SlideShare une entreprise Scribd logo
1  sur  30
Networking Concepts
LAN
• Concepts
  – Attenuation, Noise
• Hardware
  –   Repeater, Amplifier
  –   Bridge, Router, Gateway, Switch, Hub
  –   Twisted pair, Coaxial cable, Fiber optics
  –   Server, Workstation
  –   Wireless access point
• Topology
  – Bus, Tree, Star, Ring
LAN
• Standard
  –   OSI (Open Systems Interconnection)
  –   IEEE (Institute of Electrical and Electronic Engineers)
  –   ITU-T (Int’l Telephone Union – Telecom. Sector)
  –   ISO (International Standards Organization)
  –   EIA (Electronic Industries Association)
  –   ETS (European Telecom. Standard)
Communications Hardware
• Repeater
  – Extends distance limitation on networks (both voice
    and data)
  – Filters noise
  – Regenerates signals
  – For twisted pair wire, repeaters are placed every 100
    meters
• Amplifier
  – Extends distance limitation on networks (both voice
    and data)
  – Amplifies both signal and noise
Communications Hardware
• Bridge
  – Connects two LANs using same protocol
  – Single path between LANs
  – Minimal sophistication
• Router
  – Connects multiple LANs using same protocol
  – Choice of paths between LANs
  – Mainstay of internetworking
Communications Hardware
• Gateway
  – Connects multiple LANs using any protocol
  – Very sophisticated
  – Supports today’s internet by providing access
    points to several networks
• Hub
  – Connects nodes to a network
  – Sometimes acts as repeater
Communications Hardware
• Switch
  – Connects multiple LAN segments using the
    same protocol
  – Connections may use twisted pair, coaxial
    cable, or fiber optics wiring
  – Faster than bridges
  – Enables simultaneous communication between
    multiple network segments
Ethernet
• Ethernet was developed jointly by Xerox, Intel,
  and DEC in 1980
• DEC (Digital Equipment Corporation) a computer
  company that specialized in mini-computers in the
  1970s. It was acquired by Compaq and Compaq
  merged with HP.
• This was the first commercial LAN system
• Ethernet is a simple protocol to implement
• Ethernet addresses the layers 1 and 2 functionality
  for the OSI model
• Ethernet standard is very close to IEEE 802.3
  standard, but has some minor differences
Ethernet
• Ethernet uses bus topology (which we will discuss
  next)
• Ethernet transmits a baseband signal at 10 Mbps
• Baseband signals are digital and bidirectional
• Ethernet allows the user data to have a variable
  length up to 1500 bytes
• Unlike HDLC and SDLC protocols, ethernet uses
  a length field in the header to identify the length
  of the user data in bytes. Because of this, no
  special bit pattern is needed to recognize the start
  and end of the user data.
Ethernet frame format
 6-bytes       6-bytes    2-bytes   Variable length   4-bytes




Destination     Source    length       User data      CRC-32
 address        address
Ethernet diagram
PC1         PC3
                      Segment 1



      PC2


                         Repeater




                                                     PC-B   PC-C
                                  Segment 2



                                              PC-A
Bus topology
• It is a contention-based topology, which means that each
  node on the network must contend for access
• Each node listens to traffic on the network
• When a node has packets to transfer and the bus is not
  busy, then the packets are put on the bus in both directions,
  with the destination address marked on the packets
• All nodes listen to traffic on the network and the node that
  has packets addressed to it, receives the packets
• No routing or switching is involved in data transfer
Bus topology diagram


   PC1   PC2   PC3   PC4




                           Tap for a new node
Tree topology
• Tree topology is a variation on bus topology
• A special node is designated as root
• The primary reason for this topology is to
  segment nodes so that not all nodes need to
  listen to packets broadcast on a segment
• This adds a layer of security in the form of
  unwanted nodes not listening to the network
  traffic
• Speeds up data transfer since there will be
  fewer nodes on each segment
Tree topology diagram

                      Root



                                     PC 7




                                      PC 6
PC 1    PC 2
               PC 3

                       PC 4
                              PC 5
Star topology
•   This is another variation on bus topology
•   This has a central hub, a passive device
•   Star is a logical bus and a physical ring
•   Hub has ports in multiples of 8. Multiple hubs can be
    connected in a daisy chain format
•   Easy to add nodes to the network and remove nodes from
    the network
•   Central node does switching between nodes
•   Multiple nodes can communicate simultaneously without
    collision
•   Potential problem is the single point of failure for the
    network when the central node fails
Star topology diagram

          PC 3
   PC 2          PC 4

PC 1      Hub      PC 5


  PC 8           PC 6
          PC 7
Ring topology
• The nodes are connected in a ring pattern
• Unlike bus topology, each node on the ring acts as a
  repeater on the network
• Nodes access the network using a token, which eliminates
  the need for contention as in bus topology
• Token is a series of bits that identifies the node that has the
  right to transmit at any given time
• Example of a token: Assume that there are 6 nodes on the
  network. The nodes are labeled 1 through 6 and the token
  would consist of 3 bits. The token 100 will indicate that
  node 4 has the token.
• Tokens circulate in a single direction from a node to its
  neighbor
Ring topology diagram
         PC 4


                 PC 3
  PC 5




  PC 6
                 PC 2


          PC 1
OSI 7-layer model
 Source              Destination
Application          Application
Presentation         Presentation
  Session              Session
 Transport            Transport
 Network               Network
 Data link            Data link
 Physical              Physical
IEEE 802
• 802.1     General LAN management of OSI
            layers 3 through 7
•   802.2   LLC sublayer
•   802.3   Ethernet
•   802.4   Token bus
•   802.5   Token ring
•   802.6   MAN
•   802.7   Broadband, in general
IEEE 802
•   802.10   Network Security
•   802.11   Wireless LAN
•   802.12   100VG-AnyLAN (Voice Grade)
•   802.13   unused
•   802.14   Cable Modem
WAN
• Concepts
  – Gateway, Frame Relay, ATM, DSL, T1, T3,
    STS (Synchronous Transport Signal)
• Standard
  – TCP/IP (Transmission Control Protocol
    /Internet Protocol)
  – IETF (Internet Engineering Task Force)
  – ATM Forum (Asynchronous Transfer Mode)
STS, STM, OC equivalencies
 STS level    STM level    OC level    Data Rate
STS-1        --           OC-1        52 Mbps
STS-3        STM-1        OC-3        155 Mbps
STS-9        STM-3        OC-9        467 Mbps
STS-12       STM-4        OC-12       622 Mbps
STS-18       STM-6        OC-18       933 Mbps
STS-24       STM-8        OC-24       1.2 Gbps
STS-36       STM-12       OC-36       1.9 Gbps
STS-48       STM-16       OC-48       2.5 Gbps
ATM VPI and VCI
                         VP I 1                  VP I5
  VC I 1                                                    VC I 1
  VC I 2                                                    VC I 2

                                                          VCI 4
                                                 VP I6
                                                            VCI 7
   V C I 2            V P I 2
   V C I 6




                                                                     V C I 2
                                                                     V C I 6

             VP I 3                              VP I 3

VCI 4

VCI 7



                                  V P Sw itc h
TCP/IP functions
• Establish a connection between nodes
• Manage data flow on the network
• Handle transmission errors
• Terminate connection at the end
• TCP is a connection-oriented protocol, meaning that a
  packet sent to the next node is monitored for proper receipt
• IP is a connection-less protocol, meaning that a packet sent
  to the next node is not monitored for proper delivery
• Since TCP and IP work together, the packet delivery is
  reliable
• Connection-less mode is known as User Datagram
  Protocol (UDP)
TCP/IP 5-layer model
• TCP/IP protocol is divided into 5 layers
  –   Application layer
  –   Transport layer
  –   Network layer
  –   Data link layer
  –   Physical layer
IP Addressing
• IP address consists of 4 octets: n.n.n.n
  where n is in the range 0 to 255
• This form of IP address is known as IPv4,
  denoting IP address Version 4
• A new form of IP address known as IPv6,
  denoting IP address Version 6, has been
  proposed. It uses 128-bit addressing instead
  of 32-bit addressing.
IP Address Hierarchy
• There are 3 main classes of IP addresses in use
  and two additional classes of IP addresses
  available for multicast and testing
• Class A First octet range: 1 – 126
   – IBM, AT&T, HP, Merck, Stanford University
• Class B     First octet range: 128 – 191
   – U of L and most other universities
• Class C     First octet range: 192 – 223
   – IGLOU, Louisville’s first ISP
UDP
•   User Datagram Protocol is a ‘best effort’ protocol
•   ‘best effort’ means no guarantee of delivery
•   This is a connection-less protocol
•   UDP does not provide reliability
•   UDP sends out packets without first establishing a
    connection
•   RFC 768 describes UDP
•   UDP header consists of source port, destination port,
    length, checksum
•   Example of UDP: TFTP (Trivial File Transfer Protocol).
    TFTP is used when bootsrapping diskless system
•   TFTP is on UDP port 69

Contenu connexe

Tendances

Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
Nitin Gehlot
 
CTTC presentation WSN in Contiki
CTTC presentation WSN in ContikiCTTC presentation WSN in Contiki
CTTC presentation WSN in Contiki
Tania Ellinidou
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
Phan Vuong
 
Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhu
CU
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution Protocol
Kashif Latif
 
InternetWorking With TCP\IP
InternetWorking With TCP\IPInternetWorking With TCP\IP
InternetWorking With TCP\IP
hunghanamhus
 

Tendances (20)

Layer3protocols
Layer3protocolsLayer3protocols
Layer3protocols
 
Mpls
MplsMpls
Mpls
 
MPLS Concepts and Fundamentals
MPLS Concepts and FundamentalsMPLS Concepts and Fundamentals
MPLS Concepts and Fundamentals
 
Mpls Traffic Engineering ppt
Mpls Traffic Engineering pptMpls Traffic Engineering ppt
Mpls Traffic Engineering ppt
 
CTTC presentation WSN in Contiki
CTTC presentation WSN in ContikiCTTC presentation WSN in Contiki
CTTC presentation WSN in Contiki
 
Point To Point Protocol
Point To Point ProtocolPoint To Point Protocol
Point To Point Protocol
 
Mpls technology
Mpls technologyMpls technology
Mpls technology
 
Mpls by vidhu
Mpls by vidhuMpls by vidhu
Mpls by vidhu
 
Mpls
MplsMpls
Mpls
 
Part 10 : Routing in IP networks and interdomain routing with BGP
Part 10 : Routing in IP networks and interdomain routing with BGPPart 10 : Routing in IP networks and interdomain routing with BGP
Part 10 : Routing in IP networks and interdomain routing with BGP
 
MPLS
MPLSMPLS
MPLS
 
Label Distribution Protocol
Label Distribution ProtocolLabel Distribution Protocol
Label Distribution Protocol
 
EVPN Introduction
EVPN IntroductionEVPN Introduction
EVPN Introduction
 
CCNA Based routing protocols
CCNA Based routing protocolsCCNA Based routing protocols
CCNA Based routing protocols
 
MPLS Traffic Engineering
MPLS Traffic EngineeringMPLS Traffic Engineering
MPLS Traffic Engineering
 
Routing Protocols
Routing Protocols Routing Protocols
Routing Protocols
 
Mpls te
Mpls teMpls te
Mpls te
 
Rip ospf and bgp
Rip ospf and bgpRip ospf and bgp
Rip ospf and bgp
 
Network layer
Network layerNetwork layer
Network layer
 
InternetWorking With TCP\IP
InternetWorking With TCP\IPInternetWorking With TCP\IP
InternetWorking With TCP\IP
 

Similaire à Networking concepts

Networking Chapter 4
Networking Chapter 4Networking Chapter 4
Networking Chapter 4
mlrbrown
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
Bassam Kanber
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
mashiur
 
5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security
7wounders
 
L1 by-mr
L1 by-mrL1 by-mr
L1 by-mr
wael-b1
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
Techvilla
 

Similaire à Networking concepts (20)

Networking Chapter 4
Networking Chapter 4Networking Chapter 4
Networking Chapter 4
 
IEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.pptIEEE and Lower Level LAN Protocols.ppt
IEEE and Lower Level LAN Protocols.ppt
 
IP Signal Distribution
IP Signal DistributionIP Signal Distribution
IP Signal Distribution
 
Internet protocols Report Slides
Internet protocols Report SlidesInternet protocols Report Slides
Internet protocols Report Slides
 
TCP/IP model
TCP/IP modelTCP/IP model
TCP/IP model
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Network Protocol
Network ProtocolNetwork Protocol
Network Protocol
 
Unit 2 ppt-idc
Unit 2 ppt-idcUnit 2 ppt-idc
Unit 2 ppt-idc
 
ETE405-lec7.pdf
ETE405-lec7.pdfETE405-lec7.pdf
ETE405-lec7.pdf
 
5. telecomm & network security
5. telecomm & network security5. telecomm & network security
5. telecomm & network security
 
Building day 2 upload Building the Internet of Things with Thingsquare and ...
Building day 2   upload Building the Internet of Things with Thingsquare and ...Building day 2   upload Building the Internet of Things with Thingsquare and ...
Building day 2 upload Building the Internet of Things with Thingsquare and ...
 
2018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 72018 FRSecure CISSP Mentor Program- Session 7
2018 FRSecure CISSP Mentor Program- Session 7
 
IP Routing.pptx
IP Routing.pptxIP Routing.pptx
IP Routing.pptx
 
4. Communication and Network Security
4. Communication and Network Security4. Communication and Network Security
4. Communication and Network Security
 
ADDRESSING PADA TCP IP
ADDRESSING PADA TCP IPADDRESSING PADA TCP IP
ADDRESSING PADA TCP IP
 
Ppt seminar noc
Ppt seminar nocPpt seminar noc
Ppt seminar noc
 
L1 by-mr
L1 by-mrL1 by-mr
L1 by-mr
 
Point to point interconnect
Point to point interconnectPoint to point interconnect
Point to point interconnect
 
datalink.ppt
datalink.pptdatalink.ppt
datalink.ppt
 
WIFI MODEM Part-22
WIFI MODEM Part-22WIFI MODEM Part-22
WIFI MODEM Part-22
 

Plus de Yogesh Thawait

Plus de Yogesh Thawait (13)

C.f
C.fC.f
C.f
 
Securitisation and reconstruction
Securitisation and reconstructionSecuritisation and reconstruction
Securitisation and reconstruction
 
Sebi
SebiSebi
Sebi
 
It act
It actIt act
It act
 
Intellectual property law
Intellectual property lawIntellectual property law
Intellectual property law
 
India has been observing 15 march since 1989 as the national consumers right
India has been observing 15 march since 1989 as the national consumers rightIndia has been observing 15 march since 1989 as the national consumers right
India has been observing 15 march since 1989 as the national consumers right
 
Idra,1951
Idra,1951Idra,1951
Idra,1951
 
Foreign exchange management act (fema)
Foreign exchange management act (fema)Foreign exchange management act (fema)
Foreign exchange management act (fema)
 
Consumer
ConsumerConsumer
Consumer
 
Competition act,2002
Competition act,2002Competition act,2002
Competition act,2002
 
Securties contract act
Securties contract actSecurties contract act
Securties contract act
 
Mis 3
Mis 3Mis 3
Mis 3
 
Marketing plan on airtel
Marketing plan on airtelMarketing plan on airtel
Marketing plan on airtel
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Networking concepts

  • 2. LAN • Concepts – Attenuation, Noise • Hardware – Repeater, Amplifier – Bridge, Router, Gateway, Switch, Hub – Twisted pair, Coaxial cable, Fiber optics – Server, Workstation – Wireless access point • Topology – Bus, Tree, Star, Ring
  • 3. LAN • Standard – OSI (Open Systems Interconnection) – IEEE (Institute of Electrical and Electronic Engineers) – ITU-T (Int’l Telephone Union – Telecom. Sector) – ISO (International Standards Organization) – EIA (Electronic Industries Association) – ETS (European Telecom. Standard)
  • 4. Communications Hardware • Repeater – Extends distance limitation on networks (both voice and data) – Filters noise – Regenerates signals – For twisted pair wire, repeaters are placed every 100 meters • Amplifier – Extends distance limitation on networks (both voice and data) – Amplifies both signal and noise
  • 5. Communications Hardware • Bridge – Connects two LANs using same protocol – Single path between LANs – Minimal sophistication • Router – Connects multiple LANs using same protocol – Choice of paths between LANs – Mainstay of internetworking
  • 6. Communications Hardware • Gateway – Connects multiple LANs using any protocol – Very sophisticated – Supports today’s internet by providing access points to several networks • Hub – Connects nodes to a network – Sometimes acts as repeater
  • 7. Communications Hardware • Switch – Connects multiple LAN segments using the same protocol – Connections may use twisted pair, coaxial cable, or fiber optics wiring – Faster than bridges – Enables simultaneous communication between multiple network segments
  • 8. Ethernet • Ethernet was developed jointly by Xerox, Intel, and DEC in 1980 • DEC (Digital Equipment Corporation) a computer company that specialized in mini-computers in the 1970s. It was acquired by Compaq and Compaq merged with HP. • This was the first commercial LAN system • Ethernet is a simple protocol to implement • Ethernet addresses the layers 1 and 2 functionality for the OSI model • Ethernet standard is very close to IEEE 802.3 standard, but has some minor differences
  • 9. Ethernet • Ethernet uses bus topology (which we will discuss next) • Ethernet transmits a baseband signal at 10 Mbps • Baseband signals are digital and bidirectional • Ethernet allows the user data to have a variable length up to 1500 bytes • Unlike HDLC and SDLC protocols, ethernet uses a length field in the header to identify the length of the user data in bytes. Because of this, no special bit pattern is needed to recognize the start and end of the user data.
  • 10. Ethernet frame format 6-bytes 6-bytes 2-bytes Variable length 4-bytes Destination Source length User data CRC-32 address address
  • 11. Ethernet diagram PC1 PC3 Segment 1 PC2 Repeater PC-B PC-C Segment 2 PC-A
  • 12. Bus topology • It is a contention-based topology, which means that each node on the network must contend for access • Each node listens to traffic on the network • When a node has packets to transfer and the bus is not busy, then the packets are put on the bus in both directions, with the destination address marked on the packets • All nodes listen to traffic on the network and the node that has packets addressed to it, receives the packets • No routing or switching is involved in data transfer
  • 13. Bus topology diagram PC1 PC2 PC3 PC4 Tap for a new node
  • 14. Tree topology • Tree topology is a variation on bus topology • A special node is designated as root • The primary reason for this topology is to segment nodes so that not all nodes need to listen to packets broadcast on a segment • This adds a layer of security in the form of unwanted nodes not listening to the network traffic • Speeds up data transfer since there will be fewer nodes on each segment
  • 15. Tree topology diagram Root PC 7 PC 6 PC 1 PC 2 PC 3 PC 4 PC 5
  • 16. Star topology • This is another variation on bus topology • This has a central hub, a passive device • Star is a logical bus and a physical ring • Hub has ports in multiples of 8. Multiple hubs can be connected in a daisy chain format • Easy to add nodes to the network and remove nodes from the network • Central node does switching between nodes • Multiple nodes can communicate simultaneously without collision • Potential problem is the single point of failure for the network when the central node fails
  • 17. Star topology diagram PC 3 PC 2 PC 4 PC 1 Hub PC 5 PC 8 PC 6 PC 7
  • 18. Ring topology • The nodes are connected in a ring pattern • Unlike bus topology, each node on the ring acts as a repeater on the network • Nodes access the network using a token, which eliminates the need for contention as in bus topology • Token is a series of bits that identifies the node that has the right to transmit at any given time • Example of a token: Assume that there are 6 nodes on the network. The nodes are labeled 1 through 6 and the token would consist of 3 bits. The token 100 will indicate that node 4 has the token. • Tokens circulate in a single direction from a node to its neighbor
  • 19. Ring topology diagram PC 4 PC 3 PC 5 PC 6 PC 2 PC 1
  • 20. OSI 7-layer model Source Destination Application Application Presentation Presentation Session Session Transport Transport Network Network Data link Data link Physical Physical
  • 21. IEEE 802 • 802.1 General LAN management of OSI layers 3 through 7 • 802.2 LLC sublayer • 802.3 Ethernet • 802.4 Token bus • 802.5 Token ring • 802.6 MAN • 802.7 Broadband, in general
  • 22. IEEE 802 • 802.10 Network Security • 802.11 Wireless LAN • 802.12 100VG-AnyLAN (Voice Grade) • 802.13 unused • 802.14 Cable Modem
  • 23. WAN • Concepts – Gateway, Frame Relay, ATM, DSL, T1, T3, STS (Synchronous Transport Signal) • Standard – TCP/IP (Transmission Control Protocol /Internet Protocol) – IETF (Internet Engineering Task Force) – ATM Forum (Asynchronous Transfer Mode)
  • 24. STS, STM, OC equivalencies STS level STM level OC level Data Rate STS-1 -- OC-1 52 Mbps STS-3 STM-1 OC-3 155 Mbps STS-9 STM-3 OC-9 467 Mbps STS-12 STM-4 OC-12 622 Mbps STS-18 STM-6 OC-18 933 Mbps STS-24 STM-8 OC-24 1.2 Gbps STS-36 STM-12 OC-36 1.9 Gbps STS-48 STM-16 OC-48 2.5 Gbps
  • 25. ATM VPI and VCI VP I 1 VP I5 VC I 1 VC I 1 VC I 2 VC I 2 VCI 4 VP I6 VCI 7 V C I 2 V P I 2 V C I 6 V C I 2 V C I 6 VP I 3 VP I 3 VCI 4 VCI 7 V P Sw itc h
  • 26. TCP/IP functions • Establish a connection between nodes • Manage data flow on the network • Handle transmission errors • Terminate connection at the end • TCP is a connection-oriented protocol, meaning that a packet sent to the next node is monitored for proper receipt • IP is a connection-less protocol, meaning that a packet sent to the next node is not monitored for proper delivery • Since TCP and IP work together, the packet delivery is reliable • Connection-less mode is known as User Datagram Protocol (UDP)
  • 27. TCP/IP 5-layer model • TCP/IP protocol is divided into 5 layers – Application layer – Transport layer – Network layer – Data link layer – Physical layer
  • 28. IP Addressing • IP address consists of 4 octets: n.n.n.n where n is in the range 0 to 255 • This form of IP address is known as IPv4, denoting IP address Version 4 • A new form of IP address known as IPv6, denoting IP address Version 6, has been proposed. It uses 128-bit addressing instead of 32-bit addressing.
  • 29. IP Address Hierarchy • There are 3 main classes of IP addresses in use and two additional classes of IP addresses available for multicast and testing • Class A First octet range: 1 – 126 – IBM, AT&T, HP, Merck, Stanford University • Class B First octet range: 128 – 191 – U of L and most other universities • Class C First octet range: 192 – 223 – IGLOU, Louisville’s first ISP
  • 30. UDP • User Datagram Protocol is a ‘best effort’ protocol • ‘best effort’ means no guarantee of delivery • This is a connection-less protocol • UDP does not provide reliability • UDP sends out packets without first establishing a connection • RFC 768 describes UDP • UDP header consists of source port, destination port, length, checksum • Example of UDP: TFTP (Trivial File Transfer Protocol). TFTP is used when bootsrapping diskless system • TFTP is on UDP port 69