You are on page 1of 11

MMC

Unit-5

MM Networks

UNIT 5: MULTIMEDIA INFORMATION NETWORKS


Contents: 1) Introduction 2) LAN 3) Ethernet 4) Token ring 5) Bridges 6) FDDI 7) High-speed LANs

Instructional Objectives: At the end of the unit, the students should be able to:

1 BSS ECE, REVA

MMC

Unit-5

MM Networks

1. INTRODUCTION:
With the rapid paradigm shift from conventional circuit-switching telephone networks to the packetswitching, data-centric, and IP-based internet, networked multimedia computer applications have created a tremendous impact on computing and network infrastructures. More specifically, most multimedia content providers, such as news, television, and the entertainment industry have started their own streaming infrastructures to deliver their content, either live or ondemand. Numerous multimedia networking applications have also matured in the past few years, ranging from distance learning to desktop video conferencing, instant messaging, workgroup collaboration, multimedia kiosks, entertainment, and imaging.

2. LAN:
A LAN is a high-speed, fault-tolerant data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications.3 LAN implementations that are used most commonly:

2.1 LAN protocols and OSI reference model LAN protocols function at the lowest two layers of the OSI reference model, as discussed in chapter 1, internetworking basics, between the physical layer and the data link layer. The following figure illustrates how several popular LAN protocols map to the OSI reference model.

2 BSS ECE, REVA

MMC

Unit-5

MM Networks

2.2 LAN media-access methods: LAN protocols typically use one of two methods to access the physical network medium: carrier sense multiple access collision detect (CSMA/CD) and token passing. In the CSMA/CD media-access scheme, network devices contend for use of the physical network medium. CSMA/CD is therefore sometimes called contention access. Examples of LAN that uses the CSMA/CD media-access scheme are Ethernet/IEEE 802.3 networks, including 100baset in the tokenpassing media-access scheme, network devices access the physical medium based on possession of a token. Examples of LANS that use the token-passing media-access scheme are token ring/IEEE 802.5 and FDDI. 2.3 LAN transmission methods: LAN data transmissions fall into three classifications: unicast, multicast, and broadcast. in each type of transmission, a single packet is sent to one or more nodes. In a unicast transmission, a single packet is sent from the source to a destination on a network. First, the source node addresses the packet by using the address of the destination node. The package is then sent onto the network, and finally, the network passes the packet to its destination. A multicast transmission consists of a single data packet that is copied and sent to a specific subset of nodes on the network. First, the source node addresses the packet by using a multicast address. The packet is then sent into the network, which makes copies of the packet and sends a copy to each node that is part of the multicast address. A broadcast transmission consists of a single data packet that is copied and sent to all nodes on the network. In these types of transmissions, the source node addresses the packet by using the broadcast address. The packet is then sent into the network, which makes copies of the packet and sends a copy to every node on the network. 2.4 LAN topologies: LAN topologies define the manner in which network devices are organized. four common LAN topologies exist: bus, ring, star, and tree. These topologies are logical architectures, but the actual devices need not be physically organized in these configurations. Logical bus and ring topologies, for example, are commonly organized physically as a star. a bus topology is a linear LAN architecture in which transmissions from network stations propagate the length of the medium and are received by all other stations. of the three most widely used LAN implementations, ETHERNET/IEEE 802.3 networks including 100baset, implement a bus topology, which is illustrated in figure.

A ring topology is a LAN architecture that consists of a series of devices connected to one another by unidirectional transmission links to form a single closed loop. Both token ring/IEEE 802.5 and FDDI networks implement a ring topology. A star topology is a LAN architecture in which the endpoints on a network are connected to a common central hub, or switch, by dedicated links. LOGICAL bus and ring topologies are often implemented physically in a star topology, which is illustrated in figure. A tree topology is a LAN architecture that is identical to the bus topology, except that branches with multiple nodes are possible in this case.
3 BSS ECE, REVA

MMC

Unit-5

MM Networks

2.5 LAN devices: Devices commonly used in LANS include repeaters, hubs, LAN extenders, bridges, LAN switches, and routers. A repeater is a physical layer device used to interconnect the media segments of an extended network. a repeater essentially enables a series of cable segments to be treated as a single cable. Repeaters receive signals from one network segment and amplify, retime, and retransmit those signals to another network segment. These actions prevent signal deterioration caused by long cable lengths and large numbers of connected devices. Repeaters are incapable of performing complex filtering and other traffic processing. In addition, all electrical signals, including electrical disturbances and other errors, are repeated and amplified. The total number of repeaters and network segments that can be connected is limited due to timing and other issues. The following figure illustrates a repeater connecting two network segments.

A hub is a physical-layer device that connects multiple user stations, each via a dedicated cable. Electrical interconnections are established inside the hub. Hubs are used to create a physical star network while maintaining the logical bus or ring configuration of the LAN. In some respects, a hub functions as a multiport repeater. A LAN extender is a remote-access multilayer switch that connects to a host router. LAN extenders forward traffic from all the standard network-layer protocols (such as IP, IPX, and Appletalk), and filter traffic based on the MAC address or network-layer protocol type. LAN extenders scale well because the
4 BSS ECE, REVA

MMC

Unit-5

MM Networks

host router filters out unwanted broadcasts and multicasts. LAN extenders, however, are not capable of segmenting traffic or creating security firewalls. The following figure illustrates multiple LAN extenders connected to the host router through a WAN.

3. ETHERNET: Ethernet networks and the more recent derivative ieee802.3 are used extensively in technical and office environment.
3.1 CSMA/CD All the stations are attached directly to the same cable/bus ,it is said to operate in a multiple access mode. The bus operates in the broadcast mode which means that every frames transmitted is received by all the other stations that are attached to the bus because of the broadcast mode ,this will result in the contents of the two frames being corrupted. collision signal is generated by physical layer. Jam signal (collision enforcement): to make sure that all stations involved in the collision will detect collision. a pattern of 32 bits. Collision backoff and retransmission method (truncated binary exponential backoff algorithm, beba): O n : number of collisions experienced (n <= 16) O k : min (n,10) -- truncation O r : random delay time (unit: slot time) between 0 <= r < 2k

5 BSS ECE, REVA

MMC

Unit-5

MM Networks

The protocol for the CSMA/CD is illustrated below:

4. TOKEN RINGS:
All the stations are connected together by a set of unidirectional links in the form of a ring and all frame transmissions between any of the stations take place over it by circulating the frame around the ring. Only one frame transfer around the ring can be in progress over the ring at a time.

6 BSS ECE, REVA

MMC

Unit-5

MM Networks

Passing the token: In CSMA/CD (802.3) starvation may occur, i.e., stations can wait forever to transmit. In token bus, every station has a chance to transmit (token) therefore - no collisions. It is contention-free. Token passes around in pre-defined order and once station acquires token, it can start transmitting. When complete, the token is passed onto the next station. Stations transmitting: However there is limited efficiency due to passing of the token. It is most commonly used MAC protocol for ring topologies. It also uses a special-purpose, circulating frame, or token (3 bytes). Station that wants to transmit waits till token passes by. When station wants to transmit: Waits for token. Seizes it by changing 1 bit and token becomes start-of-frame sequence. Station appends remainder of frame. When station seizes token and begins transmission, theres no token on the ring; so nobody else can transmit. Transmitting station inserts a new token when the station completes frame transmission and the leading edge of frame returns to it after a round-trip. Under light load, inefficiency due to waiting for the token to transmit. Under a heavy load, round-robin is fair and efficient. In fact this is one of the major advantages of the token ring. The monitoring station however is responsible for ring maintenance (removing duplicates, inserting token). Token ring frame format:

7 BSS ECE, REVA

MMC

Unit-5

MM Networks

SD: starting delimiter; indicates starting of frame. AC: access control. FC: frame control; if LLC data or control. DA and SA: destination and source addresses. FCS: frame check sequence. ED: ending delimiter; contains the error detection bit e; contains frame continuation bit i (multiple frame transmissions). FS: frame status. Token ring priorities: There is an optional priority mechanism in 802.5. It has 3 priority bits: 8 priority levels. Service priority: priority of current token. Station can only transmit frame with priority >= service priority. Reservation bits allow station to influence priority levels trying to reserve next token. Generally a station waits for frame to come back before issuing a new token. This can lead to low ring utilization. Therefore there is an early token release (ETR) option where a station may release token as soon as it completes transmission. Token ring summary: a token ring is: Efficient at heavy traffic. Guaranteed delay. Fair. Supports priorities. But, ring/token maintenance overhead.

5. BRIDGES:
There are two types of bridges, the one are used with Ethernet LANS, knows as transparent bridges , and the others with token ring LANS, known as source routing bridges.

5.1 Transparent Bridges: With a transparent bridge, as with a repeater, the presence of one (or more) bridges in a route between two communicating stations is transparent to the two stations. All routing decisions are made exclusively by the bridge(s). A bridge maintains a forwarding database and bridge learning is achieved by forwarding database to be created in advance.

8 BSS ECE, REVA

MMC

Unit-5

MM Networks

5.2 SOURCE ROUTING BRIDGES: The major difference between a LAN base on source routing bridges and one base on spanning tree bridges is that with the latter the bridges collectively perform the routing operation in a way that is transparent to the end stations. Conversely, with source routing, the end stations perform the routing function.

6. FDDI:
FDDI is an optical fiber-based ring network that supports a bit rate of 100 mbps. It can be used for the interconnection of segments spread over a wider geographical area than a single building, such as a university campus or manufacturing plant. Fiber distributed data interface is similar to 802.5 with some changes due to higher data rates.
9 BSS ECE, REVA

MMC

Unit-5

MM Networks

7. HIGH SPEED LANS:


The high speed LANS that are generally used are: FAST ETHERNET SWITCHED FAST ETHERNET GIGABIT ETHERNET 7.1 FAST ETHERNET: Fast ethernet was to use the same shared, half-duplex transmission mode as ethernet but to obtain a*10 increase in operational bit rate over 10baset while at the same time retaining the same wiring systems , MAC method , and frame format. The major technological hurdle to overcome with fast ethernet was to achieve a bit rate of 100mbps over 100m of UTP cable. Detects a collision by detecting a signal on pair 2 while it is transmitting and , the hub detects a collision by the presence of a signal on pair 1

10 BSS ECE, REVA

MMC

Unit-5

MM Networks

7.2 SWITCHED FAST ETHERNET: In order to allow multiple access/transfers to be in progress concurrently, two developments have been made: Switch hub architecture. Duplex working over the circuits that connect the stations to the hub.

11 BSS ECE, REVA

You might also like