1 / 59

Enterprise network

Enterprise network. 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE802.3 8.4:Token ring 8.5:Bridges 8.6:FDDI 8.7:High-speed LANs 8.8:LAN protocol 8.9:Multicast LAN interconnect technologies. 8.1:Introduction. PSTN ISDN PBX (private branch exchange). 8.2:LANs.

aolani
Télécharger la présentation

Enterprise network

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Enterprise network • 8.1:Introduction • 8.2:LANs • 8.3:Ethernet / IEEE802.3 • 8.4:Token ring • 8.5:Bridges • 8.6:FDDI • 8.7:High-speed LANs • 8.8:LAN protocol • 8.9:Multicast LAN interconnect technologies

  2. 8.1:Introduction • PSTN • ISDN • PBX (private branch exchange)

  3. 8.2:LANs • LANs are used to interconnect distributed communities of end systems • To ensure the transmission bandwidth is shared fairly between all of the attached stations, a number of different medium access control (MAC) methods are used. These include (CSMA/CD) and Token ring

  4. 8.3:Ethernet / IEEE802.3 • Ethernet networks – and the more recent derivative IEEE802.3 – are used extensively in technical and office environment • CSMA/CD • All the stations are attached directly to the same cable/bus ,it is said to operate in a multiple access mode • The bus operates in the broadcast mode which means that every frames transmitted is received by all the other stations that are attached to the bus • Because of the broadcast mode ,this will result in the contents of the two frames being corrupted and a collision is said to have occurred

  5. CSMA/CD Protocol • Carrier Sense before transmission • Carrier Sense while transmission • Collision: Two or more stations transmitting simultaneously • Backoff: Random delay after collision • Deference: Defers transmission if channel is sensed busy • Collision Window (Slot time): Round-trip propagation delay time plus some carrier sense time. In IEEE 802.3, this value is defined to be 51.2 us.

  6. CSMA/CD Collision Handling • Collision Signal is generated by Physical layer. • Jam signal (collision enforcement): To make sure that all stations involved in the collision will detect collision. A pattern of 32 bits. • Collision backoff and retransmission method (Truncated Binary Exponential Backoff Algorithm, BEBA): • n : number of collisions experienced (n <= 16) • k : Min (n,10) -- Truncation • r : Random delay time (unit: slot time) between 0 <= r < 2k

  7. CSMA/CD worse-case collision detection

  8. Hub configuration principles

  9. IEEE 802.3 Frame Format

  10. 8.4:Token ring • All the stations are connected together by a set of unidirectional links in the form of a ring and all frame transmissions between any of the stations take place over it by circulating the frame around the ring • Only one frame transfer can be in progress over the ring at a time • Fig 8.5

  11. Token ring network operation

  12. Token ring wiring configuration

  13. Token ring Frame Format

  14. 8.5:Bridges • There are two types of bridges , the one are used with Ethernet LANs, knows as transparent bridges , and the others with token ring LANs, known as source routing bridges.

  15. Bridge vs Repeater

  16. 8.5.1:Transparent bridges • With a transparent bridge, as with a repeater,the presence of one (or more) bridges in a route between two communicating stations is transparent to the two stations . All routing decisions are made exclusively by the bridge(s) • Fig 8.12 • A bridge maintains a forwarding database • Bridge learning • Forwarding database to be created in advanced

  17. Transparent bridges(cont.)

  18. 8.5.2:Source routing bridges • The major difference between a LAN base on source routing bridges and one base on spanning tree bridges is that with the latter the bridges collectively perform the routing operation in a way that is transparent to the end stations. Conversely, with source routing , the end stations perform the routing function. • Fig 8.15

  19. Token ring Frame Format

  20. Example

  21. 8.6:FDDI • FDDI is an optical fiber-based ring network that supports a bit rate of 100 Mbps . It can used for the interconnection of segments spread over a wider geographical area than a single building, such as a university campus or manufacturing plant. • Fig 8.18 • Use two counter-rotating rings to enhance reliability:primary ring and secondary ring • Two type of station: DAS and SAS • Fig 8.19

  22. Physical interface

  23. FDDI Frame Format

  24. 8.7:High-speed LANs • 8.7.1:Fast Ethernet • 8.7.2:Switched Fast Ethernet • 8.7.3:Gigabit Ethernet

  25. 8.7.1:Fast Ethernet • Fast Ethernet was to use the same shared, half-duplex transmission mode as Ethernet but to obtain a*10 increase in operational bit rate over 10BaseT while at the same time retaining the same wiring systems , MAC method , and frame format. • The major technological hurdle to overcome with Fast Ethernet was how to achieve a bit rate of 100Mbps over 100m of UTP cable. • Fig 8.26

  26. Collision detection • Fig 8.28 • Detect a collision by detecting a signal on pair 2 while it is transmitting and , the hub detects a collision by the presence of a signal on pair 1

  27. 8.7.2:Switched Fast Ethernet • In order to allow multiple access/transfers to be in progress concurrently, two developments have been made: • Switch hub architecture • Duplex working over the circuits that connect the stations to the hub. • Fig 8.29

  28. 8.8:LAN protocol

  29. 8.8.1:Physical layer

  30. 8.8.2:MAC sublayer

  31. 8.8.3:LLC sublayer

More Related