connection. The telephone
system is a common example.
2. Packet switched network - a network in
which all data messages are transmitted
using fixed-sized packages, called packets
(datagram and virtual-switched network).
Packet-switched networks can further be
divided into two subcategories-virtual-
circuit networks and datagram
networks
A virtual-circuit network is a cross between
a circuit-switched network and a datagram
network. It has some characteristics of both.
WAN Hardware Devices