You are on page 1of 60

Chapter 3

LAN Technologies

08/22/2022 1
Outlines
2

⚫ LAN Technologies

 ALOHA, Ethernet , Token Ring


⚫ LAN and Its Components

 Hubs
 Bridges
 Switches
 Routers
⚫ Cabling

08/22/2022 2
ALOHA
3
⚫ ALOHA is designed to solve channel allocation problem.

⚫ It is a simple communication scheme in which each transmitter in

the network sends data whenever there is a frame to send.


⚫ The transmission medium is shared between the stations.

⚫ When a station sends data, another station may attempt to do so

at the same time.


⚫ The data from the two stations collide and become corrupted.

08/22/2022 3
Cont’
4

⚫ Two versions of ALOHA:

 Pure ALOHA: does not require global time

synchronization.

 Slotted ALOHA: require global time


synchronization

08/22/2022 4
Pure ALOHA
5

 ALOHA is the simplest technique in multiple accesses.


 Basic idea of this mechanism is a user can transmit the data
whenever they want.
 If data is successfully transmitted then there isn’t any
problem.
 But if collision occurs then the station will transmit again.
 Sender can detect the collision if it doesn’t receive the
acknowledgement from the receiver

08/22/2022 5
Frames in a pure ALOHA network
7

08/22/2022 6
Slotted ALOHA
8

⚫ Slotted ALOHA was invented to improve the efficiency of

pure ALOHA.

⚫ We divide the time into discrete intervals (slots) and force

the station to send only at the beginning of the time slot.

⚫ Each interval corresponding to one frame.

⚫ A user is not permitted to send, instead, it is required to wait

for the beginning of the next slot.

08/22/2022 7
Frames in a slotted ALOHA network

08/22/2022 8
Pure Aloha vs Slotted Aloha
10

Pure Aloha:
⚫ The user can transmit the data frame whenever the station

has the data to be transmitted.


⚫ The time is continuous.

Slotted Aloha:
⚫ The user has to wait till the next time slot start, to transmit

the data frame.


⚫ The time is discrete.

08/22/2022 9
Carrier Sense Multiple Access(CSMA)

⚫ To minimize the chance of collision and to increase the

performance, the CSMA method was developed.

⚫ Carrier sensing allows the station to detect whether the

medium is currently being used.


⚫ In other words, CSMA is based on the principle "sense before
transmit" or "listen before talk.
⚫ A station senses the medium before trying to use it.

⚫ If the medium is busy, station backs off for a specified period,


otherwise station transmits.

08/22/2022 10
Cont’
12

⚫ When a station sends a frame, it still takes time for the first

bit to reach every station and for every station to sense it.

Two scenarios of CSMA:

⚫ persistent: Transmit immediately.

⚫ Example: Ethernet

⚫ non persistent: Wait for random time and listen before

transmission.
08/22/2022 11
Persistent

Persistent:-wait if busy and transmit only when the media


becomes idle again (no transmission after a triggered timer
expire)
 When a station has the data to send, it first listens the
channel to check if anyone else is transmitting data or not.
 If it senses the channel idle, station starts transmitting the
data.
 If it senses the channel busy it waits until the channel is idle,
by continuously sensing the channel.

08/22/2022 12
Non persistent

 Non persistent CSMA is less aggressive compared to

persistent protocol.

 In this protocol, before sending the data, the station senses the

channel and if the channel is idle it starts transmitting the data.

 But if the channel is busy, the station does not continuously

sense it but instead of that it waits for random amount of time

and repeats the algorithm.

08/22/2022 13
Carrier Sense Multiple Access with Collision
Detection (CSMA/CD)
13

 If no transmission is taking place at the time, the particular


station can transmit.
 If two stations attempt to transmit simultaneously, this causes a
collision, which is detected by all participating stations.
 After a random time interval, the stations that collided attempt
to transmit again.
 If another collision occurs, the time intervals from which the
random waiting time is selected are increased step by step.
08/22/2022
This is known as exponential back off. 14
IEEE standards
14

 IEEE has standardized a number of LANs and MANs under

the name of IEEE 802.


⚫ IEEE 802.3: Ethernet
⚫ IEEE 802.5: Token-ring

⚫ IEEE 802.11: Wireless LAN

⚫ IEEE 802.15: Bluetooth

… etc.

08/22/2022 15
Ethernet
15

⚫ Ethernet was standardized by IEEE (802.3) in 1983.

⚫ Nowadays Ethernet is the leading LAN technology.

⚫ The most popular and most widely deployed network

technology in the world.


⚫ Ethernet has been a relatively inexpensive and fast.

⚫ Number of devices that can coexist in a single


network.

08/22/2022 16
Cont’
16

 Ethernet allows computers, printers, and other devices,

“in the same network”, to be able to communicate.

For devices to be able to communicate with each other over


an Ethernet network, they must be configured with:
 IP Address
 Subnet Mask

08/22/2022 17
Cont’
17

Ethernet Frame Formats

08/22/2022 18
Cont’
18

⚫ Preamble: It is a 7 byte field that contains a pattern of


alternating 0’s and 1’s. It alerts the stations that a frame is
going to start.

⚫ Start Frame Delimiter (SFD): It is a 1 byte field


which is always set to 10101011.

The last two bits “11” indicate the end of Start Frame
Delimiter and marks the beginning of the frame.

08/22/2022 19
Cont’
19

⚫ Destination Address: It is a 6 byte field that contains the

MAC address of the destination for which the data is


destined.
⚫ Source Address: It is a 6 byte field that contains the MAC

address of the source which is sending the data.


⚫ Length/Pad: It is a 2 byte field which specifies the length

(number of bytes) of the data field.


 The frame length should be>64bytes in total.

08/22/2022 20
Cont’
20

⚫ Data: It is a variable length field which contains the actual

data. It is also called as a payload field. The length of this


field lies in the range [ 46 bytes , 1500 bytes ].
⚫ Frame Check Sequence (CRC /Checksum): It is a 4

byte field that contains the CRC code for error detection.

Read about token


ring!

08/22/2022 21
LAN and its Components
21

⚫ Network media

⚫ End points

⚫ NIC

⚫ Connectors

⚫ Hubs/Repeaters

⚫ Switches/Bridge

⚫ Routers

08/22/2022 22
Cont’
22

Network media: To transfer


signal

Example:

⯍ LAN: to transfer electrical


signal

⯍ Fiber: to transfer light


signal

⯍ Air: to transfer radio


signal

08/22/2022 23
Network Interface Card(NIC )
23

⚫ Used to convert data in to electrical, light and radio signal.

⚫ Each NIC has an IP address (logical address) and a physical

address(MAC address).
 No two NIC devices will ever have the same MAC address.

⚫ MAC Addresses are used within a LAN.

08/22/2022 24
Cont’
24

⚫ Function of NIC:

 Data Transfer
 Data Buffering
 Frame Construction
 Media Access Control
 Data Encoding/Decoding
 Data Transmission/Reception

08/22/2022 25
Hub
25

⚫ Hub is networking device that used to connect


network device together on the internet.
⚫ It is a multiport repeater to enhance signal within the same

LAN.
⚫ Forwards the message to all connected devices.

⚫ Creates opportunities for different “packet sniffers”

08/22/2022 26
Cont’
26

⚫ Joins multiple input lines


electrically
⚫ Very similar to repeaters

hub
hub

hub
hub

08/22/2022 27
Cont’
27

⚫ Hub Advantages:

 Simple
 Inexpensive
 Extends maximum distance between node pairs (100m per
Hub)

08/22/2022 28
Cont’
28

Hub limitations:
⚫ Data collision reduce the
throughput.
⚫ Unnecessary traffic.

⚫ Cannot connect different


Ethernet types.

08/22/2022 29
Repeater
29

⚫ A repeater receives a signal and, before it becomes too

weak or corrupted, regenerates the original bit


pattern.
⚫ Regenerate the original signal without
filtering.
⚫ Repeat received bits on one interface to all other
interfaces.

08/22/2022 30
Cont’
30

⚫ The maximum length for UTP cable in a network is

100 meters (approximately 333 feet).

⚫ If we need to extend our network beyond that limit,

we must add a device to our network.

⚫ This device is called a repeater.

08/22/2022 31
Switches
31

⚫ The hub forwards the data it receives to all of


the ports on the device.
⚫ But a switch forwards it only to the port that

connects to the destination device.

⚫ Switch: multi-port bridge


 Like hub but intelligent
 Better performance

08/22/2022 32
Switches
32

⚫ Typically connects individual computers.

⚫ Like bridges, support concurrent communication.

⚫ Switch breaks subnet into LAN segments

⚫ Switch filters packets

⚫ It supports virtual LAN (VLAN)

 VLAN is a technique w/c used to form more than one LANs

in a single switch.

08/22/2022 33
Switch vs Hub
33

The difference between the hub


and switch:
 The difference is what happens
inside the device.
 Switch make decisions based on
MAC addresses.
 Hub don't make decisions at all.

08/22/2022 34
Bridge
34

⚫ Operate on Ethernet frames, examining frame header and

selectively forwarding frame based on its destination.


⚫ Bridge isolates collision domains since it buffers frames.

⚫ Bridges are more intelligent than hubs but it has only two

ports w/c used to connect hubs.


⚫ It regenerates the signal it receives

08/22/2022 35
Cont’
35

⚫ A bridge has capability of packet filtering and


forwarding.
⚫ If the frame is to be forwarded, the decision

must specify the port.


⚫ The difference between bridge and switch
is:
 Switch connect more networks, has
buffer, faster,…
 Bridge connect fewer LAN, connect similar networks and
08/22/2022
manage flow of data, do not have buffers,… 36
Router 36

• A router is a device that route/forward packets based on IP


addressing.
• Connects LANs and WANs in the Internet( create large
nets).
• It has a routing table that is used for making decisions
about
• The routing tables are normally dynamic and are updated
the route. Ro
using routing protocols.

08/22/2022 37
Cont’ 37

• Different networks connect via routers (not switches or


hubs).

• Routers even connect networks based on different


protocols, which is important since not all networks use the
same protocol.

08/22/2022 38
Hub, Switch and Router
38
⚫ Hub

 Simple and used to create network.


 Not intelligent b/c not filtering the data.
 Since rebroadcast the packet to all port, cerate unnecessary traffic.

⚫ Switch

 Like Hub, it is used to create network .


 More intelligent than Hub because it uses MAC address.
 The packet is directed only to intended port & reduce traffic.

08/22/2022 39
Cont’
39

• Router
o Router is used to connect different network.
o It is the best and most complicated of the three.
o Enable all networked computers to share a single Internet
connection, which saves money.

08/22/2022 40
Cont’
40

N.B
⚫ A firewall is hardware or software based networking device

that controls access to your organization’s network.


⚫ A modem is a device that converts the digital signals

generated by a computer into analog signals that can travel over


conventional phone lines.
Q: What is the function of Gateway?

08/22/2022 41
LAN(Local Area Network)
41

⚫ LAN is a network that connects a relatively small number of


machines in a relatively close geographical area.
 Cover single building or cluster of buildings.
⚫ LANs are differ from other networks by:
 Their size
 Their transmission technology
 Their topology

08/22/2022 42

42

Network 1

Routers

Network 2

Network 3 Network 4

08/22/2022 43
Ethernet Cable
43

⚫ The most common form of network cable is called

“unshielded twisted pair” (UTP).


⚫ This cable format is used for the Ethernet standards,

which are managed by the Institute of Electrical and


Electronics Engineers (IEEE).
⚫ These standards are referred to by the code 802.3.

08/22/2022 44
Cont’
44

⚫ A UTP cable contains eight wires. Each individual wire is covered

in a colored plastic coating and the entire bundle is encased in an outer


shell.
⚫ Ethernet Cable is composed of 4-pair twist wirings with the following

colors.
 Green: for downloading
 Orange: for sending a data
 Blue used to increase bandwidth
 Brown
Read about DTE and
DCE!
08/22/2022 45
Cable Category
45

Category Data Rate Signal Frequency Standard


Cat5 100 Mbps 100 MHz DTETIA/EIA
Cat5e 100 Mbps /1 Gbps 100 MHz TIA/EIA-568-B
Cat6 1Gbps / 10 Gbps 250 MHz TIA/EIA-568-B
ANSI/TIA/EIA-
Cat6a 1Gbps / 10 Gbps 500 MHz
568-B.2-10

The most frequently used type of cable used to a


connecting LAN is 4 twisted pair un-shielded cable, as
often referred to Ethernet cable!

08/22/2022 46
Ethernet Cable
46

Cross-over Straight through


Color Pin (T568B) Color Pin (T568A)
White/Orange 1 White/Green 1
Orange 2 Green 2
White/Green 3 White/orange 3
Blue 4 Blue 4
White/Blue 5 White/Blue 5
Green 6 Orange 6
White/Brown 7 White/Brown 7
Brown 8 Brown 8

08/22/2022 47
Cont’
47

⚫ Because of the way cable twists, ends should

follow standards like the following.

08/22/2022 48
Cont’
48

Connection Rules:
Unlike devices
⚫ Straight- through

Like devices:
⚫ Cross-over

08/22/2022 49
Cont’
49

⚫ Use straight through cable for connecting different devices.


 Switch to router
 Computer to switch
 Computer to hub
⚫ Use cross over cable for connecting same layer devices
 Switch to switch
 Hub to hub
 Router to router
 Computer to computer

08/22/2022 50
Cont’
50

Materials needed for cabling:


⚫ Crimper

⚫ RJ45 connector

⚫ Cutter

⚫ Cat5/6 cable

⚫ Tester

08/22/2022 51
How to wire
51

⚫ Strip off suitable length of the


cable sheath.
 About 2-2.5 cm
 You can mark the position
first.

08/22/2022 52
Cont’
52

⚫ Align the colored wires according to the specific

order.

1 2345 678

08/22/2022 53
Cont’
53

⚫ Straight Through
 All order of the wirings is the same as the other side.

1→8
1 2345 678 1 2345 678

08/22/2022 54
Cont’
54

⚫ Straight Through

Host A Host B
Pin Usage Color Color Usage Pin
1 Tx+ Tx+ 1
2 Tx- Tx- 2
3 Rx+ Rx+ 3
4 -- -- 4
5 -- -- 5
6 Rx- Rx- 6
7 -- -- 7
8 -- -- 8

08/22/2022 55
Cont’
55

⚫ Crossover
 We need to change the order of the transmission and receiving

wirings.
1→8
1 2345 678 1 2345 678

08/22/2022 56
Cont’
56

⚫ Crossover

Host A Host B
Pin Usage Color Color Usage Pin
1 Tx+ Tx+ 1
2 Tx- Tx- 2
3 Rx+ Rx+ 3
4 -- -- 4
5 -- -- 5
6 Rx- Rx- 6
7 -- -- 7
8 -- -- 8

08/22/2022 57
Cont’
57

⚫ Trim all the wires to the same length.

08/22/2022 58
Cont’
58

⚫ Insert the wires into the RJ45 plug.


⚫ Crimp the RJ45 plug with the crimping tool.
⚫ Testing and Verification

08/22/2022 59
08/22/2022 60

You might also like