Professional Documents
Culture Documents
17UEC08-Network
In the star topology, the hub can play the role of the master.
If the arbitration unit goes down, the entire network goes down.
In the decentralized method, the arbitration is done more democratically.
You do not require any external arbitrator for this. This method is more efficient, and
therefore, more popular.
This requires certain discipline or protocol to be followed by all the hosts.
The decentralized method can be implemented in two major ways:
Carrier sensing - Ethernet using bus topology.
Token passing - Token Bus using bus topology uses this method. Token Ring
Using ring topology and FDDI.
4.3. LAN Implementation:
There are various methods to implement the LAN and below three are the major and
popular implementations.
Ethernet (bus),
Token Ring,
FDDI (token passing).
4.3.1. Ethernet
At any point of time, the Ethernet bus can be in any of the following three states:
The bus is idle: No host is sending/receiving any message.
The bus is busy: it carries the signal sent by some nodes.
The bus carriers an erratic: signal generated by a collision of two different
hosts at same time.
The transceiver does not connect to the host directly. Instead of this it connects to a
Network Interface Card (NIC).
MCAS | Department of Electronics and Communication 2
17UEC08-Network Communications and Security III Year/VI Sem
NIC is a small card plugged on the motherboard of the host, and functions like a small
computer consisting of a small CPU, memory and a limited instruction set.
It performs all the network-related
functions.
Each NIC has a unique hardware
address or physical address that
identifies a host uniquely.
If the NIC of one computer is replaced
with another the hardware address of
the computer changes to the address of
the new NIC. This is like a SIM card in a
mobile phone.
The logical architecture of a NIC
contains an interface to the LAN, and
also contains a processor and memory,
which are used during the transmission Figure 3( NIC Organization)
and acceptance of the data.
Following steps are carried out while transmitting a file/message by a host to another host
on the bus:
1. The message is broken into different frames by a higher-level protocol. Each frame
has a header and the actual data. The header contains the source address, the
destination address and CRC, etc.
2. This frame is stored in the memory of the NIC of the source host for transmitting to
the destination host.
3. The NIC now checks the status of the bus with the help of the transceiver and waits
until it finds that the status of the bus is idle.
4. The NIC sends the data bit by bit when it finds that the bus is idle. It also computes
and inserts the CRC with header to be transmitted.
5. If two hosts want to use the bus and check the status of the bus simultaneously, and
find it idle and send their respective frames at the same time, there will be a
collision.
6. If there is no collision, the frame along with the header starts traveling to all the
nodes.
7. The transceiver of every host receives the signal values from the bus and converts
them into bits and sends them bit by bit to the NIC of the host.
8. The bits are stored in the memory of the NIC of the host to form a frame.
9. The NIC of the host compares the destination address in the frame with its own
hardware address. It accepts the frame if the two match. Otherwise, the frame is
discarded.
10. If the addresses match the NIC of the destination host computes the CRC on the bits
received again, and compares it with the one received from the header of the frame.
A mismatch indicates an error. The NIC discards such a frame. There is no provision
for either a positive or negative acknowledgement in Ethernet.
11. The error-free frames are passed by the NIC to the host at the destination, where
they are assembled into a complete message and passed to the higher layers of the
protocol for further processing.
4.3.1.1. Properties of Ethernet:
The Ethernet uses the bus topology and has a transmission speed of 10 Mbps and it has the
following properties:
Broadcast network:
Ethernet is a broadcast network because the transceiver of every host receives every
transmission from any host on the network.
MCAS | Department of Electronics and Communication 3
17UEC08-Network Communications and Security III Year/VI Sem
The CSMA/CD technique is quite simple as all the hosts in the Ethernet bus will
simultaneously monitors the bus through their transceivers to determine that the bus is
idle or busy and hence it is called Carrier Sense Multiple Access (CSMA).
When a host has a frame and waiting to be transmitted, its transceiver checks the Ethernet
cable to find any other host has already sending data over the medium.
That is, it performs a carrier sensing. When the host determines that no other host is using
the Ethernet that is the cable is idle, it transmits its own data on to the Ethernet.
Also it can send only a limited amount of data, so that other hosts also get a chance for data
transmission.
When the transceiver of a host begins transmission on the Ethernet, the signal does not
immediately reach all parts of the network and it takes some finite time, even the message
is very small.
Therefore, until the signal reaches another host, that host continues to believe that the
cable is idle. Thus, it is quite possible that two transceivers believe that the Ethernet is free
for transmission, and can transmit data exactly at the same time.
When this happens, the electrical signals of the two transmissions collide together and such
incidents are termed as collisions, which produce peculiar erratic signals.
To resolve collisions, the transceiver of that host continues to listen to the Ethernet bus to
see if a collision has occurred. If it has, the transceiver informs its NIC about it.
The NIC stops further transmission and waits for some time before it asks the transceiver
to retransmit the data.
As soon as it detects a collision, it generates a specific jamming signal across the bus,
informing all the nodes of the collision.
The NIC of the other node trying to send some data also detects the jamming signal and
backs off. Now, both the nodes want to send some data will wait for a while.
The Ethernet standard offers different hosts can choose different random times for waiting
back off and this ensures that to avoid another collision on the bus.
Preamble: The preamble contains 8 bytes or 64 bits of alternating 0s and 1s to help the
receiving hosts synchronize.
Destination address: The 6-byte or 48-bit address of the destination to which the frame
is to be delivered. This is the hardware NIC address that we have studied before.
Source address: The NIC of the sending host inserts the hardware NIC address of the
sender in this 6-byte or 48-bit field.
Frame type: This field identifies the type of data carried in the frame the operating
system of the destination computer uses this field to determine how to process a given
frame.
Frame data: This field contains the actual data of the frame and it can be of variable
length.
CRC: This 4-byte or 32-bit field helps the destination NIC to detect transmission errors.
Only the actual destination after comparing the destination address in the frame with its
own makes a copy of it while the other hosts do not make a copy of it.
In either case, every host forwards it to the next host on the ring anyway, so that the frame
actually comes back to the sender.
However, at the destination node, before it forwards the frame, that host checks the CRC to
ensure that there are no errors and then not only accepts the frame, but also changes a flag
bit in the frame to indicate the receipt of a correct frame.
The frame, therefore, comes back to the sender after covering the entire ring. At this stage,
the sender can check the flag bit to verify if the frame was received by the destination
successfully, or if there were any errors during transmission.
This is shown in Fig. 9.8. This is how the acknowledgement scheme is implemented in
Token Ring unlike Ethernet, where there is no such scheme.
4.3.2.2. Medium Access Control (MAC):
Unlike Ethernet here in the token ring any host can transmit data any time.
Thus in the case of Token Ring, a host gets exclusive access to the medium when it is
transferring data, and that no other host can perform any transmissions.
Token Ring does not employ CSMA/CD instead of this the Token Ring hardware ensures
that the permission for data transmission is granted to each host on the Token Ring.
The hardware coordinates this by a special three-byte frame called token.
A token contains a bit pattern that is completely different from any other data frame so that
the token and data frames can be easily distinguished from each other.
The Token Ring hardware makes there will be one and only one token frame on the
medium, which keeps circulating over the ring from one host to the next continuously.
The token is the permission for data transmission.
Thus, before sending a frame a host must wait for the token frame to arrive.
Once a host receives the token frame, it knows that it has an exclusive access to the
transmission medium.
Therefore it temporarily removes the token frame from the transmission medium and
sends its data frame to the transmission medium.
Once the data frame comes back to it by completing its full journey, the transmitting host
then sends back the token frame onto the medium.
Every host is given an equal chance for data transmission. Also, if a host has two or more
frames to transmit, it must send one frame at a time.
This means that small transmissions do not have to wait for long because of other big
transmissions. In short, this is an interesting implementation of time division multiplexing.
When no host has any data to transmit, the token frame keeps circulating continuously,
without any host using it to gain access to the medium.
1. Data frame : The fields in the data frame of a Token Ring are as follows:
Preamble : This field internally contains three subfields, each consisting of one byte.
The preamble is used for synchronization purposes. One of the flags in this field also
indicates that it is a data frame, and not a token frame or an abort frame.
Destination address: The 6-byte or 48-bit address of the NIC of the destination host.
Source address: The 6-byte or 48-bit address of the NIC of the sending host.
Frame data: This field contains the actual data of the frame which is being variable
length up to a maximum of 4,500 bytes.
CRC: This 32-bit field helps the source and the destination NIC to detect transmission
errors.
ED (End Delimiter): This one-byte field signifies that the sender's data and control
information ends here.
FS (Frame Status): This one-byte field is the last one in the data frame. The receiver
sets it when it receives the frame correctly to indicate that it was received the correctly.
One byte is occupied by this field. It contains two bits to indicate that the destination
address was recognized and the data was captured by the destination correctly. And the
destination is present but the frame cannot be copied by the destination host due to
buffer full.
2. Token frame: The token frame acts like a placeholder.
Start Delimiter (SD): This field signifies to a host that a frame is coming.
Access Control (AC) : This field indicates to the host that the arriving frame is a token
frame.
End Delimiter (ED): This field signifies to a host that the end of the token frame.
3. Abort frame: This frame does not contain any meaningful information. It is used by a
sender to abort an ongoing transmission for whatever reasons.
Start Delimiter (SD): This field signifies to a host that a frame is coming.
End Delimiter (ED) : This field signifies to a host the end of the abort frame.
Preamble: This field internally contains two subfields, each consisting of one byte. The
preamble is used for synchronization purposes.
Destination Address: The 6-byte or 48-bit address of the NIC of the destination host.
Source Address: The 6-byte or 48-bit address of the NIC of the source host
Frame Data: This field contains the actual data of the frame. This is also of variable
length, up to a maximum of 4,500 bytes.
CRC: This 32-bit field helps the source and the destination NIC to detect transmission
errors.
ED (End Delimiter): This one-byte field signifies that the sender's data and control
information ends here.
FS (Frame Status): This one-byte field is the last in the data frame. The receiver sets it
when it receives the frame to indicate that it was received by it.
100BASE-FX: This kind of fast Ethernet using optical fibers has two fibers: one for
sending data and other for receiving it. Hence, we can use the full-duplex mode. However,
to ensure that collisions are detected, it is also used in the half-duplex mode. In that case,
the maximum length of the fiber is restricted to 400 meters.
100BASE-SX: This type of fast Ethernet technology uses a technique that is cheaper than
what is used in 100BASE-FX. As a result, it can also support distances shorter in length as
compared to the 100BASE-FX technology. Hence, 100BASE-SX is an alternative to
100BASE-FX when cost is the main factor.
100BASE-BX: This kind of fast Ethernet uses a single strand of optical fiber. A special
multiplexer is used to split the single signal into transmission signal and receiver signal.
100BASE-LX10: This type of optical fiber uses two single-mode fibers.
4.5.2. Gigabit Ethernet:
Gigabit Ethernet technology is actually a collection of various standards.
These allow transmissions at a rate of about one gigabit per second.
Gigabit Ethernet supports both the half-duplex and full-duplex modes, in practice, the full-
duplex mode is more common.
As Ethernet transitioned to fast Ethernet, transmission speeds increased from 10 Mbps to
100 Mbps. The next logical step after fast Ethernet was gigabit Ethernet, which provides
transmission speeds of 1 Giga bits per second (1 Gbps), or 1000 Mbps.
The standard developed for gigabit Ethernet in the year 1998 was called IEEE 802.3z.
This was based on the use of optical fiber as the medium of communication and collectively
called 1000BASE-X.
Note that fast Ethernet was 100BASE-X. In the case of gigabit Ethernet, variations of X were
CX, SX, LX, or ZX.
The original IEEE 802.3z specification also had addendums in the form of two more
specifications, namely IEEE 802.3ab using unshielded twisted pair (UTP) and IEEE 802.3ah
which uses optical fiber again.
4.6. Virtual LAN (VLAN):
When the Ethernet technology was first developed, no consideration was given to the
logical organization of computers connecting together to form a network.
The simple arrangement was a central
hub connecting all the computers on the
floor.
And all such hubs are connected together
by using one large switch.
If different groups of people needed
different functionalities from this
network, it was not possible.
This was because only physical
segregation on the basis of different
floors/hubs was possible. Logical
segregation of computers connected to
the network was not possible.
With the introduction of hubs and
switches, it was now possible that LANs
be configured as per the actual needs.
Instead of organizing a LAN in the strict
physical sense, it was now possible to Figure 14(VLAN)
organize it on logical grounds.
This is possible because the wires or connectors from various computers can be inserted
into different hubs, depending on the need.
When broadcast (send to all) or multi-cast (send to a select few) messages are sent, it is
important to know which computers could receive such messages.
Imagine a building containing thousands or more computers with dozens of hubs and
switches, where a person's computer has to move from one hub to another.
it would cause if this change is physical, i.e., taking the cable out from the current hub and
moving it to the new hub.
Consequently, to achieve all these objectives, the technology of virtual LAN (VLAN) was
conceived. These networks need special switches,
The administrator needs to decide roughly how many computers should connect to a
VLAN-switch, and also how many such VLAN-switches are necessary.
Administrators then use configuration tables to signify the current state of a VLAN.
These tables contain entries like which VLANs can be accessed by which network lines or
ports.
These are grouped in such a way that broadcasting or multicasting is possible by adjusting
the entries in this table.
VLAN can be created by using one of the following three methods:
1. Work at the IP address level.
2. Work at the physical address level.
3. Work at the network port level.
Every frame that is sent out now contains information about the VLAN tags also.
The Ethernet frame size was increased from 1518 bytes to 1522 bytes.
Technically, the VLAN standard is called IEEE 802.1Q.
MAN can be of two types as Distributed Queue Dual Bus (DQDB) and Switched Multimegabit
Data Services (SMDS). These services are provided by telephone companies.
From host 3's point of view, hosts 1 and 2 are downstream on bus A, whereas hosts 4 and 5
are upstream on bus B.
By the same logic, for host 5, there are no upstream hosts on bus B, but there are four
downstream hosts on bus A.
Because of this, host 5 is considered as the head of bus A, and host 1 as its end.
By a similar reasoning, host 1 has no downstream stations on bus B, but has four upstream
stations on bus A. So, host 1 is the head of bus B, and host 5 is its end.
Data flows on each bus in the form of 53-byte transmission slots. These slots are not
packets rather; they are like boxes or containers that contain packets.
The heads generate slots. Therefore, station 5 on bus A and station 1 on bus B generate
empty slots for use, respectively.
The data transmission speed depends on how many slots are generated per second.
An empty slot travels along the bus until a host drops data into that slot and the
destination receives it.
There is a rule that says that the sending host must choose a bus for which the destination
is downstream.
Let us illustrate this with example
the figure depicts a situation
where host 4 sends data to host 2.
We will realize that the
downstream from host 4 to host 2
is on bus A.
Therefore, host 4 must choose a
slot on bus A.
As shown in the figure, the
transmission from host 4 to host 2
is done as follows:
1. The head of bus A, (host 5) Figure 16(Data Transmission in DQDB)
creates an empty
transmission slot.
2. When the empty transmission slot reaches host 4, host 4 drops its data with its
destination address into that slot.
3. The slot moves on the bus A and reaches host 3, then host 3 checks the destination
address and it is not matched with its own address, hence it passes the slot to host 2.
4. When the slot reaches host 2,it also checks the destination address with its own and
it is matched hence it copies the data contents of the slot, marks the slot as read and
allows it to move on the bus A.
5. The slot reaches the end host (host 1) of bus A there it is absorbed.
6. If host 1 sends some data to host 3, it should be clear now that it has to go via bus B.
It would follow the same steps as described above.
When the destination host is also the end host, the end host does not need to mark the slot
as read, because it is the last host.
So, if the destination host is the end host, the read flag is not set in the slot.
When a host receives a slot containing a reservation request, it adds a new element to the
end of the queue to indicate that a new request has to be added to the queue.
On the other hand, the moment a host receives an empty slot, it realizes that one of the
reservations is being served.
There are two possibilities here:
1. If the reservation request belongs to another host on the bus, the host simply removes
the tail element, and that one of the pending reservations is now served.
2. If the reservation request being served as made by the host itself, Therefore, apart
from removing the tail element from the queue, it adds the data to be transmitted to
the empty slot.
4.7.2. Switched Multimegabit Data Services (SMDS):
Switched Multimegabit Data Services (SMDS) is a high-speed MAN technology.
Bell Communications Research developed the SMDS specifications in the 1980s
SMDS is aimed at fulfilling the needs of organizations that have a number of LANs spread
across different locations in a city.
It is a packet-switched datagram service for high-speed MAN data transmissions.
SMDS is provided by common carriers. Since it is a switched technology, the subscribers of
SMDS pay only for the time that they use its services.
It also means that a packet from one LAN to another could travel via many switches of
telephone companies before reaching the destination.
SMDS uses a small header and allows for each data packet to contain up to 9188 bytes.
A host connected to a SMDS network can send a packet to any destination at any time.
4.7.2.2.SMDS Billing:
In general, telephone company services are suitable for continuous traffic.
There would be no continuous data transmission between LANs and there will be no
transmission between LANs for some time.
The billing is made for only to the amount of packets transferred over the telephone
switching line.
Hence a packet-switching technology such as SMDS is more cost-effective
Switch number: The first part identifies the switch to which the host connects.
Host number: second part uniquely identifies a host attached to that switch.
For example, if the address of a host is (1, 5), it means that the host is connected to switch
number 1, and on that switch, it is host number 5.
The address of a host is represented as a combination of switch number and host number,
internally the address is stored as a series of bits.