You are on page 1of 22

COMPUTER

NETWORKING
Nguyễn Huy Bảo

7
Trần Nguyễn Đăng Khoa

2
Chapter 4:
Lan Technology

Ethernet

Token Ring

Network Access Protocols


3
LAN (Local Area Networks)
• A LAN is a computer network that covers a small area.
• LANs have 10Mbps - 40Gbps data rates.
• LANs (usually) do not involve leased lines; cabling and equipments belong to
the LAN owner.

4
1 Ethernet:

•The Ethernet protocol is by far the most widely


used. Ethernet uses an access method called
CSMA/CD (Carrier Sense Multiple Access/Collision
Detection).
•This is a system where each computer listens to the
cable before sending anything through the network.

5
CSMA/CD (Carrier Sense Multiple
Access/Collision Detection)
•It uses carrier-sensing to defer transmissions until no other stations are
transmitting.

•This is used in combination with collision detection in which a


transmitting station detects collisions by sensing transmissions from other
stations while it is transmitting a frame.

•When this collision condition is detected, the station stops transmitting


that frame, transmits a jam signal, and then waits for a random time interval
before trying to resend the frame.

6
Classification: <Speed> <Base / Broad> 2 | 5 | T :

•10Base2 (thin coaxial, max. 2 segments of 185m, 30nodes/seg.).


•10Base5 (thick coaxial, max. 5 segments of 500m, 100nodes/seg.).
•10BaseT (twisted-pair).

7
2 Token Ring:

-The Token Ring protocol was developed by IBM in


the mid-1980s.
-The access method used involves token- passing.
-In Token Ring, the computers are connected so that
the signal travels around the network from one
computer to another in a logical ring.
-A single electronic token moves around the ring
from one computer to the next.

8
Token Ring:
- Repeaters joined by point-to-point links in closed loop.
- Data transmitted in frames.
- Medium access control is needed to determine
when station can insert frame.

9
Ethernet Token Ring

uses CSMA/CD passing mechanism is used

defined by IEEE 802.3 standard defined by IEEE 802.5 standard

non-deterministic deterministic

a Bus shaped topology  a Star shaped topology

does not employ priority  handles priority

coaxial cable(wire) is used telephone wire is used

does not contain routing information contains routing information


10
3
Network Access Protocols:

• A network protocol is a set of rules that a network must follow.


• Network protocols are formal standards and policies made up of rules,
procedures, and formats that define communication between two or more
devices over a network.
• Network protocols implement actions, policies, and problem-solving
from end to end, so that data or network communications are timely,
secure, and managed.

11
Common network protocols:

• Internet Protocol Suite


Internet Protocol Suite is a set of protocols that
implement the protocol stack on which the Internet
runs.

• Protocol Stack
Protocol Stack is a full set of protocol layers, working
together to provide network connectivity.

12
Common network protocols:

• Transmission Control Protocol (TCP)


Transmission Control Protocol (TCP) is the core protocol
of Internet Protocol Suite. TCP originates from the
implementation of the network, which complements the
Internet Protocol.

• Internet Protocol
Internet Protocol is the primary protocol in the
Internet protocol suite for relaying data over the
network.

13
Common network protocols:

• Hypertext Transfer Protocol (HTTP)


HTTP is an application protocol for distributed and
aggregated metastatic information systems.

• File Transfer Protocol (FTP)


FTP is the most common protocol used for file
transfers over the Internet and in private networks.

14
Common network protocols:

• Secured Shell (SSH)


SSH is the primary method used to securely manage
network devices at the command level.

• Telnet
Telnet is the primary method used to manage network
devices at the command level.

15
Common network protocols:

• Simple Mail Transfer Protocol (SMTP)


SMTP is used with two main functions: Transfer email
from source mail server to destination mail server and
transfer email from end user to mail system.

• Domain Name System (DNS)


The Domain Name System (DNS) is used to convert
domain names into IP addresses. The DNS hierarchy
includes root server, TLD, and authoritative server.

16
Common network protocols:

• Post Office Protocol version 3 (POP3)


Post Office Protocol version 3 is one of the two main
protocols used to retrieve mail from the Internet.

• Internet Message Access Protocol (IMAP)


IMAP version 3 is another major protocol used to
retrieve mail from the server. IMAP does not delete
content from the server mailbox.

17
Common network protocols:

• Simple Network Management Protocol (SNMP)


SNMP is used to manage the network. SNMP is
capable of monitoring, configuring and controlling
network devices.

• Hypertext Transfer Protocol over SSL/TLS


(HTTPS)
HTTPS is used with HTTP to provide the same
services, but with a secure connection provided by SSL
or TLS.
18
 Summary:
A local area network (LAN) is a computer network that
interconnects computers within a limited area such as a residence, school,
laboratory, university campus or office building.
Ethernet is a family of computer networking technologies commonly used
in  local area network (LAN).
Token Ring is a  computer networking  technology used to build  local area
network (LAN).
There are 14 common network access protocols.

19

Quetions

20
Cre :
https://www.totolink.vn/article/59-cac-kieu-topology-cua-mang-lan.html
https://www.slideshare.net/SWAMYNAYAK2/network-protocol-56119908?
fbclid=IwAR3TME4fG8nFEHI7JwrTLfZpmshScuXyFVatQRsoQJC1XC38dt85ikGqpT8
https://www.slideserve.com/betha/ch-ng-ii-chu-n-ethernet
https://https://quantrimang.com/nhung-giao-thuc-mang-pho-bien-hien-nay-162843
https://vi.wikipedia.org/
https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:the-
internet/xcae6f4a7ff015e7d:the-internet-protocol-suite/a/the-internet-protocols
https://www.google.com/url?sa=i&url=https%3A%2F%2Fwww.youtube.com%2Fwatch%3Fv
%3DFck8rIDvA5o&psig=AOvVaw3_ZVh4RApRtDrsv8hRoSzB&ust=1606276478503000&so
urce=images&cd=vfe&ved=0CA0QjhxqFwoTCNjHyKmkmu0CFQAAAAAdAAAAABAD
Last accessed 20/11/2020

21
Thanks for listen!
22

You might also like