SlideShare une entreprise Scribd logo
1  sur  89
Direct Link Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encoding ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Bits NRZ 0 0 1 0 1 1 1 1 0 1 0 0 0 0 1 0
Problems: Consecutive 1s or 0s ,[object Object],[object Object],[object Object],[object Object]
Alternative Encodings ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encodings (cont) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Encodings (cont) Bits NRZ Clock Manchester NRZI 0 0 1 0 1 1 1 1 0 1 0 0 0 0 1 0
Framing ,[object Object],[object Object],Frames Bits Adaptor Adaptor Node B Node A
Approaches ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Header Body 8 16 16 8 CRC Beginning sequence Ending sequence
Approaches (cont) ,[object Object],[object Object],[object Object],[object Object],[object Object]
Approaches (cont) ,[object Object],[object Object],[object Object]
Handling Errors ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Error Detecting and Correcting Codes ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Error Detection Techniques ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Cyclic Redundancy Check ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CRC (cont) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CRC Example Generator 1101 11111001 10011010 000 Message 1101 1001 1101 1000 1101 1011 1101 1100 1101 1000 1101 101 Remainder
Choice of C(x) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Error Detection Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Error Recovery ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary ,[object Object],[object Object],[object Object],[object Object]
Shared Media and Local Area Networks ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Multiple Access Links and LANs ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Typical LAN Structure ROM Ethernet Processor ,[object Object],[object Object],[object Object],RAM RAM
Adaptors Communicating ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],sending node rcving node network packet adapter adapter link layer protocol frame frame
MAC (Physical) Addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MAC (Physical, or LAN) Addresses ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
MAC Sub-layer Data link layer 802.3 CSMA-CD 802.5 Token Ring 802.2  Logical link control Physical layer MAC LLC 802.11 Wireless LAN Network layer Network layer Physical layer OSI IEEE 802 Various physical layers Other LANs
Broadcast Links: Multiple Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Random Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Controlled Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Taxonomy of MAC Protocols WiFi (802.11)
Pure (unslotted) Aloha ,[object Object],[object Object]
Slotted Aloha ,[object Object],[object Object],[object Object],Success (S), Collision (C),  Empty (E) slots
Performance of Aloha Protocols S = throughput = “goodput”  (success rate) G = offered load = Np 0.5 1.0 1.5 2.0 0.1 0.2 0.3 0.4 Pure Aloha Slotted Aloha
Carrier Sense Multiple Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Persistent and Non-persistent CSMA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CD ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Collisions A B A B A B A B
Worst Case Collision Detection Time
CSMA/CD: Illustration
Ethernet Overview ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Dest addr 64 48 32 CRC Preamble Src addr Type Body 16 48
Ethernet ,[object Object],[object Object],[object Object],[object Object],[object Object],Metcalfe’s Ethernet sketch
Ethernet Frame Format ,[object Object],DIX frame format IEEE 802.3 format ,[object Object],[object Object],[object Object],[object Object],Dest addr 8 bytes 6 4 CRC Preamble Src addr Type Data 2 6 0-1500 Dest addr 8 bytes 6 4 CRC Preamble Src addr Length Data 2 6 0-1500
Fields in Ethernet Frame Format ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IEEE 802.3 MAC:  Ethernet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IEEE 802.3 Parameters ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ethernet MAC Protocol: Basic Ideas ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ethernet CSMA/CD Illustration
Ethernet CSMA/CD Alg. Flow Chart
Ethernet CSMA/CD Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ethernet’s CSMA/CD (more) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CSMA/CD Efficiency ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
IEEE 802.3 Physical Layer IEEE 802.3 10 Mbps medium alternatives Thick Coax: Stiff, hard to work with  T connectors flaky Hubs & Switches! (a) transceivers (b) Point-to-point link Star Bus Bus Topology 2 km 100 m 2 00 m 5 00 m Max. Segment Length Optical  f iber T wisted pair Thin coax Thick coax Medium 10base FX 10base T 10base 2 10base 5
Ethernet Technologies: 10Base2 ,[object Object],[object Object],[object Object],[object Object],[object Object]
10BaseT  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],hub nodes
Ethernet Hubs & Switches Twisted Pair Cheap Easy to work with Reliable Star-topology CSMA-CD Twisted Pair Cheap Bridging increases scalability Separate collision domains Full duplex operation (a)                 Single collision domain (b)           High-Speed backplane or interconnection fabric
Evolution of Ethernet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
100Base T (Fast) Ethernet: Issues ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fast (100Mbps) Ethernet IEEE 802.3 100 Mbps Ethernet medium alternatives ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],Star Star Star Topology 2 km 100 m 100 m Max. Segment Length Optical fiber multimode Two strands Twisted pair category 5 UTP two pairs Twisted pair category 3 UTP 4 pairs Medium 100baseFX 100baseT 100baseT4
Gigabit Ethernet Gigabit Ethernet Physical Layer Specification (IEEE 802.3 1 Gigabit  Ethernet medium alternatives) Star Star Star Star Topology 100 m 25 m 5 km 550 m Max. Segment Length Twisted pair category 5 UTP Shielded copper cable Optical fiber  single mode Two strands Optical fiber  multimode Two strands Medium 1000baseT 1000baseCX 1000baseLX 1000baseSX
Gigabit Ethernet ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Carrier Extension ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],RRRRRRRRRRRRR Frame Carrier Extension 512 bytes
Frame Bursting ,[object Object],[object Object],[object Object],[object Object],512 bytes Extension Frame Frame Frame Frame Frame burst
10 Gigabit Ethernet IEEE 802.3 10 Gbps Ethernet medium alternatives ,[object Object],[object Object],[object Object],[object Object],[object Object],300 m – 10 km 40 km 10 km 300 m Max. Segment Length Two optical fibers multimode/single-mode with four wavelengths at 1310 nm band 8B10B code Two optical fibers  Single-mode at 1550 nm SONET compatibility Two optical fibers Single-mode at 1310 nm 64B66B Two optical fibers Multimode at 850 nm 64B66B code Medium 10GbaseLX4 10GbaseEW 10GBaseLR 10GbaseSR
Typical Ethernet Deployment Server 100 Mbps links 10 Mbps links Server Server Server 100 Mbps links 10 Mbps links Server 100 Mbps links 10 Mbps links Server Gigabit Ethernet links Gigabit Ethernet links Server farm Department A Department B Department C Hub  Hub  Hub  Ethernet switch  Ethernet switch  Ethernet switch  Switch/router  Switch/router
Ethernet Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Token based Multiple Access ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ring Topology
Token Ring (IEEE 802.5) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Token Ring Performance ,[object Object],where
Token Release T oken Frame T oken Frame Release after Transmission Release after Reception
Tokens and Data Frames Body Checksum Src addr Variable 48 Dest addr 48 32 End delimiter 8 Frame status 8 Frame control 8 Access control 8 Start delimiter 8
Token Ring Frame Fields ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Priority and Reservation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ring Maintenance ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Fault Scenarios ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Token Ring Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Ethernet  vs  Token Ring ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
FDDI ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FDDI vs. 802.5 (Token Ring)  ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Timed Token Algorithm ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Timed Token Algorithm (cont) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
FDDI Failure Recovery
Summary ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Summary (continued) ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Contenu connexe

Tendances

Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communicationskuramartin
 
Some Ccna basic detail
Some Ccna basic detailSome Ccna basic detail
Some Ccna basic detailmuneebalisyed
 
Chap.1 ethernet introduction
Chap.1 ethernet introductionChap.1 ethernet introduction
Chap.1 ethernet introduction東原 李
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsChandra Meena
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATMseanraz
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring Hareem Naz
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer NetworkHitesh Mohapatra
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)JaironLanda
 
Sdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basicsSdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basicsPaul Andrew
 

Tendances (20)

Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Token bus
Token busToken bus
Token bus
 
10 high speedla-ns
10 high speedla-ns10 high speedla-ns
10 high speedla-ns
 
13 atm
13 atm13 atm
13 atm
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
Some Ccna basic detail
Some Ccna basic detailSome Ccna basic detail
Some Ccna basic detail
 
Mac protocols
Mac protocolsMac protocols
Mac protocols
 
Chap.1 ethernet introduction
Chap.1 ethernet introductionChap.1 ethernet introduction
Chap.1 ethernet introduction
 
Wired LANs
Wired LANsWired LANs
Wired LANs
 
Lecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocolsLecture 7 8 ad hoc wireless media access protocols
Lecture 7 8 ad hoc wireless media access protocols
 
10 Slides to ATM
10 Slides to ATM10 Slides to ATM
10 Slides to ATM
 
Ccna4 mod5-frame relay
Ccna4 mod5-frame relayCcna4 mod5-frame relay
Ccna4 mod5-frame relay
 
9 lan
9 lan9 lan
9 lan
 
Ethernet,token ring
Ethernet,token ring Ethernet,token ring
Ethernet,token ring
 
Frame relay
Frame relayFrame relay
Frame relay
 
Frame Relay
Frame RelayFrame Relay
Frame Relay
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
M.A.C (Medium Access Control)
M.A.C (Medium Access Control)M.A.C (Medium Access Control)
M.A.C (Medium Access Control)
 
Sdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basicsSdh basics hand_outs_of_sdh_basics
Sdh basics hand_outs_of_sdh_basics
 
Computer networks ct2
Computer networks ct2Computer networks ct2
Computer networks ct2
 

En vedette

Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsTutun Juhana
 
SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」
SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」
SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」Hideaki Tokida
 
Achieving Scalability and speed with IBM Solutions - IaaS Softlayer
Achieving Scalability and speed with IBM Solutions -  IaaS SoftlayerAchieving Scalability and speed with IBM Solutions -  IaaS Softlayer
Achieving Scalability and speed with IBM Solutions - IaaS SoftlayerAna Alves Sequeira
 
SoftLayer ネットワークサービス基礎編
SoftLayer ネットワークサービス基礎編SoftLayer ネットワークサービス基礎編
SoftLayer ネットワークサービス基礎編Hideaki Tokida
 
Packet tracer 설치 및 사용법
Packet tracer 설치 및 사용법Packet tracer 설치 및 사용법
Packet tracer 설치 및 사용법Sehan Lee
 
IBM Cloud SoftLayer Introduction & Hands-on 2016
IBM Cloud SoftLayer Introduction & Hands-on 2016IBM Cloud SoftLayer Introduction & Hands-on 2016
IBM Cloud SoftLayer Introduction & Hands-on 2016Atsumori Sasaki
 
NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARDKak Yong
 
IBM SoftLayer Diret Link patterns
IBM SoftLayer Diret Link patternsIBM SoftLayer Diret Link patterns
IBM SoftLayer Diret Link patternsTomoyuki Niijima
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansVuz Dở Hơi
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And ProtocolsSteven Cahill
 

En vedette (13)

Et3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernetsEt3003 sem2-1314-3 ethernets
Et3003 sem2-1314-3 ethernets
 
SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」
SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」
SoftLayerBluemixSummit はじめてのSoftLayer「ネットワーク編」
 
Achieving Scalability and speed with IBM Solutions - IaaS Softlayer
Achieving Scalability and speed with IBM Solutions -  IaaS SoftlayerAchieving Scalability and speed with IBM Solutions -  IaaS Softlayer
Achieving Scalability and speed with IBM Solutions - IaaS Softlayer
 
SoftLayer ネットワークサービス基礎編
SoftLayer ネットワークサービス基礎編SoftLayer ネットワークサービス基礎編
SoftLayer ネットワークサービス基礎編
 
Packet tracer 설치 및 사용법
Packet tracer 설치 및 사용법Packet tracer 설치 및 사용법
Packet tracer 설치 및 사용법
 
IBM Cloud SoftLayer Introduction & Hands-on 2016
IBM Cloud SoftLayer Introduction & Hands-on 2016IBM Cloud SoftLayer Introduction & Hands-on 2016
IBM Cloud SoftLayer Introduction & Hands-on 2016
 
Ch12
Ch12Ch12
Ch12
 
Ch14
Ch14Ch14
Ch14
 
NETWORK STANDARD
NETWORK STANDARDNETWORK STANDARD
NETWORK STANDARD
 
IBM SoftLayer Diret Link patterns
IBM SoftLayer Diret Link patternsIBM SoftLayer Diret Link patterns
IBM SoftLayer Diret Link patterns
 
CCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless LansCCNAv5 - S3: Chapter 4 Wireless Lans
CCNAv5 - S3: Chapter 4 Wireless Lans
 
Networking Standards And Protocols
Networking Standards And ProtocolsNetworking Standards And Protocols
Networking Standards And Protocols
 
CSMA/CA
CSMA/CACSMA/CA
CSMA/CA
 

Similaire à Direct Link Lan

Similaire à Direct Link Lan (20)

MAC.ppt
MAC.pptMAC.ppt
MAC.ppt
 
MAC.ppt
MAC.pptMAC.ppt
MAC.ppt
 
Mac
MacMac
Mac
 
Link layer
Link layerLink layer
Link layer
 
Jaimin chp-3 - data-link layer- 2011 batch
Jaimin   chp-3 - data-link layer- 2011 batchJaimin   chp-3 - data-link layer- 2011 batch
Jaimin chp-3 - data-link layer- 2011 batch
 
CS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKSCS6551 COMPUTER NETWORKS
CS6551 COMPUTER NETWORKS
 
Week15 lec1
Week15 lec1Week15 lec1
Week15 lec1
 
Mac
MacMac
Mac
 
wireless.ppt
wireless.pptwireless.ppt
wireless.ppt
 
Mac
MacMac
Mac
 
F06_Lecture7_etherne..
F06_Lecture7_etherne..F06_Lecture7_etherne..
F06_Lecture7_etherne..
 
UnIT VIII manet
UnIT VIII manetUnIT VIII manet
UnIT VIII manet
 
Cs8591 Computer Networks
Cs8591 Computer NetworksCs8591 Computer Networks
Cs8591 Computer Networks
 
8251 08 Serial
8251 08 Serial8251 08 Serial
8251 08 Serial
 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
 
Bluetooth mobileip
Bluetooth mobileipBluetooth mobileip
Bluetooth mobileip
 
Humming code error detector 7_communications.ppt
Humming code error detector 7_communications.pptHumming code error detector 7_communications.ppt
Humming code error detector 7_communications.ppt
 
Lan
LanLan
Lan
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Computer network (1)
Computer network (1)Computer network (1)
Computer network (1)
 

Dernier

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 

Dernier (20)

Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 

Direct Link Lan

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6. Encodings (cont) Bits NRZ Clock Manchester NRZI 0 0 1 0 1 1 1 1 0 1 0 0 0 0 1 0
  • 7.
  • 8.
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14.
  • 15.
  • 16. CRC Example Generator 1101 11111001 10011010 000 Message 1101 1001 1101 1000 1101 1011 1101 1100 1101 1000 1101 101 Remainder
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27. MAC Sub-layer Data link layer 802.3 CSMA-CD 802.5 Token Ring 802.2 Logical link control Physical layer MAC LLC 802.11 Wireless LAN Network layer Network layer Physical layer OSI IEEE 802 Various physical layers Other LANs
  • 28.
  • 29.
  • 30.
  • 31. Taxonomy of MAC Protocols WiFi (802.11)
  • 32.
  • 33.
  • 34. Performance of Aloha Protocols S = throughput = “goodput” (success rate) G = offered load = Np 0.5 1.0 1.5 2.0 0.1 0.2 0.3 0.4 Pure Aloha Slotted Aloha
  • 35.
  • 36.
  • 37.
  • 38. Collisions A B A B A B A B
  • 39. Worst Case Collision Detection Time
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 49. Ethernet CSMA/CD Alg. Flow Chart
  • 50.
  • 51.
  • 52.
  • 53. IEEE 802.3 Physical Layer IEEE 802.3 10 Mbps medium alternatives Thick Coax: Stiff, hard to work with T connectors flaky Hubs & Switches! (a) transceivers (b) Point-to-point link Star Bus Bus Topology 2 km 100 m 2 00 m 5 00 m Max. Segment Length Optical f iber T wisted pair Thin coax Thick coax Medium 10base FX 10base T 10base 2 10base 5
  • 54.
  • 55.
  • 56. Ethernet Hubs & Switches Twisted Pair Cheap Easy to work with Reliable Star-topology CSMA-CD Twisted Pair Cheap Bridging increases scalability Separate collision domains Full duplex operation (a)       Single collision domain (b)     High-Speed backplane or interconnection fabric
  • 57.
  • 58.
  • 59.
  • 60. Gigabit Ethernet Gigabit Ethernet Physical Layer Specification (IEEE 802.3 1 Gigabit Ethernet medium alternatives) Star Star Star Star Topology 100 m 25 m 5 km 550 m Max. Segment Length Twisted pair category 5 UTP Shielded copper cable Optical fiber single mode Two strands Optical fiber multimode Two strands Medium 1000baseT 1000baseCX 1000baseLX 1000baseSX
  • 61.
  • 62.
  • 63.
  • 64.
  • 65. Typical Ethernet Deployment Server 100 Mbps links 10 Mbps links Server Server Server 100 Mbps links 10 Mbps links Server 100 Mbps links 10 Mbps links Server Gigabit Ethernet links Gigabit Ethernet links Server farm Department A Department B Department C Hub Hub Hub Ethernet switch Ethernet switch Ethernet switch Switch/router Switch/router
  • 66.
  • 67.
  • 69.
  • 70.
  • 71. Token Release T oken Frame T oken Frame Release after Transmission Release after Reception
  • 72. Tokens and Data Frames Body Checksum Src addr Variable 48 Dest addr 48 32 End delimiter 8 Frame status 8 Frame control 8 Access control 8 Start delimiter 8
  • 73.
  • 74.
  • 75.
  • 76.
  • 77.  
  • 78.
  • 79.
  • 80.  
  • 81.
  • 82.
  • 83.
  • 84.
  • 86.
  • 87.
  • 88.
  • 89.