Professional Documents
Culture Documents
Laboratory
LAN & INTERNET
Volume 1/3
Theory
CONTENTS
6. INTERNATIONAL STANDARDS 50
6.1 NETWORK ARCHITECTURE 50
6.2 ISO/OSI MODEL 50
6.1.2 OSI frame construction
6.3 LAN IEEE MODEL 54
6.3.1 Level 2 – LLC sub-level (Logical Link Control)
6.3.2 Level 2 – MAC sub-level (Media Access Control)
6.3.3 Level 1 - Physical
6.4 REFERENCE MODELS 60
6.4.1 IEEE 802
6.4.2 IEEE 802.3
6.4.3 IEEE 802.5
6.4.4 FDDI (Fiber Distributed Data Interface)
6.4.5 ATM (Asynchronous Transfer Mode)
6.5 QUESTIONS 67
Many definitions of local area network have been attempted. The IEEE
(Institute of Electrical and Electronics Engineers, body that has
developed an important packet of standards for local area networks)
defines the local area network as ...
In a local area network, the equipment are connected via a private line,
which can be a dedicated cable or another communication support.
-1-
1. INTRODUCTION to LOCAL AREA NETWORKS
-2-
1. INTRODUCTION to LOCAL AREA NETWORKS
The network technology is the set of systems and physical means which
main purpose is the information exchange between different users. It is
generally composed of different kinds of physical transmission means or
cabling systems, as well as of the network interface cards (NIC) that
equip the systems of the local area network.
The most common cabling topologies consist in the linear bus and tree
structures.
The bus structures can be used to carry out networks provided with a
reduced number of users (usually some tens) and are characterized by
low cost and easily achievable cabling. On the other hand, there can be
problems in case the trunk should be damaged or cut off, as the
functionality of all users connected to it can be compromised.
The tree structures need devices that can section the physical trunks,
obtaining branches which can be structured in a logical way up to reach
the single users. These devices can be simple passive repeaters or
intelligent systems, which can classify the information along the single
trunk and route them toward the single user, in this way optimizing the
network traffic. The most tangible advantages are the capacity to detect
and insulate any fault or malfunction on the trunks or the workstations,
and the facility in the expansion or reduction of the total structure.
-3-
1. INTRODUCTION to LOCAL AREA NETWORKS
-4-
1. INTRODUCTION to LOCAL AREA NETWORKS
The most used transmission means in local area networks are the copper
lines (twisted pair or coaxial cable) and the optical fibers. Some
applications use wireless radio or infrared rays transmission, too.
The transmission means and the cabling systems are examined in details
in chapter 2.
A network segment using a bus topology can be carried out with a trunk
of coaxial cable (terminated at the ends), which all users are connected
to. When a station on the network transmits a message, the signal travels
in both directions until it reaches the cable ends. As the signal
propagates on the cable, each connected station can examine the data.
The main advantage of the bus topology is its simplicity. The stations
can be connected simply by setting a cable from a station to the other.
According to the electrical characteristics of a bus, each component on a
bus network can affect the whole network. A breakage on the cable or a
malfunctioning node can make the whole network unavailable. Just
-5-
1. INTRODUCTION to LOCAL AREA NETWORKS
In the tree, the routing problems are simple as there is a single path to
connect two separate users. On the other side, the malfunction of a trunk
between two stars insulates their connection.
-6-
1. INTRODUCTION to LOCAL AREA NETWORKS
A one-way ring is created where each system has the repetition function
of the message to be transmitted, too. When the system sends a message,
it inserts it into the ring and sends it to the next system. All systems
repeat the message up to the destination system; this one, repeats the
message, receives it and changes a bit in the queue of the same message
to confirm the reception.
As concerns the physical cabling, the ring topology is not very reliable.
A fault or a system off is sufficient to block the whole network. For this
reason, cabling are used for ring networks enabling the exclusion of the
malfunctioning transmission means from the network (see chap.9,
Token-Ring networks).
-7-
1. INTRODUCTION to LOCAL AREA NETWORKS
-8-
1. INTRODUCTION to LOCAL AREA NETWORKS
1.5 QUESTIONS
1 4-10-16-32 Mb/s
2 4-10-16-100 Kb/s
3 2-4-10 Mb/s
4 4-10-16-100 Mb/s
5 4-10-16-100 MHz
-9-
2. TRANSMISSION MEANS and CABLING SYSTEMS
The basic element of the multipair cable is the Twisted Pair. The twisted
pair consists of two insulated copper wires wound one around the other
(fig.2.1). The wires pair twisting (pair spiral winding) reduces the
electromagnetic interference which the cable is subjected to during the
use. Inside the coaxial cable there can be more pairs (4, 25, 50, etc.),
each with different pair twisting to reduce the effects of cross-talk.
AWG The twisted pair more used in local area networks installation nowadays
has a conductor diameter of 24AWG having a characteristic nominal
impedance of 100 Ohm. AWG (American Wire Gauge) is a
measurement unit for the diameter used very much in local area
networks cables. The diameters and the section of the most used twisted
pairs are reported in the following table.
- 10 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
- 11 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
The coaxial cable (fig.2.5) consists of a copper core (hot pole) covered
with insulating material (dielectric). This is surrounded by a second
layer of conductor material (shield), that can be a braid or a solid
element. An insulating protective sheath contains the whole. The coaxial
cable is less subject to interference and cross-talk in respect to a twisted
pair, and, besides, it can be more easily used for high speed
transmissions. The characteristic impedance of the coaxial cable
depends on the ratio of the screen sections in respect to the central
conductor, and the physical characteristics of the dielectric.
The coaxial cables used the most for local area networks are:
- 12 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
The optical fibers can be used to carry data signals as light pulses. An
optical fiber consists of a cylinder made with an extremely thin glass,
called Core, surrounded by a concentric layer of glass called (Cladding).
The light propagates inside the Core by next reflections (fig.2.6), which
occur when the light ray meets the Cladding. There is reflection because
the refraction index of the Cladding (n2) is lower than the Core one (n1).
The actual optical conductor, i.e. the structure consisting of Core and
Cladding, is also called naked fiber (fig.2.7). As this structure is
mechanically too fragile, it is strengthened by many protection layers,
obtaining the single-fiber optical cable. Setting more single-fiber cables
together you obtain multiple optical cables (fig.2.8).
Fig.2.6
Light propagation
in the fiber
Fig.2.7
Optical fiber structure
with layers
Fig.2.8
Multiple optical
cable structure
- 13 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
The disadvantages are the high cost of the cabling system and the
network accessory elements. Considering the pros and cons, we can say
that the fibers can be used for the construction of backbones or main
trunks.
The optical fibers can be divided into three categories, as function of the
light propagation mode (fig.2.10):
• Step-Index and Graded-Index Multimode: these are the optical fibers
with more propagation modes. The most used fiber in local area
networks is the Graded-Index 62.5/125, where the digits represent the
Core (62.5µm) and the Cladding diameter (125µm). In multimode
fibers, the light rays propagate in different modes through paths of
different length with different propagation times. This causes an
enlargement of the received optical pulse, with consequent reduction
of the maximum transmission time. The effect of the received pulse
enlargement is knows as Modal dispersion (fig.2.9). The Modal
Dispersion is affected by the profile of the refraction index inside the
Core. In Step-Index fibers (high Modal Dispersion) the refraction
index has a step variation, in the Graded-Index fibers (average
Modal Dispersion) instead it changes gradually.
• Singlemode: these are fibers which core is reduced to 8–10µm, and
the fiber behaves as an optical guide having a single propagation
mode. This greatly reduces the Modal Dispersion and enables very
high transmission speeds (tens of Gb/s). The most used singlemode
fiber is the 10/125.
The optical resources normally used for singlemode fibers are Leds
operating at wave-lengths of 850nm (called also Ia Window) or 1330 nm
(IIa Window). Photodiodes and PIN photodiodes are used as optical
detectors.
In singlemode fibers, laser diodes are used as resources (at 1330 or 1550
nm, IInd or IIIrd Window), and Avalanche Photodiodes as detectors.
- 14 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
- 15 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
2.4 WIRELESS
The wireless transmission enables to change segments for connection
via cable where there are difficulties of physical connection.
Electromagnetic waves (radio transmission) or signals in the infrared
range are used.
The pass band of these systems is usually lower than cabled systems.
- 16 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
- 17 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
Fig.2.12
Model
EIA/TIA 568
- 18 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
- 19 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
• Patch Cord: patch cords for copper cables or for optical fibers.
- 20 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
Fig.2.14
Telecommunication closet
Fig.2.15
Patch Panels
Fig.2.16
Telecommunication Outlets
- 21 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
The characteristics required for the coaxial cables are those specified by
the standards IEEE 802.3, 10Base5 and 10Base2 (see next chapters).
Each single conductor of the 4-pair UTP cables is 24AWG. They must
satisfy at least the characteristics of the category 3. The pairs are
identified by the following colors:
• Pair 1: white-blue (W-BL) and blue (BL)
• Pair 2: white-orange (W-O) and orange (O)
• Pair 3: white-green (W-G) and green (G)
• Pair 4: white-brown (W-BR) and brown (BR).
The multipair UTP cables contain one or more groups each with 25
pairs, the conductors have a dimension of 24AWG, but 22AWG-
conductors are accepted, too, only if respecting the minimum required
electrical characteristics.
The Backbones are the cabling carrier elements and can interconnect,
with star hierarchical topology:
• different buildings to the star center of the interbuilding
(Interbuilding Backbone)
• Different floor closets to the building closet (Interbuilding
Backbone).
- 22 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
The outlet related to the single work area must contain at least two
cables, of which at least one must be 4-pair UTP, of category 3 or
superior. The UTP cable must be addressed to an outlet RJ45 (fig.2.18).
The second cable must be any of the listed cables allowed for horizontal
cabling.
- 23 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
4005/1-300
indicating a cable with number 4005 and containing the pairs from 1 to
300.
Each work area and the related cable are identified by a label, usually
composed of 8-10 characters that may include numbers or alphabetical
letters. The numbering must contain:
• the reference to the floor of the building where the work area is
located
• the reference to the telecommunication closet to which the work area
is connected
• a field of three characters identifying the same work area.
EVB02-16G
2.6.7 Documents
- 24 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
fig.2.18
RJ45 connector
a) female
b) male
fig.2.19
IDC connector
fig.2.20
a) ST connector
b) SC connector
- 25 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
2.7 QUESTIONS
Q1 With reference to the transmission means, what does the twisted pair
consist of?
1 Impedance
2 Length
3 Cost
4 Diameter
1 Easy connection
2 Pass band
3 Weight
4 Cost
1 E.N.E.L.
2 ANSI
3 EIA
4 ASCII
- 26 -
2. TRANSMISSION MEANS and CABLING SYSTEMS
Q6 What is a topology ?
- 27 -
3. NETWORK ACTIVE COMPONENTS
The card must be compatible to the existent cabling. The Ethernet cards
have usually a BNC connector (for RG58 coaxial cable - Thin Ethernet)
or a RJ45 connector (UTP cable), and almost all have a port called AUI
(Attachment Unit Interface) for the connection to the Ethernet
transceiver type Thick (yellow cable). The cards provided with more
connectors are called combo.
- 28 -
3. NETWORK ACTIVE COMPONENTS
The Hardware configuration of the NIC card, i.e. the choice the address
and the IRQ line, must always be carried out before installing the
software driver. The card can be configured in one of the following
ways:
• via jumpers
• with configuration programs memorizing in EEPROM (of the NIC
card) the user’s setting.
The devices in a NIC card are many. We report the main ones:
• Microprocessor: it synchronizes and controls the operations
developed by the communication controller, optimizing the data
flows of the buffers of the local RAM and the system bus. Actually
there are cards integrating microprocessor and LAN controller into a
single integrated circuit, in this way reducing the costs
• Network Controller: it controls the whole communication from and
toward the card, it constitutes the data packets and calculates the
CRC, it recovers errors and activates eventual retry procedures
• Local RAM: it represents the card transmission and reception
buffers. Usually it ranges between 16 and 64KB
• EEPROM: it memorizes the user configurations also without power
supply voltage
• Transceiver: it is the matching circuit for input and output analog
signals from the card, toward the transmission mean. It is chosen by
the manufacturer according to the network connection supported by
the card (10Base2, 10BaseT, 100BaseT, etc). In the 10Base5
connections, the Transceiver is external and is connected to the card
via a cable which maximum length is 50m called drop-cable or cable
AUI/AUI. The purpose of the last is to power the external transceiver
(see next chapter).
Fig.3.1
Network card
- 29 -
3. NETWORK ACTIVE COMPONENTS
3.2 TRANSCEIVER
Fig.3.2
10Base5
Transceiver
Fig.3.3
Transceivers
a) AUI-10Base2
b) AUI-10BaseT
c) AUI-10BaseF
- 30 -
3. NETWORK ACTIVE COMPONENTS
3.3 HUB
The star topology of the local area networks includes the use of
concentrators (Hubs), which enable more equipment to be connected to
the cabling system of the LAN across a single concentration point. This
device usually has an input port selectable between coaxial cable,
optical fiber or twisted pair, and a particular number of equal ports (4, 8
16, 32, etc.). The use of the Hub enables to create star topologies, which
center is the same Hub. Each port can be active or sectioned as function
of the state of the communication channel. This state is displayed via
single light indicators for the ports. In some models, there are collision
and traffic indicators and speed selectors. Note that each port of the Hub
can be used for a point-to-point connection with the PC/workstation or a
possible network Server.
Fig.3.4
Use of the Hub
Fig.3.5
Hub
- 31 -
3. NETWORK ACTIVE COMPONENTS
3.4 REPEATER
The main characteristic of a Repeater lies in the fact that the signals
generated on the first segment of cable are propagated to the second
segment in a transparent way, without any filtering. They are simple to
use and have a contained cost. To use a Repeater, both network
segments must be the same kind. All stations must have single
addresses.
Fig.3.6
Bus topology
with more segments
connected via
repeater
Fig.3.7
The Repeater
operates
at Physical level
- 32 -
3. NETWORK ACTIVE COMPONENTS
3.5 BRIDGE
The Bridge enables to connect two separate local area networks and
enables the users of each network to access the resources of the other,
similarly to the Repeater but in a more intelligent way.
Fig.3.8
More networks
connected via
Bridge
Fig.3.9
The Bridge
operates
at Data Link
level
- 33 -
3. NETWORK ACTIVE COMPONENTS
3.6 SWITCH
A Switch usually operates at level 2 (Data Link) of the OSI model (see
chapt.6), and is transparent to all protocols operating at higher levels.
- 34 -
3. NETWORK ACTIVE COMPONENTS
3.7 ROUTER
The Router can advantageously be used when there are separate groups
organized according to the function (administration, storehouse,
production, etc.) or gravitating on separate LANs, or when the LAN are
connected across geographical networks (WAN). In these situations, the
Router controls the traffic packet in a group or from a group to the other,
preventing interference between the packets which destination belongs
to the same group and those of another one, and at the same time they
let those addressed to different groups pass.
Fig.3.11
Networks
connected via
Router
Fig.3.12
The Router
operates
at network
level
- 35 -
3. NETWORK ACTIVE COMPONENTS
3.8 QUESTIONS
1 Router
2 Repeater
3 Hub
4 Bridge
5 Switch
- 36 -
4. SIGNAL CODING TECHNIQUES
To carry out a local area network you must physically connect the
processors and the equipment via proper transmission means. The
digital transmission mainly requires the coding of the information (the
bits) into a format that can be carried by the transmission mean, so that
the same information can be properly reproduced in the reception
equipment.
In the digital systems, the data bits are represented by electrical signals.
The simplest form uses two levels to represent the binary digits 0 and 1,
e.g. +5 for 1 and 0V for 0. Usually a level is kept fixed for the duration
of a bit, and so in this case we speak of NRZ format (Non Return-to-
Zero) (fig.4.1), too.
Before transmission, the data provided by the source are processed (or
coded), in order to generate a signal with the following main requisites:
• it has a spectrum matching the transmission channel, to exploit the
pass band of the same channel at best
• it facilitates the extraction of the reception bit timing (clock), to
prevent the proper reading of the received bits
• it reduces the effects of cross-talk on the transmission cables nearby
• it minimizes the electromagnet emissions.
This chapter describes the main signal coding techniques used in Local
Area Networks.
- 37 -
4. SIGNAL CODING TECHNIQUES
Fig.4.2
Spectrum of
NRZ and
Manchester
signal
- 38 -
4. SIGNAL CODING TECHNIQUES
In some applications, the data are transmitted in NRZ format, but the
sequence of bits to be transmitted is coded before, always to guarantee a
particular minimum number of transitions on the physical mean.
Examples of these coding are 4B5B and the 5B6B, described after.
The NRZI coding (together with the 4B5B) is used for FDDI networks
at 125 Mb/s.
The NRZI coding inserts a transition (in the center of the bit interval) for
the bits “1”, and no transition for the bits “0” (fig.4.1). The transition
can be from high to low level or from low to high level according to the
state of the signal in correspondence of the last bit. The coded signal
shows transitions in the center of the bit interval only if the datum is
“1”.
The NRZI is also known as NRZ Differential, and the coding law can be
explained as follows: the coder inverts the output bit (n+1) if the input
bit (n) is "1", it keeps the output the same if the input bit (n) is "0". In
- 39 -
4. SIGNAL CODING TECHNIQUES
other words, the bit “1” is coded as variation of the output bit, the bit
“0” as no variation.
One of the restrictions of Manchester coding is that the signal for the bit
1 is exactly the reverse of the signal for the 0. In many cases, the
transmission mean can make difficult or impossible the determination of
the absolute polarity or of an absolute phase reference. Consider, e.g.
the wires inversion in a twisted pair. In these cases all the 1 transmitted
would be received as 0 , and the 0 as 1.
- 40 -
4. SIGNAL CODING TECHNIQUES
The MLT-3 coding produces a signal at three voltage levels (+, 0, -),
instead of the two NRZ levels. The coding law is pointed out in fig.4.3,
where you can see there is always a transition at the center of bit 1, and
no transition for the bits 0. The transitions for the bits 1 go in the
following order: 0 → + , + → 0 , 0 → - , - → 0 , etc.
Note that, in the worst case of transmission of all bits “1”, the main
frequency of the transmitted signal reduced to ¼ of the bit speed.
The MLT-3 coding is used by FDDI TP-PMD and Ethernet IEEE 802.3
100BaseTX, two standards for 100-Mb/s transmissions on copper
cables. For FDDI and Ethernet, the transmission speed on the
transmission mean is 125 Mb/s, and so the main frequency is 31.25
MHz. The difference of 25 Mb/s between the nominal speed at Data
Link level (100 Mb/s) the physical level speed (125 Mb/s) is due to the
fact that the absence of transitions for sequences of bits 0 forces, in this
case, too, a pre-coding type 4B5B of the sequences to be transmitted
(fig.4.4). MLT-3 has been also proposed for the ATM at 155 Mb/s on
copper, with 4B5B coding, so the frequency of the fundamental is
48.4375 MHz.
- 41 -
4. SIGNAL CODING TECHNIQUES
For all coding techniques analyzed, except the Manchester one, there are
data sequences which do no generate transition. To guarantee the
transmission of a number of transitions sufficient to enable the receiver
synchronization, it is necessary to pre-code the data to be transmitted,
eventually enlarging the sequence. In local area networks, this function
is developed by two codes:
• the 4B5B code (4_Binary-to-5_Binary), coding each possible
sequence of four bits into five bits and is used together with NRZI or
MLT-3 (fig.4.4)
• the 5B6B code (5_Binary-to-6_Binary), transforming the sets of five
bits into sequences of six and is used in the standard 802.12 together
with NRZ coding (fig.4.5).
- 42 -
4. SIGNAL CODING TECHNIQUES
4.7 QUESTIONS
Q3 How are the signal bits coded according to the NRZ standard?
1 a period of the direct clock signal for the zero, inverted for one
2 a period of the direct clock signal for one, inverted for the zero
3 two periods of the clock signals if the bit keeps constant, a period of
the clock signal if the bit changes
4 two periods of the clock signal if the bit changes, a period of the
clock signal if the bit keeps constant
1 Three
2 Two
3 One
4 Four
- 43 -
4. SIGNAL CODING TECHNIQUES
- 44 -
5. ACCESSES CONTROL TECHNIQUES
One of the main aspects characterizing a LAN is the access method, i.e.
the basic modes in which a station connected to the network can access
the transmission mean, transmit the available data and give the physical
line to another station.
Integrating parts of the access method are also the other characteristics,
such as:
• the time in which a station can appropriate the transmission mean for
its exclusive use
• the time after which it is forced to disconnect and give this right to the
other stations
• the modes enabling to prevent more stations to simultaneously
transmit the available data (making them mutually incomprehensible
to their destinations).
There are different access methods, which can be inserted into one of the
following categories:
- 45 -
5. ACCESSES CONTROL TECHNIQUES
In bus, star and tree topology networks, the most used access control
methods is the CSMA/CD (Carrier Sense Multiple Access/Collision
Detection), included in the family of non deterministic access methods.
Fig.5.1
CSMA/CD
transmission
without collisions
- 46 -
5. ACCESSES CONTROL TECHNIQUES
Fig.5.2
CSMA/CD
transmission
with collisions
Fig.5.3
Token Passing
Fig.5.4
Token Bus
- 47 -
5. ACCESSES CONTROL TECHNIQUES
5.3 TOKEN-PASSING
In ring topology networks, the most used access control method is the
Token-Passing, included in the family of deterministic access modes.
When the message reaches again the system it comes from, this same
system provides to:
• remove the message
• mark the token free
• transmit the Token to the next system.
The Token starts traveling through the ring until another one needs to
transmit. With this method the receiving station has the possibility to
transmit messages within a particular period of time, after which it
transmits the Token to the next station. If this one has no message to
transmit, it passes the Token immediately. The most famous networks
standards implementing this access method are the Token-
Ring/IEEE802.5 and the FDDI (see chapt.9.4).
- 48 -
5. ACCESSES CONTROL TECHNIQUES
5.5 QUESTIONS
1 the station emitting the stronger signal will force the other to
retransmit the packet
2 the user provided with more privileges will have the line first
3 the stations will generate a casual pause after they retry transmission
4 the stations will be excluded by the networks after three attempts
1 Star
2 Bus
3 Ring
4 Braid
- 49 -
6. INTERNATIONAL STANDARDS
6. INTERNATIONAL STANDARDS
- 50 -
6. INTERNATIONAL STANDARDS
Fig.6.1
Levels of the OSI model
- 51 -
6. INTERNATIONAL STANDARDS
Refer to fig.6.2. When the user A must send information to the user B, the
data cross different levels of the model. Each level inserts a specific
header containing service information for the homologous level, and
generates a specific Data Unit of the same level (Protocol Data Unit –
PDU). The conversation between homologous levels is defined by
specific protocols for each level. Once the header is inserted, the level
passes the PDU to the lower level and so on to the physical level, which
purpose is to send the bits to the remote system.
Once at destination, the frame will cross the different levels, and leave the
part addressed to them.
- 52 -
6. INTERNATIONAL STANDARDS
The IEEE decided to standardize the networks when the first Ethernet and
Token-Ring LAN appeared. Different Committees have been established,
collected in the project IEEE 802. These Committees are:
The project IEEE 802 was developed in line with the OSI model, and
describes the standards specific for the LAN related to the first 2 levels
(fig.6.3).
For the LAN applications, the Level 2 of the OSI (Data Link) is divided
into 2 sublevels (fig.6.4):
• LLC (Logical Link Control), enabling the access to the upper level
services (Level 3, Network) independently from the access types of the
same network, or the used physical support. The sub-level LLC is
defined by the standard IEEE 802.2
• MAC (Media Access Control), controlling the access to the
transmission mean.
The sub-level LLC is common to all LANs, while the MAC is peculiar of
each LAN, as well as the physical level it is strictly associated to. The
sub-level LLC is the unified interface toward the Network level and is
described in the proper standard IEEE 802.2, while the different MAC are
described in the specific standards of each LAN (e.g. the MAC
CSMA/CD is described by the standard IEEE 802.3).
- 53 -
6. INTERNATIONAL STANDARDS
7 Application
6 Introduction
5 Session
4 Transport
3 Network
1 802 Physical
Level 3
Network
802.2
Level 2 Logical Link Control LLC
Data Link
MAC
802.12
802.3 802.5 FDDI 802.11 802.3u
Level 1
Physical CSMA/CD TOKEN FDDI Wireless AnyLAN
RING 100Base-T
- 54 -
6. INTERNATIONAL STANDARDS
The protocol used for the LLC sublevel belongs to the HDLC family, of
which it is considered a variation for the LAN. The structure for the
LLC Data Units (PDU, Protocol Data Unit) is similar to the one of the
HDLC frame. It includes the following ranges (fig.6.6):
• Destination Service Access Point (DSAP): 1 octect, it indicates the
protocol of level 3 to which you pass the packet
• Source Service Access Point (SSAP): 1 octect, it indicates the
protocol of level 3 from which the packet comes
• Control: 1 octect per Unnumbered frames, 2 octects per Information
and Supervisory frames
• Information: N octects, it contains the PDU of level 3
- 55 -
6. INTERNATIONAL STANDARDS
LLC addresses The LLC purpose is to provide a standard support to the coexistence of
and the SNAP- more upper level protocols (e.g. TCP/IP, X.25, DECnet, or others) on
PDU the same LAN, too. The addresses (of the services) contained in the
DSAP and SSAP ranges are used to distinguish the protocol of Level 3
which the LLC frame is supported on (fig.6.7).
As the 8 bits of the address field are sufficient to identify all protocols of
Level 3, the ISO has given an official coding only to those protocols
approved by a standardization body. E.g, the value FEH indicates the
protocol ISO 8473 (Internet Protocol connectionless of OSI).
When the DSAP and SSAP range of the LLC-PDU takes a value AAH
there is a particular LLC frame, called SNAP (Sub Network Access
Protocol) (fig.6.8). The SNAP frames are used to contain the PDU of
Level 3 generated by proprietary protocols, i.e. not recognized by the
ISO. In this case, the Control range indicates an HDLC frame of
Unnumbered kind (the first two bits are 11), and is followed by a
Protocol Identifier range composed by two parts:
• The first 3 bytes contain the OUI (Organization Unique Identifier) of
the organization that has proposed the protocol. E.g.: 00-AA-
00=Intel; 08-00-07=Apple)
• the second 2 bytes identify the protocol inside the organization. If the
first 3 bytes (OUI) are zero, the coding used for this range is the one
defined by the Protocol Type of Ethernet 2.0. Example:
− Protocol Identifier = 08 00 2B (OUI) 80 3C (Protocol Type)
- 56 -
6. INTERNATIONAL STANDARDS
The LLC The sub-level LLC offers the following services at Network level:
services • Unacknowledged Connectionless Service (LLC Type 1): the data
transfer does not set up virtual logic circuits between source and
destination before carrying out the transmission, and needs no
confirmation of the sent packets
• Connection Oriented Service (LLC Type 2): the data transfer sets
up virtual logic circuits between source and destination before
carrying out the transmission, and needs confirmation of the sent
packets
• Semireliable Service (LLC Type 3): the data transfer does not set
up virtual logic circuits between source and destination before
carrying out the transmission, but needs confirmation of the sent
packets
- 57 -
6. INTERNATIONAL STANDARDS
The solution of the second problem implies the presence of MAC levels
addresses (so in the MAC-PDU) transforming broadcast transmissions
into:
• point-to-point transmissions (Unicast): if the destination address
indicates a single system
• point-to-group transmissions (Multicast): if the destination address
indicates a group of systems
• actually broadcast transmissions: if the destination address
indicates all systems.
Information
Destination Source
LLC-PDU FCS
Address Address
The MAC The main function of the MAC address is to univocally identify the
addresses system on the LAN. The MAC addresses are univocal at world level,
and are written permanently in a ROM of the NIC card by the
manufacturer of the same card. They are composed of 2 parts of 3 bytes
each (fig.6.10):
• 3 most significant bytes: lot of addresses assigned by the IEEE to the
card manufacturer (OUI, Organization Unique Identifier)
• 3 less significant bytes, progressive production numbering, given by
the card manufacturer (Vendor).
E.g., a card with MAC 00-AA-00-2C-01-70H address is a card produced
by the Intel, as 00-AA-00H is the OUI of this firm.
3 bytes 3 bytes
Vendor
OUI Assigned
- 58 -
6. INTERNATIONAL STANDARDS
The physical level provides the services to those users resident on the
MAC sub-level. Figure 6.11 shows some of the functions included in
the OSI model for the Level 1. The PDU exchanged with the physical
level are signals representing the single bits composing a MAC frame.
This level takes shape in the physical transmission of the signals on the
transmission mean. It defines the procedures for carrying out the
connections to the transmission mean, and for the signals transmission
and reception. The specifications of the physical level include the
description of the kind of cabling, the outlets and the connectors to be
used, the characteristics of the signals to be exchanged.
- 59 -
6. INTERNATIONAL STANDARDS
As mentioned in the last chapter, the IEEE has divided the networks
standardization into Committees. Hereafter follows a short description
of the most used IEEE standards, such as the IEEE802, 802.3 and 802.5
(these standards will be treated exhaustively in the next chapters). Other
non IEEE standards will be described, such as the FDDI and the ATM.
IEEE 802.3 includes a bus logic topology, with bus, star or tree cabling.
The transmission speed is 10 or 100 Mb/s and the maximum throughput
is about 4 or 40 Mb/s.
IEEE 802.5 is the evolution of the Token Ring local area network
suggested by IBM in alternative to Ethernet. The standard includes a
ring topology, with star or double ring cabling. The arbitrage of the
transmission channel is regulated by the token and, so, the protocol is
deterministic, with stand-by time further restricted. The transmission
speed is 4 or 16 Mb/s and the maximum throughput is 3 or 12 Mb/s.
- 60 -
6. INTERNATIONAL STANDARDS
The station interconnection to the FDDI ring can be carried out mainly
in two modes (fig.6.11).
• a first mode establishes that the station connects to the main ring with
a single pair of optical fibers, of which one carries the signal in
reception and the other in transmission. A network station using this
kind of connection will be identified as station type SAS (Single
Attachment Station)
• a second mode establishes that the station connects to the main ring
with two pairs of optical fibers, of which a pair is normally used to
transport the signal in transmission/reception, and the other is
available for back-up functions in case of interruption on normally
used optical fibers. A network station using this kind of connection
will be identified as station type DAS (Dual Attachment Station).
- 61 -
6. INTERNATIONAL STANDARDS
The ATM network consists in a set of switching nodes (or switches) and
in a set of terminal nodes (fig.6.12). The interface between a node and a
terminal is called User-to-Network Interface (UNI), while the one
between node and node is called Network-to-Network Interface (NNI).
- 62 -
6. INTERNATIONAL STANDARDS
← 53 bytes →
Header Payload
← 5 bytes → ← 48 bytes →
HEC HEC
- 63 -
6. INTERNATIONAL STANDARDS
- 64 -
6. INTERNATIONAL STANDARDS
- 65 -
6. INTERNATIONAL STANDARDS
6.5 QUESTIONS
1 Two
2 Four
3 Seven
4 Nine7
1 Token-Ring
2 Ethernet
3 Optical fiber
4 Wireless
- 66 -
6. INTERNATIONAL STANDARDS
Q6 What topologies and speeds are included in the standard IEEE 802.5?
- 67 -
7. IEEE 802.3 - ETHERNET
In the first 70s, three industries (Digital, Intel and Xerox) created the
pull of firms DIX for development of a local area network. At the end of
the 70s, a first version of Ethernet was created, the version 1.0 operating
at 10 Mb/s. In 1982, DIX issued the specifications of the Ethernet
version 2.0, which was going to become the actual local area network.
In parallel to the pool DIX, IEEE started the development of the
standard 802.3. This is based on Ethernet, but differs for some logical
characteristics referred to the Link level and for some electronic ones
referred to the physical level.
The reduced costs of the equipment and the great ease to design and
carry out LAN of small/average dimensions have been the key of the
success of Ethernet, and although all equipment on the market fit the
specifications 802.3, they are often identified with the original name
Ethernet.
- 68 -
7. IEEE 802.3 - ETHERNET
- 69 -
7. IEEE 802.3 - ETHERNET
The Interface 802.3 (or Controller) is the interface section between the
inner bus of the network system and the transceiver. The interface
develops the following functions (fig.7.3):
• data encapsulation and de-capsulation
• control of the connection to the transmission mean
• bit Manchester coding and decoding.
The Drop cable, called also transceiver or AUI cable (Attachment Unit
Interface) interconnects the transceiver to an Ethernet interface or to
another repeater. It is a shielded cable with 15-pole connector and
balanced signal transmission (see fig.7.1).
The Repeater is used to extend the transmission mean length and carry
out star or tree topologies. The active element interconnecting two
coaxial cables or others transmission means is defined Repeater. In case
of Thick cable, the Repeater needs two transceivers with AUI cable to
connect the two segments. The main functions of an Ethernet repeater
are:
• to receive the strings of bits received on a segment and to transmits
them to other segments by regenerating the signal
• to decode (Manchester) the strings of received bits on a port, and re-
code them before re-transmission to the other ports
- 70 -
7. IEEE 802.3 - ETHERNET
The Ethernet and 802.3 networks are created with a bus topology based
on coaxial cable, with transmission speed of 10 Mb/s, and involve the
level 1 and the sub-level MAC of level 2 on the OSI battery (fig.7.4).
Unlike the network IEEE802.3, where the Data Link level is divided
into sub-levels MAC and LLC (802.2), in the Ethernet network there
isn’t the LLC, and all functions of the Data Link level are developed by
the MAC level.
Level 3: Network
802.2
Level 2 Logical Link Control LLC
Data Link
MAC
802.12
Ethernet 802.3 802.5 802.11
FDDI 802.3u
The method used to split the use of the transmission mean between the
network stations is the CSMA/CD (Carrier Sense Multiple Access /
Collision Detection), identical in Ethernet and in 802.3. Is has been
designed to use the coaxial cable as transmission mean, but it hasn’t
been changed even after other transmission means - such as the optical
fiber and the twisted pair - have been introduced.
- 71 -
7. IEEE 802.3 – ETHERNET
- 72 -
7. IEEE 802.3 – ETHERNET
So, a transmission (i.e. a single frame) must last at least the time
necessary for a bit to propagate from one end to the other of the network
(from A to B), and vice versa (from B to A). This time is called Round
Trip Delay. In case of Ethernet and IEEE 802.3 there is a:
• transmission speed = 10Mb/s
• minimum frame duration = 64 bit of preamble + 512 frame bits =
576 bits (see chapt.7.4), which corresponds to a minimum duration of
57.6 µs.
The CSMA/CD access method and the sub-level MAC are responsible
for the following operations:
• packets transmission: during this phase the MAC accepts a packet
with upper level and provides a serial string of bits to the physical
level for their transmission
• packet reception: the MAC receives a serial string of bits from the
physical level and provides a packet to the upper level. If the packet
has a different address from the one of the receiver, (or it is not a
broadcast packet) it is rejected
• transmission of a packet with busy channel in deferred mode: the
MAC checks the errors in the packets comparing them to the value
contained in the FCS range
• the MAC guarantees there is minimum lapse of time called IGP (Inter
Packet Gap) between two consecutive packets
• the MAC interrupts the transmission when it detects a collision and
transmits a "jamming" message after a collision
• the MAC checks the minimum length of the packet (64 byte)
• the preamble is generated in transmission and it is removed in
reception.
- 73 -
7. IEEE 802.3 – ETHERNET
Fig.7.5
Transmission
without collisions
Fig.7.6
Transmission
with collisions
Fig.7.7
Round
Trip
Delay
- 74 -
7. IEEE 802.3 – ETHERNET
The Ethernet packet and the packet 802.3 slightly differ between them
(fig.7.8). The packets (excluded the Preamble and SFD ranges) have a
variable length between 64 and 1518 bytes (or octects), corresponding to
512 bit (minimum) and 12144 bit (maximum).
Hereafter follow the description of the different ranges, and the main
differences between Ethernet and 802.3:
Note there isn’t a packet end signaler. The separation is carried out by
inserting an Inter Packet Gap between two consecutive packets.
- 75 -
7. IEEE 802.3 – ETHERNET
IEEE 802.3
Ethernet
- 76 -
7. IEEE 802.3 –ETHERNET
10BaseT
T = twisted pair
transmission mean 2 = (thin) cable for max.
transmission technique distance of 200 m
speed 5 = (thick) cable for max.
distance of 500 m
F = optical fiber
- 77 -
7. IEEE 802.3 –ETHERNET
7.5.1 10Base5
- 78 -
7. IEEE 802.3 –ETHERNET
7.5.2 10Base2
- 79 -
7. IEEE 802.3 –ETHERNET
7.5.3 10BaseT
The specifications of this standard concern the characteristics of the
MAU (Transceiver) and the transmission means for 10-Mb/s speeds,
based on a 100m Twisted Pair segment.
fig.7.13
Connector RJ45
- 80 -
7. IEEE 802.3 –ETHERNET
- 81 -
7. IEEE 802.3 –ETHERNET
7.6 QUESTIONS
1 500 m
2 100 m
3 50 m
4 25 m
1 5
2 100
3 30
4 20
1 from 1 to 64 octects
2 from 32 to 32768 octects
3 from 64 to 1518 octects
4 from 128 to 256 octects
5 maximum of 64 octects
1 5 octects
2 6 octects
3 7 octects
4 8 octects
5 6 bits
- 82 -
8. IEEE 802.3u – FAST ETHERNET
The network 100BaseT (or IEEE 802.3u) is currently the only LAN
which can be defined "Ethernet at 100 Mb/s", as it keeps the classic
algorithm CSMA/CD implemented on 10BaseT as it is, but operating at
100 Mb/s.
The structure and the minimum length of the MAC frame have not been
changed and, so, the Round Trip Delay has been reduced of a factor 10,
determining the extension of the collision domain and so the maximum
dimensions of the network.
100BaseT uses the existing interface of level MAC IEEE 802.3 and
connects it, across a layer called MII (Medium Independent Interface),
to a physical sub-levels family (transmission means) including:
100BaseT4, 100BaseTX and 100BaseFX.
- 83 -
8. IEEE 802.3u – FAST ETHERNET
- 84 -
8. IEEE 802.3u – FAST ETHERNET
8.2 QUESTIONS
1 52 Mb/s
2 2 Gb/s
3 16 Mb/s
4 100 Mb/s
Q2 Which kind of cable has been approved for this kind of network?
1 100 m
2 200 m
3 500 m
4 12 Km
1 Proprietary
2 Token-Ring
3 CSMA/CD
4 Token-Passing
1 One
2 Two
3 Four
4 Eight
1 4B5B
2 8B6T
3 6B8T
4 9B2B
- 85 -
9. IEEE 802.5 – TOKEN RING
The Token-Ring was born in 1976 in the IBM laboratories, as local area
network alternative to Ethernet. It has been created to operate on a star
cabling carried out with STP cable. The first version has a speed of 4
Mb/s. In 1982, the IEEE created the Committee IEEE 802.5 which
purpose was to draw up a Token Ring standard relatively to the physical
level and the sub-level MAC of the Data Link level. The Committee
introduced some changes and introduced a 16-Mb/s version, too, using
passive concentrators and STP cables. In 1993, a proof was issued
offering, in particular, the possibility to use UTP cables.
Fig.9.1
Logical diagram 0
0 of Token-Ring
network
- 86 -
9. IEEE 802.5 – TOKEN RING
The MAC access method is the token. The token is a particular type of
packet flowing across the ring indicating that the ring is free (fig.9.2). A
station wanting to transmit must wait for the token, capture it, mark it
busy and then transmit the message together with the token. The token
continuously flows through the ring although the stations do not have
data to transmit. It is generated at start by the station that has earned the
role of network Active-Monitor and is repeated by all stations. A station
that has captured the token can transmit one or more packets as function
of their length and the Time Holding Token parameter (THT) indicating
the maximum time a station can keep the token.
These three ranges have analogous format and functions for the token
and the frames. The meaning of the different ranges is the following
(fig.9.4-9.5):
• Start of Frame Sequence (SFS): it indicates the start of the frame and
is composed by a Starting Delimiter byte and a second Access
Control byte
• End of Frame Sequence (EFS): it indicates the end of the frame and
is composed by an Ending Delimiter byte and a second Frame Status
byte
• Starting Delimiter (SD): it identifies the starting of the token or the
frame. On this purpose, it contains the bits identified as "J" and "K",
violating the Differential Manchester coding (used in Token-Ring)
- 87 -
9. IEEE 802.5 – TOKEN RING
− existing station, but the frame has not been copied (A=1, C=0)
The actual packet starts after the SFS and can have a length between 21
and 17796 bytes:
• Destination Address (DA): address of the frame destination
• Source Address (SA): address of the frame source
• Routing Information (RI): it contains the routing information for
extended local area networks, according to the IBM proprietary
routing protocol known as Source Route Bridging
• Frame Control (FC): it defines the packet content differentiating it
between MAC frame (for network control) or the LLC/PDU
(information frame)
• Frame Check Sequence (FCS): it contains the CRC frame.
Fig.9.3
Format of the Token
IEEE 802.5
Fig.9.5
Format of the
SD, AC, FC, ED, FS
ranges
- 88 -
9. IEEE 802.5 – TOKEN RING
• the station “A” waits in order to receive the token and captures it (fig.
9.6a). The capture occurs by taking to "1" the "token bit" of the AC
range. This modification transforms the token into a frame and, in
particular, the already transmitted part becomes the SFS
• “A” inhibits the bit repetition circuit between input and output
• “A” transmits the FC, the DA, the SA and eventually RI for the
Bridge Source Routing
• “A” transfers the data into the Info range (fig. 9.6b)
• if the station “A” has other frames to transmit but is has not
overcome the THT, yet, it sets to 1 the intermediate bit of ED and
starts the transmission of the next frame
• when “A” has transmitted the last frame, it sets the intermediate bit
of ED to 0
• if “A” ends the frame transmission before having started to receive
backward from the input, it transmits the filling bits on the output
until it can regenerate the new token
• when “A” receives the SA range of the transmitted frame on the input
port, and detects it as its own, it removes the frame from the ring and
starts to emit the token (fig.9.6c). If the frames transmission is ended,
it immediately generates the new token, on the contrary it waits for
the end of transmission
• all stations that do not have the token (in this case B, C and D) repeat
the bits they receive to the next station. Each station observes the
frames it receives to check if the destination address DA is equal to
the its MAC address. This equality occurs only on the station the
frame is addressed to (the station “C” in this example, fig.9.6d).
Besides, it not only repeats the frame, but it receives and changes the
address recognized bit and the copied bit properly, in the FS range
• at the end of reception of its frames, the station A restores the
repetition of the bits received between the input and output ports.
- 89 -
9. IEEE 802.5 – TOKEN RING
a. Token capture b. transmission c. new Token generation d. frame reception and copy
- 90 -
9. IEEE 802.5 – TOKEN RING
Among the most important control activities, there are the Duplicate
Address Test, Neighbor Notification, Ring Purge Beacon Process
activities.
The Duplicate Address Test is used by all stations each time they enter
the network, to check that no station with the same address is active on
the network. To do so, when entering the network the station sends a
frame with its DA address: if the frame comes without alterations (A=0,
C=0) it means that there is no address duplication.
The Neighbor Notification process is controlled by the Active Monitor.
This process enables each station to know the address of the station
- 91 -
9. IEEE 802.5 – TOKEN RING
Even the Ring Purge process is controlled by the Active Monitor: when
it detects there isn’t the token or there is a too long transmission on the
network, it provides to send a ring purge frame, so that the stations reset
the network interface and start to operate properly, again.
In presence of a fault, though, the ring purge process can fail: in this
case the Beacon Process activates. The fault insulation process is
activated when the Active Monitor election process is activated.
- 92 -
9. IEEE 802.5 – TOKEN RING
- 93 -
9. IEEE 802.5 – TOKEN RING
The MSAU can have a number of ports between eight and twenty and
can operate at 4 and 16 Mb/s. They are divided into three categories:
• Passive: they don’t have automatic bypass mechanisms for the faults
on the Ring-In and Ring-Out ports (backbone). They have insertion
and by-pass detection mechanisms on the lobe ports
• Active: they are equipped with amplification and re-timing circuits
on each port and are used on UTP cables. They control the bypass on
the Ring-In and Ring-Out ports
• Partially active: as the last, but only on the backbone ports.
- 94 -
9. IEEE 802.5 – TOKEN RING
9.7 QUESTIONS
Q1 Which are the transmission means good for the standard IEEE 802.5 ?
1 24 octects
2 3 octects
3 9 octects
4 64 octects
- 95 -
9. IEEE 802.5 – TOKEN RING
1 MLT-3
2 NRZI
3 RZI
4 Differential Manchester
5 Manchester
- 96 -
10. EVOLUTION of LOCAL AREA NETWORKS
The star topology does not bring advantages in terms of LAN total
transmission capacity if the concentrators behave as normal Repeaters or
Hubs (Ethernet, IEEE 802.3) or simple star centers (Token-Ring).
Changing the Hub concentrators with frames switches at the MAC sub-
level (level Data Link), you reach a total transmission capacity higher
than the one of the single connections between a system and the Hub.
Such frames switches are called Switches (fig.10.1-10.2). A Switch has
the capacity to transmit more packets simultaneously if sources and
destinations are different, generating a number of temporary virtual
connections dedicated to the union of two or more interconnected
stations.
- 97 -
10. EVOLUTION of LOCAL AREA NETWORKS
- 98 -
10. EVOLUTION of LOCAL AREA NETWORKS
Each VLAN consists of a set of segments of local area network that can
include a single station or group of stations. The stations belonging to a
VLAN are logically interconnected to Data Link level, although they are
physically connected to different transmission means. The main
advantages that can be obtained from this assignment come from the
traffic insulation of the different work groups at Data Link level. This is
not only important for safety and data privacy reasons, but also because
it allows keeping the multicast/broadcast traffic separated in the
different virtual networks.
Fig.10.3
Virtual networks
on the same Hub
Fig.10.4
Virtual networks
on more inter-
connected Hubs
- 99 -
10. EVOLUTION of LOCAL AREA NETWORKS
10.3 QUESTIONS
1 Pass band
2 Number of ports
3 Supported voltage
4 Switching speed
- 100 -
11. UPPER LEVEL PROTOCOLS
The TCP/IP protocols are based on the packet switched network, and
enable single networks of interconnected systems to appear as a single
network, called "internet", where all systems can freely exchange data
between them as if directly connected.
Today the TCP/IP is used in the whole world on a very large number of
local area networks: first of all InterNet, which nowadays connects
thousands of networks containing millions of systems including
universities, national laboratories and commercial organizations.
The TCP/IP network architecture does not specify the physical levels
and Data Link of the network, but it uses those normally available and
fitting the standards. E.g., in the field of local area networks, it operates
on Ethernet and IEEE 802.3, Token-Ring and IEEE 802.5, FDDI, ATM,
etc.. In the field of geographical networks it operates on PPP, Slip,
ATM, etc.
Fig.11.1
TCP/IP
Architecture
- 101 -
11. UPPER LEVEL PROTOCOLS
The starting bits of the address identify its typology and describe the
way in which the 32 address bits are divided between network (network)
and host range (system). The network range detects the single network
on which the origin and destination system are located, while the host
range identifies a specific system of that network.
Classes The starting bits of the network range specify the address class they
belong to. The most used classes are:
• Class A: it is an address where the first bit is "0". An address in class
A provides 7 bits to identify the physical network and 24 bits to
identify the systems belonging to the network. The addresses of class
A can be detected as the first address range is between 0 and 127
• Class B: it is an address where the first two bits are "10". An address
in class B provides 14 bits to identify the physical network and 16
bits to identify the systems belonging to the network. The addresses
of class A can be detected as the first address range is between 128
and 191
• Class C: it is an address where the first three bits are "110". An
address in class C provides 21 bits to identify the physical network
and 8 bits to identify the systems belonging to the network. The
addresses of class A can be detected as the first address range is
between 192 and 223
• Class D: it is an address where the first four bits are "1110". An
address in class D is used to carry out a particular broadcast shape
(multicast), in which an address identifies a set of systems. The
addresses of class A can be detected as the first address range is
between 224 and 239
Fig.11.2
Classes
of the TCP/IP
addresses
- 102 -
11. UPPER LEVEL PROTOCOLS
Netmask The host part of an address of class A, B or C can be divided into two
parts, subnet and host. The amplitude of the subnet and the host range is
defined via a parameter called netmask. The netmask contains bits 1 in
correspondence to the network and subnet ranges, and bit 0 in
correspondence of the host range. E.g., a netmask
255.255.255.0,
indicates that the host range coincides to the last address byte.
The use of the subnets and the netmask makes the address detection and,
consequently, the data routing quicker.
SPX is the protocol of the Novell Transport level and comes from the
protocol SSP of Xerox.
- 103 -
11. UPPER LEVEL PROTOCOLS
- 104 -
11. UPPER LEVEL PROTOCOLS
The name can be a single name or a group name: the single name
identifies the single system, while the group names enable different
users on the same system or on different systems to be addressed using
only one name (transmission in multicast).
NetBIOS associates the names directly to the station addresses and does
not determine any separate addressing mechanism in the Network level,
unlike TCP/IP and IPX/SPX.
For this reason, the use of the Transport protocol NetBIOS does not fit
an internet composed by more LAN interconnected by means of router,
as the router does not have - at Network level - the information
necessary to decide toward which networks to route the received frames.
- 105 -
11. UPPER LEVEL PROTOCOLS
- 106 -
11. UPPER LEVEL PROTOCOLS
11.4 QUESTIONS
1 Xerox
2 IBM
3 Microsoft
4 Novell
Q4 Which of the following protocols is used the most in the Internet network
?
1 IPX/SPX
2 TCP/IP
3 NetBIOS
4 Others
1 IPX/SPX
2 TCP/IP
3 NetBIOS
4 NetBEUI
- 107 -
12. CONFIGURATION of a LOCAL AREA NETWORK
To carry out a local area network, so, is a long term investment, a target
to be centered from the beginning even to the detriment of an expensive
analysis and design.
Nowadays, the not shielded twisted pair (UTP) is the most indicated
solution for any kind of plant remaining within a single building. The
most used twisted pair is the category 5, that, within a certain distance,
can carry data even at a speed of 155 Mb/s. The advantage of the
twisted pair is to be economic, easy to install, and matching any kind of
traffic: local area network, terminal emulation telephony. Due to the low
cost of connection, it is usually cabled in excess, covering also those
work areas not active at the moment. In this way, whenever you move, it
will be enough to activate the nearest access turret changing the
interconnections in the central floor or area closet (concentrator). When
you need to interconnect the different closets present in separate
buildings or on different floors of the same building, the optical fiber is
preferred, as it can stand longer lengths, as well as for its high immunity
to electromagnetic disturbances.
- 108 -
12. CONFIGURATION of a LOCAL AREA NETWORK
- 109 -
12. CONFIGURATION of a LOCAL AREA NETWORK
- 110 -
12. CONFIGURATION of a LOCAL AREA NETWORK
- 111 -
12. CONFIGURATION of a LOCAL AREA NETWORK
- 112 -
12. CONFIGURATION of a LOCAL AREA NETWORK
- 113 -
12. CONFIGURATION of a LOCAL AREA NETWORK
We have treated the transport means and the equipment which can carry
out and interconnect different cabling and LAN architectures at physical
level. Now we want to deal with and describe the aspects enabling the
interconnection of different types of networks using different physical
levels and protocols.
The systems located in the same area are almost always cabled with
STP/UTP cable up to a typical distance of 100m between user’s station
and competent administration closet. This gives the possibility to
insulate a faulty system with ease, with the advantage to easily switch
from the speed of 10Mb/s to the higher one of 100Mb/s. The center of
this area normally consists of the Hub which cabling ray will be 100m.
Very often network equipment are installed such as Hub, Switch and
Router inside closets which can group their operations, although this
solution cannot always be applied if the distance of some stations
overcomes 100m. A solution can be to decentralize the Hubs inside the
building or to use Repeaters in longer trunks. A second solution expects
to change the kind of cable to join the two quantities set at a superior
distance.
A 10Base2 coaxial cable can join a pair of Hubs or single stations at a
distance of about 200m, the 10Base5 cable up to about 500m. This
solution implies only a variation of the kind of cabling, but includes also
the addition of further accessories such as transceivers or signal
converters. For this reasons, many Hubs include one or more ports with
- 114 -
12. CONFIGURATION of a LOCAL AREA NETWORK
different standards, to solve the problem in the most economic and fast
way (BNC and AUI ports). Consider that the use of coaxial cable trunks
is good only for speeds of 10 Mb/s.
A valid but expensive solution can be the optical fiber, which can
support the standard for 10/100 Mb/s. The fiber is used especially in
extremely long trunks set on critical paths. Among the most interesting
cases, there are the underground lines which can join two or more
buildings belonging to a single interbuilding. The underground lines are
exposed to the danger of extremely variable electrical potentials,
according to the conditions of the soil and the meteorological conditions
(lightning). It is advisable to use this kind of cabling in these situations.
Particular equipment such as the Router and the Switch tends to be used
to split work groups between them so not to jam the network with
repeated messages to users not using this information. For this reason,
these systems can be grouped into closets so to facilitate the
modification of the network structure acting from a single point.
Remember, that these equipment can have a certain number of
LAN/WAN ports configurable at wish by the network supervisor, in
order to create particular pseudo-dedicated connections and optimize the
traffic of the LAN packets.
Switching to the NIC network cards, they can be bought in the "combo"
version so to match to the different cabling solutions. Usually a
"combo" is a card provided with BNC (10Base2), AUI (10Base5 for
connection with transceiver) and RJ45 connection (10BaseT).
- 115 -
12. CONFIGURATION of a LOCAL AREA NETWORK
- 116 -
12. CONFIGURATION of a LOCAL AREA NETWORK
12.3 QUESTIONS
1 25 meters
2 50 meters
3 100 meters
4 186 meters
1 25 meters
2 500 meters
3 100 meters
4 186 meters
1 one
2 two
3 four
4 none
- 117 -
13. NETWORK CONTROL and ADMINISTRATION
The software packets for network control must introduce the alarm
situations and record intermittent events and malfunctions present inside
the system.
The error control includes the fault detection and their insulation.
The performance control counts the frames, the access requests to the
disks and to the specific programs.
The accounting control concerns the generation of the reports sent to the
users on their use of the resources.
- 118 -
13. NETWORK CONTROL and ADMINISTRATION
The cons of the SNMP are the lack of safety, the scarce quality of the
documentation and the tendency of some firms to create non standard
configurations. The SNMP is to be used with networks with TCP/IP
protocol, but usually not with networks with IPX/SPX or NetBEUI
protocol. In spite of these problems, the industry continues to use this
system which does not occupy too much memory and capacity of
calculation of the equipment and the NMS.
There are other products such as the IBM NetView having the pro to be
powerful and reliable, although expensive, and the con to need high
calculation capacities on the system housing it.
- 119 -
13. NETWORK CONTROL and ADMINISTRATION
In the end, the statistical relation packets are not particularly attractive,
but useful for the person in charge to ensure a higher efficiency, a better
planning of the activities and detection of the potentially dangerous
situations before they become problems.
- 120 -
13. NETWORK CONTROL and ADMINISTRATION
13.4 QUESTIONS
Q5 Which purpose does the network Administrator use the statistic for ?
1 To optimize the network, plan the growth and detect the problems
2 To measure the productivity of the single terminals
3 To detect the less used trunks to exploit the band
4 To justify the maintenance costs
- 121 -
14. NETWORK OPERATING SYSTEMS - NOS
On the market, at the moment there are many packets for this purpose.
In particular the characteristics of the Novell IntranetWare and MS-
Windows NT Server will be described.
- 122 -
14. NETWORK OPERATING SYSTEMS - NOS
NFS has been designed for a file sharing with high performances in
data control and safety. NFS organizes the memorization of the
information on disk into volumes, directories, sub-directories and files.
The users are granted rights of access and use for specific directories of
the server. Besides the rights of access, IntranetWare includes a set of
devices to protect the data from physical damages. They can be used
during the blocking phase of a record or a range and, whenever the
modification process should not be successful, it is always possible to
reset the last situation before blocking.
- 123 -
14. NETWORK OPERATING SYSTEMS - NOS
The software must be installed in a machine called Server with the same
characteristics of the one seen for the Novell ambient.
NTFS has been designed to carry out a file sharing with high
performances in the data control and safety, although not comparable to
NFS (Netware File System) of Novell still today. As NFS, even NTFS
organizes the information memorization on disk in volume, directory,
sub-directory and file. The users are given access and use rights to
specific directories of the Server. Besides the access rights, Windows
NT Server includes also a set of expedients to protect the data from
damages of physical kind in a very similar way as included in
IntranetWare. Unlike IntranetWare, Windows NT Server uses a domain
control for very big networks, through which the supervisor can control
them very quickly.
The user interface of the operative system is very similar to the interface
of Windows 95, which eases the activity of the supervisor. All control
activities of the Server can be carried out on the same Server, although
the main control activities can be assigned to a remote user’s system. To
access the Server each user can use the same network services included
for Windows 95. In practice, each user can interact or access directly the
server and other machines resources. This includes a high degree of
flexibility, although keeping a safety level always adjusted by the
username/password mechanism. Each user is provided with rights or
privileges granted by the network supervisor. The prints can be
controlled with printer-server services activated on the same Server, on
a user’s system or on a independent system connected in LAN.
The network protocol is the proprietary NetBEUI one, but it is possible
to help it with the protocol IPX/SPX or TCP/IP to carry out Intranet
networks. The Server becomes, so, the center of the same network, so it
must be protected with the usual devices (E.L.C.B., backup system,
etc.). The server supports also some routing functions included in the
operative system.
- 124 -
14. NETWORK OPERATING SYSTEMS - NOS
14.4 QUESTIONS
Q1 What is a NOS ?
1 Novell IntranetWare.
2 Microsoft Windows NT Server.
3 Microsoft Windows 95.
4 Microsoft MS-DOS.
1 NTFS
2 FAT
3 NFS
4 HPFS
1 Novell IntranetWare
2 Microsoft Windows NT Server
3 Microsoft MS-DOS
4 Microsoft Windows 95
- 125 -
15. NETWORK INTERNET / INTRANET
In the first half of the 70ies, the DARPA (Defence Advanced Research
Project Agency) started developing a packet switching network for
interconnection of heterogeneous calculators, to be used as
communication mean between the research institution of the United
States. At the end of the 70ies two more famous protocols were defined,
the TCP and the IP. These protocols were used by a group of researchers
for the ArpaNET network and obtained a great success as available and
usable by all. From the 1990 the ISO wanted to standardize the TCP/IP
protocol as this was heavily diffused on the world market.
Many business organizations offer contracts for the remote access to the
network via modems or dedicated lines. These organizations are called
Provider. For consultation (navigation), the network provides Servers
dedicated to heterogeneous information concerning all possible subjects.
Besides, Internet offers a valid communication instrument to send the
electronic mail at world level.
- 126 -
15. NETWORK INTERNET / INTRANET
We can say that the Internet addresses have two formats: one for the
computers (expressed in numbers) and one for the persons (expressed in
words).
15.2.3 Telnet
- 127 -
15. NETWORK INTERNET / INTRANET
The DNS is a data base distributed and replied on different systems. Its
purpose is to define the correspondences between host names and IP
addresses in real time. This enables a user to select a destination only
knowing his name.
- 128 -
15. NETWORK INTERNET / INTRANET
After the great success achieved by Internet and the services it provides,
recently they thought to use the same technologies for private networks,
too, using the TCP/IP protocols and part or all services present in
Internet, such as WWW, FTP, Telnet, SMTP, etc.
The term Intranet includes the technology enabling to store, process and
distribute data of an organization to the users of their own inner
networks, using the Internet network technology locally. So, we define
as Intranet a local area network installed in a restricted place (building,
industry, etc.) using the TCP/IP as standard protocol, and at least a
Server with network operative system which can make the above
mentioned protocols and services available.
- 129 -
15. NETWORK INTERNET / INTRANET
15.4 QUESTIONS
- 130 -