Lecture 4
Lecture 4
LAN: Ethernet,
CSMA/CD,HUB,
Repeater
1
A Typical LAN
2
Local Area Network (LAN)
Topology Review
3
LAN Device & Host
Devices that
connect directly to a
network segment
are referred to as
hosts.
These hosts include
computers, both
clients and servers,
printers, scanners,
and many other user
devices. 4
Network Interface Card (NIC)
Host devices are not
part of any layer.
They have a
physical connection
to the network
media by a network
interface card (NIC)
The other OSI layers
are performed in
software inside the
host 5
6
NIC & MAC Address
Each individual NIC throughout the world
carries a unique code, called a Media Access
Control (MAC) address.
This address is used to control data
communication for the host on the network.
7
Network Media
The basic functions of
media are to carry a
flow of information, in
the form of bits and
bytes, through a LAN.
Other than wireless
LANs networking
media confine network
signals to a wire,
cable, or fiber.
Networking media are
considered Layer 1
components of LANs. 8
Selecting Media
Each media has advantages and
disadvantages, what is an advantage for one
media might be a disadvantage for another
Some of the advantages and disadvantages
are:
Cable length
Cost
Ease of installation
Total number of computers on the media
9
Ethernet : it’s Origin..
In the late 1960s, the University of Hawaii
developed a WAN called ALOHA.
In 1972, Robert Metcalfe and David Boggs
invented a cabling and signaling scheme at
the Xerox Palo Alto Research Center (PARC)
and in 1975 introduced the first Ethernet
product s a system of 2.94 megabits per
second (Mbps) to connect over 100
computers on a 1-kilometer (.62 miles) cable.
10
Ethernet Specifications
Inthe 1980s the IEEE published Project 802.
This project generated standards for design
and compatibility for hardware components
that operated within the OSI physical and
data-link layers.
The standard that pertains to Ethernet is the
IEEE 802.3 specification.
11
Ethernet Features
This baseband architecture uses a bus
topology, usually transmits at 10 Mbps, a
Relies on CSMA/CD to regulate traffic on the
main cable segment.
The Ethernet media is passive ,it requires no
power source of its own
This will not fail unless the media is
physically cut or improperly terminated.
12
Ethernet Summary
Traditional topology: Linear bus
Other topologies: Star bus
13
Network Operating Systems
on Ethernet
Microsoft Windows 95, Windows 98, and Windows 2000.
Microsoft Windows NT Workstation and Windows NT
Server.
Microsoft Windows 2000 Professional and Windows
2000 Server.
Microsoft LAN Manager.
Microsoft Windows for Workgroups.
Novell NetWare.
IBM LAN Server.
AppleShare.
UNIX.
14
Ethernet Specifications (IEEE
802.3) 10BaseT
Topology: Star bus
Cable type: Category 3, 4, or 5 unshielded twisted-pair cable
15
Access method: CSMA/CD
The set of rules that defines how a computer
puts data onto the network cable and takes
data from the cable is called an access
method.
Once data is moving on the network, access
methods help to regulate the flow of network
traffic.
16
Traffic Control on the Cable
If data is to be sent over the network from
one user to another there must be some way
for the data to access the cable without
running into other data.
If different computers were to use different
access methods, the network would fail
because some methods would dominate the
cable.
Access methods prevent computers from
gaining simultaneous access to the cable.
17
Major Access Methods
Carrier-sense multiple access methods (with
collision detection or with collision
avoidance).
Token-passing methods that allow only a
single opportunity to send data.
Demand-priority methods.
18
CSMA/CD Access Method
Only when a computer "senses" that the
cable is free and that there is no traffic on the
cable it can send data.
Once the computer has transmitted data on
the cable, no other computer can transmit
data until the original data has reached its
destination and the cable is free again.
Remember, if two or more computers happen
to send data at exactly the same time, there
will be a data collision.
19
… CSMA/CD
When that happens, the two computers
involved stop transmitting for a random
period of time and then attempt to retransmit.
Each computer determines its own waiting
period; this reduces the chance that the
computers will once again transmit
simultaneously.
20
… CSMA/CD
The name of the access method—carrier-
sense multiple access with collision detection
(CSMA/CD)—makes sense. Computers
listen to or "sense" the cable (carrier-sense).
Commonly, many computers on the network
attempt to transmit data (multiple access);
each one first listens to detect any possible
collisions.
If a computer detects a possible collision, it
waits for a random period of time before
retransmitting (collision detection).
21
Contention Method
CSMA/CD is known as a contention method
because computers on the network contend,
or compete, for an opportunity to send data.
Current implementations of CSMA/CD are so
fast that users are not even aware they are
using a contention access method.
22
CSMA/CD Considerations
CSMA/CD can be a slow-access method.
The occurrence of this problem depends on
the number of users attempting to use the
network and which applications they are
using.
23
HUB
24
…HUB
28
… Classification of Hub
Intelligent and Dumb hubs
Intelligent hubs have console ports, which
means they can be programmed to manage
network traffic.
Dumb hubs simply take an incoming
networking signal and repeat it to every port
without the ability to do any management.
29
Repeater
The maximum length for UTP(CAT-5) cable in
a network, is 100 meters (approximately 333
feet). If we need to extend our network beyond
that limit, we must add a device called a
repeater
As signals travel along a cable, they degrade
and become distorted in a process called
"attenuation” .If a cable is long enough,
attenuation will finally make a signal
unrecognizable. Installing a repeater enables
signals to travel farther. 30
How Repeaters Work
A repeater works at
the physical layer of
the OSI Reference
Model to regenerate
the network's
signals and resend
them out on other
segments.
31
…Repeater
The repeater takes a weak signal from one
segment, regenerates it, and passes it to the
next segment.
To pass data through the repeater from one
segment to the next, the packets and the
Logical Link Control (LLC) protocols must be
identical on each segment.
A repeater will not enable communication, for
example, between an 802.3 LAN (Ethernet)
and an 802.5 LAN (Token Ring).
32
…Repeater
Repeaters do not translate or filter signals.
For a repeater to work, both segments that
the repeater joins must use the same access
method. The two most common access
methods are carrier-sense multiple-access
with collision detection (CSMA/CD) and token
passing.
Repeaters can move packets from one kind
of physical media to another, Ethernet packet
coming from a thinnet coaxial-cable segment
and pass it on to a fiber-optic segment. 33
Repeater Considerations
Repeaters afford the least expensive way to
expand a network.
No Isolation or Filtering
34
Use a repeater to:
Connect two segments of similar or dissimilar
media.
Regenerate the signal to increase the distance
transmitted.
Pass all traffic in both directions.
Connect two segments in the most cost-
effective manner.
35
Do not use a repeater when:
There is heavy network traffic.
Segments are using different access
methods.
Data filtering is needed.
36