Chapter 5 Local Area Network Concepts and Architecture

  • Slides: 54
Download presentation
Chapter 5 Local Area Network Concepts and Architecture • • Network Fundamentals Local Area

Chapter 5 Local Area Network Concepts and Architecture • • Network Fundamentals Local Area Network (LAN) Open Systems Interconnection (OSI) LAN Architectures

Network Fundamentals • • • Definitions Classifications Network topology Network types Local Area Network

Network Fundamentals • • • Definitions Classifications Network topology Network types Local Area Network

Definition • Network • Backbond network

Definition • Network • Backbond network

Classification • • Topology Ownership Geography Transmission

Classification • • Topology Ownership Geography Transmission

Network Topology • • • Star Hierarchical Mesh Bus Ring Hybrid

Network Topology • • • Star Hierarchical Mesh Bus Ring Hybrid

Star Network • Usage – Centralized processing or communication • Pros – Expansion –

Star Network • Usage – Centralized processing or communication • Pros – Expansion – Implementation – No limit to no. and length of arms • Cons – Single point of failure – Overload of mater during peak traffic

Hierarchical Network • Usage – Distributed processing • Tree structure with a root •

Hierarchical Network • Usage – Distributed processing • Tree structure with a root • pro – No single point of failure

Mesh Network • Web structure • Usage – Public telephone system • Pro –

Mesh Network • Web structure • Usage – Public telephone system • Pro – Alternative communication route • Con – Line cost

Bus Network • Usage – Date entry or office environment • Pros – Independent

Bus Network • Usage – Date entry or office environment • Pros – Independent between nodes – High reliability • Cons – Limited number of attached device – Hard to locate the problems

Ring Network • Usage – Manufacturing • Pros – Less attenuation – Error control

Ring Network • Usage – Manufacturing • Pros – Less attenuation – Error control – Network management • Cons – Failing of a node

Hybrid Networks • Usage – Connecting different networks • Pro – Communication between networks

Hybrid Networks • Usage – Connecting different networks • Pro – Communication between networks • Con – Conversion device and costs – Compatibility

Network Ownership • Private networks • Public networks • Valued added networks

Network Ownership • Private networks • Public networks • Valued added networks

Private networks • Full control • Special needs • Expense

Private networks • Full control • Special needs • Expense

Public networks • Controlled by carriers • Regulated by government • Inexpensive

Public networks • Controlled by carriers • Regulated by government • Inexpensive

Valued Added Networks • Functions – Code translation – Speed conversion – Store message

Valued Added Networks • Functions – Code translation – Speed conversion – Store message and delivery • Examples – Telex – SWIFT – SITA (airline) – IVAN (insurance)

Networks by Geography • Wide area network (WAN) • Metropolitan area network (MAN): 30

Networks by Geography • Wide area network (WAN) • Metropolitan area network (MAN): 30 miles • Local area network (LAN): 5 miles

LAN Characteristics • • Limited distance within a few miles High data rate -

LAN Characteristics • • Limited distance within a few miles High data rate - 2 to 1000 Mbps Low error rate Good response time Private owned No regulation Share hardware, software, and data files

Business Needs • • • Corporate asset for competitive edge Data accessibility (information distribution)

Business Needs • • • Corporate asset for competitive edge Data accessibility (information distribution) Less expenses Better service - response time and reliability Higher productivity Control or secure

LAN Analysis & Design • Meet business objectives (strategic planning) • Prevent technological obsolescence

LAN Analysis & Design • Meet business objectives (strategic planning) • Prevent technological obsolescence

LAN Hardware & Software • Hardware – PC: servers and clients – Network interface

LAN Hardware & Software • Hardware – PC: servers and clients – Network interface card (NIC): physical address – Media or Cables • • Unshielded twisted pair (inexpensive) Coaxial cable (faster, expensive) Optical fiber (fastest, expensive) Air for wireless – Hub (compatible) • connect wires and cables, repeater, error detection • Software: network operating system

Open System Interconnection Model • International Standards Organization • Interconnection of dissimilar network •

Open System Interconnection Model • International Standards Organization • Interconnection of dissimilar network • Seven Layers – Application – Presentation – Session – Transport – Network – Data Link – Physical

Application Layer • Utilities support end-user application program • Determine data to be send

Application Layer • Utilities support end-user application program • Determine data to be send at originating end • Process data at receiving end

Presentation Layer • Change data format • Compression/expansion • Encryption/decryption

Presentation Layer • Change data format • Compression/expansion • Encryption/decryption

Session Layer • Communication rules of machines or application programs • Accounting functions

Session Layer • Communication rules of machines or application programs • Accounting functions

Transport Layer • Identify receiving address • Flow control: rate of transmission • Recovery:

Transport Layer • Identify receiving address • Flow control: rate of transmission • Recovery: calculate and checksum of entire message

Network Layer • Route message • Dissemble and assemble data (packets) • Accounting functions

Network Layer • Route message • Dissemble and assemble data (packets) • Accounting functions

Data Link Layer • • • By IEEE 802 Establish link between two ends

Data Link Layer • • • By IEEE 802 Establish link between two ends Detect and correct transmission error Add header and trailer Divide data unit for transmission (frames) Sublayers – Media access control (MAC): token ring or Ethernet – Logical link control (LLC): assembling and disassembling frames, error control, flow control

Physical Layer • Electrical, mechanical, procedural specifications for data transmission • Hardware specification by

Physical Layer • Electrical, mechanical, procedural specifications for data transmission • Hardware specification by RS-232 -C

Other Concepts • Protocol • Encapsulation/ de-encapsulation

Other Concepts • Protocol • Encapsulation/ de-encapsulation

Standards • • • IEEE 802. 2: LLC protocol IEEE 802. 3: CSMA/CD baseband

Standards • • • IEEE 802. 2: LLC protocol IEEE 802. 3: CSMA/CD baseband bus IEEE 802. 4: token passing bus IEEE 802. 5 token passing ring Fiber Distributed Data Interface (FDDI) Standard

LAN Architecture Model • Network architecture includes – Access methodology – Logical topology –

LAN Architecture Model • Network architecture includes – Access methodology – Logical topology – Physical topology • Network configuration includes – Network architecture – Media choice

Access Methods • Contention: carrier sense multiple access with collision detection (CSMA/CD) – Inexpensive

Access Methods • Contention: carrier sense multiple access with collision detection (CSMA/CD) – Inexpensive NIC – For: office application – Not for: manufacturing due to inconsistent response time • Token passing: 24 bits of token (free or busy) – More efficient at higher network utilization rate – More expensive NIC – Supported by IBM

Topology • Logical – Sequential – Broadcast • Physical – Bus: line broken –

Topology • Logical – Sequential – Broadcast • Physical – Bus: line broken – Ring: PC or NIC broken – Star (hub, concentrator, MAU (multistation access unit, repeater, switching hub): single point of failure

Ethernet • Functionality – Access method: CSMA/CD – Logical topology: broadcast – Physical topology:

Ethernet • Functionality – Access method: CSMA/CD – Logical topology: broadcast – Physical topology: bus or star • Ethernet II – – Header (preamble) for synchronizing Destination & source address (MAC layer address) Type field for network protocol Data field – Frame check sequence (FCS): CRC-32 • IEEE 802. 3 replace type field with length field

Media-related Ethernet • • 10 Base. T 10 Base 2 (Thinet with RG-58 coax)

Media-related Ethernet • • 10 Base. T 10 Base 2 (Thinet with RG-58 coax) 10 Base 5 (thick coaxial cable RG-11) 100 Base. T Fast Ethernet with 100 -Mbps – 100 Base. TX (2 pair of Category 5 UTP or 1 pair of Type 1 STP) – 100 Base. T 4 (4 pair of Category 3, 4, or 5 UTP) – 100 Base. FX (fiber optic cable) – Trade off between speed and maximum network diameter • Gigabit Ethernet (1000 Base-X)

Token Ring • Functionality – Access method: token passing – Logical topology: sequence –

Token Ring • Functionality – Access method: token passing – Logical topology: sequence – Physical topology: ring or star • IEEE 802. 5 – Starting delimiter alert NIC about token approaching – Access control field (1 for busy, 0 for free) – Frame control field indicate regular data or network management frame – Destination & source address (MAC layer address) – Routing information field for multiple token ring LANs – Data field – Frame check sequence (FCS): CRC-32 – Ending delimiter (ending or intermediate frame) – Frame status field for successful delivery

Fiber Distributed Data Interface • Fiber distributed data interface (FDDI) by American National standard

Fiber Distributed Data Interface • Fiber distributed data interface (FDDI) by American National standard Institute (ANSI) • Functionality – Access method: Modified token passing – Logical topology: sequential – Physical topology: dual counter-rotating rings • Build-in reliability and longer distance • Single-attachment stations (SAS) or dualattachment stations (DAS)

Fiber Distributed Data Interface • High speed backbone between LANs • Primary ring and

Fiber Distributed Data Interface • High speed backbone between LANs • Primary ring and secondary ring - 100 Mbps token ring • Fault tolerance • High-priority station having longer access time • Maximum 500 stations • Maximum length of 200 kilometers (rings) • Maximum 2 kilometers between stations • Constant data rate for video and voice

Fiber Distributed Data Interface • Applications – Campus backbone – High-bandwidth workgroups (multimedia application)

Fiber Distributed Data Interface • Applications – Campus backbone – High-bandwidth workgroups (multimedia application) – High-bandwidth subworkgroup connection (servers) • Hardware: FDDI concentrator or hub, FDDI/Ethernet bridge • Media: fiber optic cable or copper distributed data interface (CDDI) for limited distance (100 m)

100 VG-Any. LAN • Ethernet and token ring packets • Demand priority access (DPA)

100 VG-Any. LAN • Ethernet and token ring packets • Demand priority access (DPA) or demand priority protocol: round robin polling scheme • Priority is assigned by application program and ports • Max 4 hubs between two nodes

100 VG-Any. LAN • Hardware: 100 VG-Any. LAN hubs arranged in a hierarchical form

100 VG-Any. LAN • Hardware: 100 VG-Any. LAN hubs arranged in a hierarchical form • Media: 4 pair of Category 3, 4, or 5 UTP; 1 pair of Type 1 STP; or single mode and multimode fiber optic cable

Isochronous Ethernet • Iso-Ethernet in IEEE 802. 9 a (Isochronous Ethernet Integrated Services) •

Isochronous Ethernet • Iso-Ethernet in IEEE 802. 9 a (Isochronous Ethernet Integrated Services) • Synchronize all circuits with a single common clocking reference • Guaranteed delivery time for voice and video • Use ISDN WAN link

Isochronous Ethernet • 16. 144 -Mpbs bandwidth – P channel for Ethernet traffic –

Isochronous Ethernet • 16. 144 -Mpbs bandwidth – P channel for Ethernet traffic – C channel ( B channel and D channel) • Service Modes – 10 Base. T – Mutiservice: multimedia – All-isochronous: real time video or voice distribution

Isochronous Ethernet • Hardware: – hubs: Iso-Ethernet attachment units (AU) – Workstation with Iso-Ethernet

Isochronous Ethernet • Hardware: – hubs: Iso-Ethernet attachment units (AU) – Workstation with Iso-Ethernet NIC: integrated service terminal equipment (ISTE)

Wireless • • Transmitter and receiver 100 - 300 feet Infrared technology (line-of-sight) Spread

Wireless • • Transmitter and receiver 100 - 300 feet Infrared technology (line-of-sight) Spread spectrum technology (no ling-ofsight) • Special application

Performance Factors • • • Protocol (CSMA/CD, token ring) Speed of transmission (line) Amount

Performance Factors • • • Protocol (CSMA/CD, token ring) Speed of transmission (line) Amount of traffic Error rate Software Hardware

Selection Process • Long range thinking, planning and forecasting • Selection team • Checklist

Selection Process • Long range thinking, planning and forecasting • Selection team • Checklist of criteria • Cost & benefit analysis • Technical alternatives • Management and Maintenance

Selection Criteria - I • • Number of user Geographic spread Applications Performance Cost

Selection Criteria - I • • Number of user Geographic spread Applications Performance Cost Security Wiring

Selection Criteria - II • • Installation Maintenance Vendor support and training Future expansion

Selection Criteria - II • • Installation Maintenance Vendor support and training Future expansion Workstations Compatibility to existing LANs Interface to other networks

Costs • • • Workstations Servers Printers Cabling Bridges, routers, brouters, gateways Training People

Costs • • • Workstations Servers Printers Cabling Bridges, routers, brouters, gateways Training People (consultant, administrator etc. ) Maintenance Space & Environment

Installation • Choices – Suppliers or dealers – In house • Tasks (project management)

Installation • Choices – Suppliers or dealers – In house • Tasks (project management) – – – Install hardware and software Test access and capability Trouble shoot Document Train user Help center

Management & Maintenance • • • Organization: LAN administrator Management: policies and procedures Documentation

Management & Maintenance • • • Organization: LAN administrator Management: policies and procedures Documentation Hardware and software control Change control Back up (hardware and software) Security (logical and physical) Application (compatibility, integrity, & efficiency) Performance monitoring

Security • • • Password Sign off Encryption Backup Downloading Viruses protection Dial-up access

Security • • • Password Sign off Encryption Backup Downloading Viruses protection Dial-up access Legal software Internal and external auditing Written policy and procedure

Assignment • Review chapter 5 • Read chapter 6

Assignment • Review chapter 5 • Read chapter 6