Mod 2
Mod 2
This module deals with basic topology of a network: both physical and logical. The common physical topologies like bus, ring, star etc are dealt with here. In addition, the transmission methods underlying the various IEEE standards like Ethernet, LLC, token ring, FDDI and wireless networks are described.
Lessons covered in this module LAN Topologies
Topic 1 Topology
A network topology refers to the physical arrangements, or the networks layout in which all the devices are interconnected to communicate on the network. It defines manner in which cables are arranged.
The network topology is classified into two main categories. Physical Topology Logical Topology
Physical topology of a network refers to the configuration of cables, computers, and other peripherals. Logical topologies are bound to the network protocol which directs the data transfer across a network.
Topic 1 Topology
BUS Topology
Bus topology is the cheapest, simplest and the most common method of networking systems where multiple computers and network devices are connected in a single line using single cable.
Topic 1 Networking
Features
All workstations connect to the same cable segment
Advantages East to implement and extend. Well suited for temporary networks Cheapest topology to implement Failure of one station does not affect ithers Small networks do not require high speeds. 7
Disadvantages Difficult to administer or troubleshoot. Limited cable length and number of stations Maintenance costs may be higher in the long run Failure of one cable can disable the entire network. Large networks fail to pass signals with low speed
Topic 1 Topology
Ring Topology
In ring topology, all the systems are connected to one another forming a large circle in a closed loop, so that each system is connected directly to other systems, one on either side of it. The data sent in the form of packets around the ring until it reaches the final destination.
Topic 1 Topology
Advantages Data travels I one direction at high speeds of transmission of data. When using a co axial cable to create a ring network the service becomes much faster. Disadvantages Numerous connections to the other systems slow down the network activity If one node fails, the rest of the network could also fail.
Topic 1 Topology
Star Topology
Star topology is one of the most common network setup where each system on a network is connected to a central hub. The star topology uses an individual connection for each system to prevent the network failure. Data is transmitted from the main system through the hub to all the systems on the network.
10
Topic 1 Topology
Advantages
Easy to implement and extend even in large networks.
Disadvantages
It has limited cable length and number of stations.
11
Topic 1 Topology
Mesh Topology
Mesh topology is a type of wireless network setup where each of the system and network devices are interconnected with one another in a network for the data transmission.
12
Topic 1 Topology
Hybrid Topology
The hybrid topology combines multiple topologies into one large topology. The hybrid network is common in large wide area networks. The disadvantage of the hybrid topology is that the devices on one topology cannot be placed into another topology without some hardware changes. It has the following advantages:
One company can combine the benefits of several different types of
13
15
Where DSAP: Destination Service Point SSAP: Source Service Access Point M :An integer equal to or greater than 0
16
17
Connectionless service for data communications is very similar to sending mail through the postal system (hand delivered mail): the data is sent and we hope it arrives at its destination. There is no feedback from the destination to indicate whether it arrived or not. Type 2: Connection Oriented This operational mode has sequenced numbering of frames which ensures that the frames are in the order they have been sent in. Connection Oriented service for data communications is very similar to having a phone conversation. Type 3: Acknowledged Connectionless it supports point-to-point communication only.
18
19
20
interface between the Ethernet MAC and the upper layers in the protocol stack of the end station. The LLC sub layer is defined by IEEE 802.2 standards. Bridge entity: Bridge entities provide LAN-to-LAN interfaces between LANs that use the same protocol (for example, Ethernet to Ethernet) and also between different protocols (for example, Ethernet to Token Ring). Bridge entities are defined by IEEE 802.1 standards.
21
alternating pattern of ones and zeros that tells receiving stations that a frame is coming, Start-of-frame delimiter (SOF): Consists of 1 byte. The SOF is an alternating pattern of ones and zeros, ending with two consecutive 1-bits indicating that the next bit is the left-most bit in the left-most byte of the destination address. Destination address (DA: Consists of 6 bytes. The DA field identifies which station (s) should receive the frame. Source address (SA): Consists of 6 bytes. The SA field identifies the sending station. The SA is always an individual address and the left-most bit in the SA field is always 0.
23
either the number of MAC-client data bytes that are contained in the data field of the frame, or the frame type ID if the frame is assembled using an optional format. DataIs a sequence of n bytes of any value, where n is less than or equal to 1500. If the length of the Data field is less than 46, the Data field must be extended by adding a filler (a pad) sufficient to bring the Data field length to 46 byte Frame check sequence (FCS)Consists of 4 bytes. This sequence contains a 32-bit cyclic redundancy check (CRC) value, which is created by the sending MAC and is recalculated by the receiving MAC to check for damaged frames. The FCS is generated over the DA, SA, Length/Type, and Data fields.
24
25
The CSMA/CD protocol was developed for an environment where there is no central arbitration, no access token or any assigned time slots to decide when a situation can transmit. The CSMA/CD access rules are summarized by the protocols acronym: Carrier sense: Each station continuously listens for traffic on the medium to determine when gaps between frame transmissions occur. Multiple access: Stations may begin transmitting any time they detect that the network is quiet. Collision detect: refers to the instance when two or more
26
27
into a frame by adding a header, the data and trailer information. The header would have the address. It sends this frame to the next node on the ring. The frame is then examined by each successive workstation. If it is destination it copies the message. When the frame gets back to originating node, it checks the frame to see that the frame has been viewed and then reuses. The token continues to circulate the ring and is ready to be taken by a workstation when it has a message to send.
28
29
30
31
station of the arrival of a token. Access Control (1 byte): this field contains the priority field, reservation field, token bit and a monitor bit which is used to prioritize token ring transmissions, enabling certain systems to have priority access to the token and the network. Frame Control (1 byte): This field indicates whether the frame contains data or control information. Destination Address (6 bytes): This field contains 6 byte hexadecimal address of the network adapter on the local network to which the packet will be transmitted. Source Address (6 bytes): this source address field consists of two 6-byte address field that identify the destination and the source station addresses.
by the network layer protocol, including a standard LLC header. Frame-check sequence (FCS 4 bytes): this field contains a 4 byte value packet which the receiving system uses to verify that the packet is transmitted without error. End delimiter (1 bytes): This field contains a bit pattern that signals the end of token frame. Frame Status (1 byte): The frame status field is a 1 byte field terminating a command/data frame. It indicates whether the destination system has received the frame and copied it into its buffers.
32
It uses either FHSS or DSSS. This provides 1 to 2 Mbps transmission rate on the 2.4GHz band. It uses OFDM and it provides up to 54Mbps and runs on the 5GHz band. This is also known as Wi-Fi or hi rate 802.11 which uses DSSS and applies to wireless LANs. This provides more than 20 Mbps transmission rate, applies to LANs and runs on the 2.4GHz band.
34
wireless transmissions If no activity is detected, the source node waits for a random amount of time before sending its transmission. But if activity is detected, it waits for a random amount of time and checks the transmission channel again. When the destination node receives the transmitted data, it verifies its accuracy and acknowledges its receipt by sending an acknowledgment (ACK) packet to the source. If the source node receives this acknowledgement, the transmission has completed successfully. But, if the source node does not receive the ACK packet, it assumes the transmission did not take place properly and does the CSMA/CA process again.
35
This is the basic component in the wireless network and is termed as the station (STA). A station could be a laptop, an access point or a handheld device. Any device that has the functionality of the 802.11 protocol and a connection to the wireless media is a station. Usually, it is in the hardware and software of the Network Interface Card (NIC) that the functions of 802.11 are implemented. Basic Service Set (BSS) The Basic Service Set is a group of any number of stations and is the basic building block of an 802.11 wireless LAN.
36
37
defined by the 802.11 standard. For as long as a station is turned on and has its wireless services active, it will continuously survey the surroundings for an access point. This is known as scanning. The scanning process can be either active or passive. In active scanning, the station transmits a frame known as a probe on all channels within its frequency range. If any access point gets the probe, it sends out a probe response containing required information like the status code and station ID number for that station. In passive scanning, the station listens on all channels within its frequency range for a beacon frame, a special signal that has information required for the station to relate to the access point. If there are multiple access points detected by the station, the one with the strongest signal and lowest error rate will be chosen by the station. By a process of reassociation, the station can choose a different access point.
38
IEEE 802.11 has different overheads to manage the different types of access to wireless networks like ACKs, beacons, and probes. There is a different frame type for each function: control, management and data frame types. Control frames are related to data delivery and medium access like ACK and RTS/CTS frames. Management frames are involved in association and disassociation like probe and beacon frames. Data frames, as the name suggests, carry data. The format of a 802.11 data frame is shown below:
The wireless data frame has four address fields: source address, transmitter address, receiver address, and destination address. The transmitter and receiver address is for the access point or any other intermediary device used on the network.
39
40
41
The primary transmission media used in FDDI is the optical fiber, as we had discussed before. FDDI can be used over copper cabling as well and then FDDI over copper is known as CDDI. There are a number of advantages that optical fiber has over copper wiring.
Optical
Fiber does not emit electrical signals, and therefore signals cannot be tapped thus ensuring that there is no unauthorized access to the transmitted data. It is immune to electrical interference from Radio frequency interference (RFI) and electromagnetic interference (EMI). Supports a much higher bandwidth than copper though of recent, copper cables can transmit 100 Mbps as well. FDDI permits a distance of 2 Km between stations if multi-mode fiber is used and even longer distances if single mode fibers are used.
42
and multimode. Mode refers to the ray of light that enters the fiber at an angle.
43
like frame format, addressing etc. Physical Layer Protocol (PHY): Defines framing, data encoding/decoding requirements etc. Physical Medium Dependent (PMD): Defines the characteristics of the transmission medium like power levels, bit error rates etc. Station Management (SMT): Defines FDDI station configuration, ring configuration etc.
44
45
46
each station for an upcoming frame. Starting Delimiter: This field indicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame. Frame Control: The frame control field identifies the type of frame used. It indicates the size of the address fields and whether the frame contains asynchronous or synchronous data, among other control information.
47
contains a unicast (singular), multicast (group), or broadcast (every station) address. Source address: The FDDI source address field is 6 bytes long and it identifies the single station that sent the frame. Frame Check Sequence: The frame check sequence field contains the 32 bit Cyclic Redundancy Check (CRC). The source station with a calculated cyclic redundancy check value files it dependent on frame contents. Ending Delimiter: This field contains unique symbols which indicate the end of the frame. Frame Status: The frame status field allows the source station to determine error occurrence however; it identifies whether the frame was recognized and copied by a receiving station.
Summary
Network topologies are mainly divided into physical
48
topology and logical topology. The physical topology plays an important role in the network connection. Logical topology describes the transmission of information through the network from one node to the other node. The different types of topologies are bus, ring, star and mesh topology. Each topology has its own advantage and disadvantages which differentiates each other. UTP cables can connect Ethernet systems to a hub 100Meters away and the hub repeats the signal to the other hub or computer. FDDI uses beaconing to isolate the serious failures in the ring.