SlideShare une entreprise Scribd logo
1  sur  27
Unit 2: Underlying Technologies
      •   Transmission media (Section 3.1. Read on your own)
      •   Local Area Networks (LANs)
           – Ethernet (CSMA/CD - Carrier Sense Multiple Access/Collision Detection ,
             IEEE 802.3)
           – Token Ring (IEEE 802.5)
      •   Switching
           – Circuit switching
           – Packet switching
                • Datagram approach
                • Virtual circuit approach
      •   Wide Area Networks (WANs)
           –   PPP (Point-to-Point Protocol)
           –   X.25
           –   Frame Relay
           –   ATM (Asynchronous Transfer Mode)- cell relay
      •   Interconnecting devices – repeaters, bridges, routers and gateways
      •   Shared media v.s. switched LAN architecture

TDC 463-98-501/502, Summer II 2002                                                 2-1
IEEE 802 LAN Layers




TDC 463-98-501/502, Summer II 2002                         2-2
Ethernet LANs

     Features
     1) Widest Industry Use and Acceptance
               a)   Product Availability
               b)   Many Vendors
               c)   Low Cost
               d)   High Knowledge Base


     2) Standardized for Multiple Media Types
               a)   Twisted Pair (10Base-T)
               b)   Optical Fiber (10Base-F, FOIRL)
               c)   Coaxial Cable (10Base2, 10Base5)
               d)   Also high-speed Ethernets




TDC 463-98-501/502, Summer II 2002                     2-3
Ethernet Problems
1) Coaxial Cable Networks Hard to Troubleshoot
    a)   Faulty connections and electrical failures hard to find
    b)   Improper grounding can cause stray voltages
    c)   Static electricity
    d)   Non-standard hardware
    e)   Problems are often intermittent


2) Ethernet Lacks Built-In Network Monitoring

3) Ethernet Lacks Any Priority Mechanism

4) Station Transmission Time May Grow Large under High Loads




TDC 463-98-501/502, Summer II 2002                                 2-4
Carrier Sense Multiple Access with Collision Detection (CSMA/CD)

The basic idea:
When a station has a frame to transmit:
1) Listen for Data Transmission on Cable (Carrier Sense)
2) When Medium is Quiet (no other station transmitting):
    a) Transmit Frame, Listening for Collision
    b) If collision is heard, stop transmitting, wait random time, and transmit again.




   Frame format




                                        This portion must be at least 64 bytes
                                        for the Ethernet to work correctly
TDC 463-98-501/502, Summer II 2002                                                       2-5
Figure 3-9




TDC 463-98-501/502, Summer II 2002   2-6
Figure 3-11




TDC 463-98-501/502, Summer II 2002   2-7
Figure 3-12




TDC 463-98-501/502, Summer II 2002   2-8
Figure 3-13




TDC 463-98-501/502, Summer II 2002   2-9
Token Ring Features
1) Predictable Performance
     a) Unlike Ethernet, there is a fixed limit on how long a station must wait to
        transmit frame.
     b) Eight data priority levels ensure that important data get sent first.


2)   Ring-of -Stars Topology
     a) Star layout is well understood.
     b) Ring is easily expanded by adding additional Multistation Access Units
        (MAUs)
     c) Only point-to-point data connections used.


3)   Self-Monitoring and Reconfiguration Capabilities
     a) Active Monitor station recovers from any token operation problems.
     b) If any station goes down it will be detected and removed from the ring.
     c) Any single cable can be cut or disconnected and network will reconfigure and
        continue operation.


TDC 463-98-501/502, Summer II 2002                                                     2-10
Token Ring Features (continued.)

    4)   IBM Support
         a) IBM SNA data and LAN data can travel together on same token ring.
         b) Token Ring is an integral part of IBM future networking.


 Disadvantages of Token Ring
    1)   Higher price for NICs
    2)   Limited support for non-IBM products.
         a) Fewer products available for Token Ring than Ethernet
         b) Ethernet is still at the heart of some vendors’ future network plans.

Note: For this course, you do not need to know the details of Token Ring frame format




TDC 463-98-501/502, Summer II 2002                                                      2-11
Figure 3-14 Token Ring Operation




TDC 463-98-501/502, Summer II 2002   2-12
Figure 3-19 Circuit Switching

        • Dedicated physical connections
        • Source and destination operate at the same speed
        • Data arrive in sequence




TDC 463-98-501/502, Summer II 2002                           2-13
Packet Switching
  • Store-and-forward
  • Source and destination may operate at different rates
Figure 3-20 Packet Switching- Datagram approach




TDC 463-98-501/502, Summer II 2002                          2-14
Packet Switching- Datagram approach



   •Connectionless
        •No connection setup necessary before sending data
        •Each packet sent independently

        •Each packet may take different path to destination

   •Each packet contains complete destination address
   •Packets may arrive out-of-order (transport layer must do
   reordering)
   •Network load is completely unpredictable
   •Protocol Examples: IP, Novell IPX, AppleTalk



TDC 463-98-501/502, Summer II 2002                             2-15
Figure 3-21 Packet switching – Virtual circuit approach




TDC 463-98-501/502, Summer II 2002                        2-16
Packet switching – Virtual circuit approach


•Connection-oriented
     •Sender sends a Setup Request packet to establish a virtual circuit before sending
     data
     •Setup Request passes through all router/switches on path from source to
     destination
           •Path is assigned a Virtual Circuit Identifier (VCID)
           •Each router/switch stores information about each VC
           •Any router/switch or destination may deny the setup request (like a busy signal).
     •When finished, Sender sends Clear Request to tear down VC.
•Each data packet contains VCID, not full source and destination
addresses
•All packets follow same path and arrive in order
•Network load can be controlled through admissions control (denying
setup requests if busy)
•Protocol Examples: X.25, Frame Relay, ATM
TDC 463-98-501/502, Summer II 2002                                                         2-17
WAN


     PPP
     • commonly used for dial-up access to the internet (connect through
     a phone line to the access router)
     • can also be used in a point-to-point link between two devices such
     as routers

                    Figure 3-22 Point-to-point protocol (PPP) frame




TDC 463-98-501/502, Summer II 2002                                    2-18
Figure 3-23 X.25 (Connection-oriented)




   X.25 - An interface protocol to
   access the network




                               Not defined by X.25




TDC 463-98-501/502, Summer II 2002                   2-19
Figure 3-25




                                     Hop-by-hop error and flow
                                     control in X.25 is not necessary
                                     for newer more reliable
                                     networks.




TDC 463-98-501/502, Summer II 2002                            2-20
Figure 3-28 ATM cells (Small fixed-size data units)




TDC 463-98-501/502, Summer II 2002                    2-21
Figure 3-29




TDC 463-98-501/502, Summer II 2002   2-22
Internetworking Terms




TDC 463-98-501/502, Summer II 2002   2-23
TDC 463-98-501/502, Summer II 2002   2-24
TDC 463-98-501/502, Summer II 2002   2-25
Transparent Bridge




  DA: Destination Address
  SA: Source Address




TDC 463-98-501/502, Summer II 2002   2-26
Shared-Media vs.                                                  Shared Media Hub
                                                                                                              only one 10Mbps
                                             shared, single                                                    connection at a

   Switched LAN                              10Mbps LAN
                                               segment
                                                                                                                    time



   Architecture
                                                                                 10 Mbps




                                                       client workstations                  servers
                                                                   "10 Mbps for ALL"


                     Switch-Based LAN Architecture


                                         multiple dedicated                                                        Multiple,
                                          10Mbps LAN                   Switching Hub                         simultaneous 10Mbps
                                            segments          switching matrix                                   connections




                                                                                                     All connections at 10Mbps




                          shared media hub                                        shared media hub




                     Workgroup with shared servers with dedicated Workgroup with shared                             Workstations with
                         connection            connections            connection                                  dedicated connections
                                                                    "10 Mbps for EACH"

TDC 463-98-501/502, GOLDMAN: II 2002
                    Summer LAN                                                                                                            2-27

Contenu connexe

Tendances

Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relay
juliusbangaw
 
Chapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network DesignChapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network Design
nakomuri
 
3 deus leaflet wp3
3 deus leaflet wp33 deus leaflet wp3
3 deus leaflet wp3
imec.archive
 
Chapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network DesignChapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network Design
nakomuri
 
Metro ethernet-services
Metro ethernet-servicesMetro ethernet-services
Metro ethernet-services
c09271
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
Ameen Wayok
 

Tendances (20)

Sem 1 Ch 7
Sem 1 Ch 7Sem 1 Ch 7
Sem 1 Ch 7
 
Vpls
VplsVpls
Vpls
 
Chapter3 frame relay
Chapter3   frame relayChapter3   frame relay
Chapter3 frame relay
 
Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01Ccna day5-140715152501-phpapp01
Ccna day5-140715152501-phpapp01
 
Ccna(routing &and switching)
Ccna(routing &and switching)Ccna(routing &and switching)
Ccna(routing &and switching)
 
802 1ad
802 1ad802 1ad
802 1ad
 
Chapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network DesignChapter 3 1-network_design_with_internet_tools - Network Design
Chapter 3 1-network_design_with_internet_tools - Network Design
 
IIR VPN London
IIR VPN LondonIIR VPN London
IIR VPN London
 
3 deus leaflet wp3
3 deus leaflet wp33 deus leaflet wp3
3 deus leaflet wp3
 
Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01Ccna day3-140715152337-phpapp01
Ccna day3-140715152337-phpapp01
 
Real-World Networks
Real-World NetworksReal-World Networks
Real-World Networks
 
Chapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network DesignChapter 3 2-remote_network_design - Network Design
Chapter 3 2-remote_network_design - Network Design
 
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
Multi-Protocol Lambda Switching: The Role of IP Technologies in Controlling a...
 
Metro ethernet-services
Metro ethernet-servicesMetro ethernet-services
Metro ethernet-services
 
Ccna day5
Ccna day5Ccna day5
Ccna day5
 
Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01Ccna day4-140715152437-phpapp01
Ccna day4-140715152437-phpapp01
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches
IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable SwitchesIBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches
IBM Flex System Fabric EN4093 and EN4093R 10Gb Scalable Switches
 
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment OverviewCISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
CISCO Virtual Private LAN Service (VPLS) Technical Deployment Overview
 
Wireless lecture1
Wireless lecture1Wireless lecture1
Wireless lecture1
 

En vedette

Presentation
PresentationPresentation
Presentation
Mohd Arif
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platform
Mohd Arif
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardware
Mohd Arif
 
اخلاقيات استخدام الانترنت وحماية المستخدم
اخلاقيات استخدام الانترنت وحماية المستخدماخلاقيات استخدام الانترنت وحماية المستخدم
اخلاقيات استخدام الانترنت وحماية المستخدم
TORKIALSOLAMI
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peer
Mohd Arif
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systems
Mohd Arif
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
Mohd Arif
 
أخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلوماتأخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلومات
Prof. Othman Alsalloum
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
Mohd Arif
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdp
Mohd Arif
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgeting
Mohd Arif
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
Mohd Arif
 
Pointers in c
Pointers in cPointers in c
Pointers in c
Mohd Arif
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
Mohd Arif
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniques
Mohd Arif
 
Network Administrator
Network AdministratorNetwork Administrator
Network Administrator
guest371b1b4
 

En vedette (20)

Presentation
PresentationPresentation
Presentation
 
Iris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platformIris ngx next generation ip based switching platform
Iris ngx next generation ip based switching platform
 
Intro to comp. hardware
Intro to comp. hardwareIntro to comp. hardware
Intro to comp. hardware
 
اخلاقيات استخدام الانترنت وحماية المستخدم
اخلاقيات استخدام الانترنت وحماية المستخدماخلاقيات استخدام الانترنت وحماية المستخدم
اخلاقيات استخدام الانترنت وحماية المستخدم
 
Lists
ListsLists
Lists
 
Peer to-peer
Peer to-peerPeer to-peer
Peer to-peer
 
Overview of current communications systems
Overview of current communications systemsOverview of current communications systems
Overview of current communications systems
 
Ip security in i psec
Ip security in i psecIp security in i psec
Ip security in i psec
 
أخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلوماتأخلاقيات الأعمال وأمن نظم المعلومات
أخلاقيات الأعمال وأمن نظم المعلومات
 
Ip sec and ssl
Ip sec and  sslIp sec and  ssl
Ip sec and ssl
 
Overall 23 11_2007_hdp
Overall 23 11_2007_hdpOverall 23 11_2007_hdp
Overall 23 11_2007_hdp
 
Objectives of budgeting
Objectives of budgetingObjectives of budgeting
Objectives of budgeting
 
Network Management Fundamentals
Network Management FundamentalsNetwork Management Fundamentals
Network Management Fundamentals
 
Network Management
Network ManagementNetwork Management
Network Management
 
Arp and rarp
Arp and rarpArp and rarp
Arp and rarp
 
Loaders
LoadersLoaders
Loaders
 
Pointers in c
Pointers in cPointers in c
Pointers in c
 
Bootp and dhcp
Bootp and dhcpBootp and dhcp
Bootp and dhcp
 
Project evalaution techniques
Project evalaution techniquesProject evalaution techniques
Project evalaution techniques
 
Network Administrator
Network AdministratorNetwork Administrator
Network Administrator
 

Similaire à Networing basics

layeringanjanv1-090522005231-phpapp01.pdf
layeringanjanv1-090522005231-phpapp01.pdflayeringanjanv1-090522005231-phpapp01.pdf
layeringanjanv1-090522005231-phpapp01.pdf
ImXaib
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
Srikanth
 
Networking Technologies02.pptx
Networking Technologies02.pptxNetworking Technologies02.pptx
Networking Technologies02.pptx
ANISHTP
 
Webinar ethernet basics part a v1.3
Webinar ethernet basics part a v1.3Webinar ethernet basics part a v1.3
Webinar ethernet basics part a v1.3
wilbertl
 

Similaire à Networing basics (20)

NET7.PPT
NET7.PPTNET7.PPT
NET7.PPT
 
Basic networking 07-2012
Basic networking 07-2012Basic networking 07-2012
Basic networking 07-2012
 
Lan basic
Lan basicLan basic
Lan basic
 
ch5-network.ppt
ch5-network.pptch5-network.ppt
ch5-network.ppt
 
4 Structure Cabling System Design
4 Structure Cabling System Design4 Structure Cabling System Design
4 Structure Cabling System Design
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
Ccna 2 chapter 1 2014 v5
Ccna 2 chapter 1 2014 v5Ccna 2 chapter 1 2014 v5
Ccna 2 chapter 1 2014 v5
 
layeringanjanv1-090522005231-phpapp01.pdf
layeringanjanv1-090522005231-phpapp01.pdflayeringanjanv1-090522005231-phpapp01.pdf
layeringanjanv1-090522005231-phpapp01.pdf
 
PLNOG 6: Emil Kacperek - Virtual Cluster Switching
PLNOG 6: Emil Kacperek - Virtual Cluster Switching PLNOG 6: Emil Kacperek - Virtual Cluster Switching
PLNOG 6: Emil Kacperek - Virtual Cluster Switching
 
Presentation8
Presentation8Presentation8
Presentation8
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
CCNA DUMPS 640-802
CCNA DUMPS 640-802CCNA DUMPS 640-802
CCNA DUMPS 640-802
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Some important networking questions
Some important networking questionsSome important networking questions
Some important networking questions
 
Internet service
Internet serviceInternet service
Internet service
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Chapter3
Chapter3Chapter3
Chapter3
 
Networking Technologies02.pptx
Networking Technologies02.pptxNetworking Technologies02.pptx
Networking Technologies02.pptx
 
Webinar ethernet basics part a v1.3
Webinar ethernet basics part a v1.3Webinar ethernet basics part a v1.3
Webinar ethernet basics part a v1.3
 
Fast ethernet
Fast ethernetFast ethernet
Fast ethernet
 

Plus de Mohd Arif

User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
Mohd Arif
 
Project identification
Project identificationProject identification
Project identification
Mohd Arif
 
Network management
Network managementNetwork management
Network management
Mohd Arif
 
H.323 vs. cops interworking
H.323 vs. cops interworkingH.323 vs. cops interworking
H.323 vs. cops interworking
Mohd Arif
 
Google search tips advanced features
Google search tips advanced featuresGoogle search tips advanced features
Google search tips advanced features
Mohd Arif
 
Distributed databases and dbm ss
Distributed databases and dbm ssDistributed databases and dbm ss
Distributed databases and dbm ss
Mohd Arif
 
Dinive conquer algorithm
Dinive conquer algorithmDinive conquer algorithm
Dinive conquer algorithm
Mohd Arif
 
Dcom vs. corba
Dcom vs. corbaDcom vs. corba
Dcom vs. corba
Mohd Arif
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and security
Mohd Arif
 
Data structure
Data structureData structure
Data structure
Mohd Arif
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
Mohd Arif
 

Plus de Mohd Arif (15)

User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Project identification
Project identificationProject identification
Project identification
 
Network management
Network managementNetwork management
Network management
 
Heap sort
Heap sortHeap sort
Heap sort
 
H.323 vs. cops interworking
H.323 vs. cops interworkingH.323 vs. cops interworking
H.323 vs. cops interworking
 
H.323
H.323H.323
H.323
 
Graphs
GraphsGraphs
Graphs
 
Google search tips advanced features
Google search tips advanced featuresGoogle search tips advanced features
Google search tips advanced features
 
Google
GoogleGoogle
Google
 
Distributed databases and dbm ss
Distributed databases and dbm ssDistributed databases and dbm ss
Distributed databases and dbm ss
 
Dinive conquer algorithm
Dinive conquer algorithmDinive conquer algorithm
Dinive conquer algorithm
 
Dcom vs. corba
Dcom vs. corbaDcom vs. corba
Dcom vs. corba
 
Database administration and security
Database administration and securityDatabase administration and security
Database administration and security
 
Data structure
Data structureData structure
Data structure
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
 

Dernier

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Networing basics

  • 1. Unit 2: Underlying Technologies • Transmission media (Section 3.1. Read on your own) • Local Area Networks (LANs) – Ethernet (CSMA/CD - Carrier Sense Multiple Access/Collision Detection , IEEE 802.3) – Token Ring (IEEE 802.5) • Switching – Circuit switching – Packet switching • Datagram approach • Virtual circuit approach • Wide Area Networks (WANs) – PPP (Point-to-Point Protocol) – X.25 – Frame Relay – ATM (Asynchronous Transfer Mode)- cell relay • Interconnecting devices – repeaters, bridges, routers and gateways • Shared media v.s. switched LAN architecture TDC 463-98-501/502, Summer II 2002 2-1
  • 2. IEEE 802 LAN Layers TDC 463-98-501/502, Summer II 2002 2-2
  • 3. Ethernet LANs Features 1) Widest Industry Use and Acceptance a) Product Availability b) Many Vendors c) Low Cost d) High Knowledge Base 2) Standardized for Multiple Media Types a) Twisted Pair (10Base-T) b) Optical Fiber (10Base-F, FOIRL) c) Coaxial Cable (10Base2, 10Base5) d) Also high-speed Ethernets TDC 463-98-501/502, Summer II 2002 2-3
  • 4. Ethernet Problems 1) Coaxial Cable Networks Hard to Troubleshoot a) Faulty connections and electrical failures hard to find b) Improper grounding can cause stray voltages c) Static electricity d) Non-standard hardware e) Problems are often intermittent 2) Ethernet Lacks Built-In Network Monitoring 3) Ethernet Lacks Any Priority Mechanism 4) Station Transmission Time May Grow Large under High Loads TDC 463-98-501/502, Summer II 2002 2-4
  • 5. Carrier Sense Multiple Access with Collision Detection (CSMA/CD) The basic idea: When a station has a frame to transmit: 1) Listen for Data Transmission on Cable (Carrier Sense) 2) When Medium is Quiet (no other station transmitting): a) Transmit Frame, Listening for Collision b) If collision is heard, stop transmitting, wait random time, and transmit again. Frame format This portion must be at least 64 bytes for the Ethernet to work correctly TDC 463-98-501/502, Summer II 2002 2-5
  • 6. Figure 3-9 TDC 463-98-501/502, Summer II 2002 2-6
  • 7. Figure 3-11 TDC 463-98-501/502, Summer II 2002 2-7
  • 8. Figure 3-12 TDC 463-98-501/502, Summer II 2002 2-8
  • 9. Figure 3-13 TDC 463-98-501/502, Summer II 2002 2-9
  • 10. Token Ring Features 1) Predictable Performance a) Unlike Ethernet, there is a fixed limit on how long a station must wait to transmit frame. b) Eight data priority levels ensure that important data get sent first. 2) Ring-of -Stars Topology a) Star layout is well understood. b) Ring is easily expanded by adding additional Multistation Access Units (MAUs) c) Only point-to-point data connections used. 3) Self-Monitoring and Reconfiguration Capabilities a) Active Monitor station recovers from any token operation problems. b) If any station goes down it will be detected and removed from the ring. c) Any single cable can be cut or disconnected and network will reconfigure and continue operation. TDC 463-98-501/502, Summer II 2002 2-10
  • 11. Token Ring Features (continued.) 4) IBM Support a) IBM SNA data and LAN data can travel together on same token ring. b) Token Ring is an integral part of IBM future networking. Disadvantages of Token Ring 1) Higher price for NICs 2) Limited support for non-IBM products. a) Fewer products available for Token Ring than Ethernet b) Ethernet is still at the heart of some vendors’ future network plans. Note: For this course, you do not need to know the details of Token Ring frame format TDC 463-98-501/502, Summer II 2002 2-11
  • 12. Figure 3-14 Token Ring Operation TDC 463-98-501/502, Summer II 2002 2-12
  • 13. Figure 3-19 Circuit Switching • Dedicated physical connections • Source and destination operate at the same speed • Data arrive in sequence TDC 463-98-501/502, Summer II 2002 2-13
  • 14. Packet Switching • Store-and-forward • Source and destination may operate at different rates Figure 3-20 Packet Switching- Datagram approach TDC 463-98-501/502, Summer II 2002 2-14
  • 15. Packet Switching- Datagram approach •Connectionless •No connection setup necessary before sending data •Each packet sent independently •Each packet may take different path to destination •Each packet contains complete destination address •Packets may arrive out-of-order (transport layer must do reordering) •Network load is completely unpredictable •Protocol Examples: IP, Novell IPX, AppleTalk TDC 463-98-501/502, Summer II 2002 2-15
  • 16. Figure 3-21 Packet switching – Virtual circuit approach TDC 463-98-501/502, Summer II 2002 2-16
  • 17. Packet switching – Virtual circuit approach •Connection-oriented •Sender sends a Setup Request packet to establish a virtual circuit before sending data •Setup Request passes through all router/switches on path from source to destination •Path is assigned a Virtual Circuit Identifier (VCID) •Each router/switch stores information about each VC •Any router/switch or destination may deny the setup request (like a busy signal). •When finished, Sender sends Clear Request to tear down VC. •Each data packet contains VCID, not full source and destination addresses •All packets follow same path and arrive in order •Network load can be controlled through admissions control (denying setup requests if busy) •Protocol Examples: X.25, Frame Relay, ATM TDC 463-98-501/502, Summer II 2002 2-17
  • 18. WAN PPP • commonly used for dial-up access to the internet (connect through a phone line to the access router) • can also be used in a point-to-point link between two devices such as routers Figure 3-22 Point-to-point protocol (PPP) frame TDC 463-98-501/502, Summer II 2002 2-18
  • 19. Figure 3-23 X.25 (Connection-oriented) X.25 - An interface protocol to access the network Not defined by X.25 TDC 463-98-501/502, Summer II 2002 2-19
  • 20. Figure 3-25 Hop-by-hop error and flow control in X.25 is not necessary for newer more reliable networks. TDC 463-98-501/502, Summer II 2002 2-20
  • 21. Figure 3-28 ATM cells (Small fixed-size data units) TDC 463-98-501/502, Summer II 2002 2-21
  • 22. Figure 3-29 TDC 463-98-501/502, Summer II 2002 2-22
  • 26. Transparent Bridge DA: Destination Address SA: Source Address TDC 463-98-501/502, Summer II 2002 2-26
  • 27. Shared-Media vs. Shared Media Hub only one 10Mbps shared, single connection at a Switched LAN 10Mbps LAN segment time Architecture 10 Mbps client workstations servers "10 Mbps for ALL" Switch-Based LAN Architecture multiple dedicated Multiple, 10Mbps LAN Switching Hub simultaneous 10Mbps segments switching matrix connections All connections at 10Mbps shared media hub shared media hub Workgroup with shared servers with dedicated Workgroup with shared Workstations with connection connections connection dedicated connections "10 Mbps for EACH" TDC 463-98-501/502, GOLDMAN: II 2002 Summer LAN 2-27