Beruflich Dokumente
Kultur Dokumente
Chapter 16
Topic : Networking Principles
Date of Creation : 21.03.2011
BSNL, India
Page: 1
NETWORKING PRINCIPLES
Introduction
Networking means interconnection of computers. These computers can be linked together
for different purposes and using a variety of different cabling types.
Take for example a typical office scenario where a number of users require access to
some common information. As long as all user computers are connected via a network,
they can share their files, exchange mail, schedule meetings, send faxes and print
documents all from any point of the network. It is not necessary for users to transfer files
via electronic mail or floppy disk, rather, each user can access all the information they
require, thus leading to less wastage of time and hence increased productivity.
Imagine the benefits of a user being able to directly fax the Word document they are
working on, rather than print it out, then feed it into the fax machine, dial the number etc.
Small networks are often called Local Area Networks (LAN). A LAN is a network
allowing easy access to other computers or peripherals. The typical characteristics of a
LAN are :
physically limited distance (< 2km)
high bandwidth (> 1mbps)
inexpensive cable media (coax or twisted pair)
data and hardware sharing between users
owned by the user
The factors that determine the nature of a LAN are:
Topology
Transmission medium
Medium access control technique
BSNL, India
Page: 2
LAN Topologies
The common topologies for LANs are bus, tree, ring, and star. The bus is a special case
of the tree, with only one trunk and no branches.
Bus and Tree Topologies
Bus and Tree topologies are characterized by the use of a multi-point medium. For the
bus all stations attach, through appropriate hardware interfaces known as a Tap, directly
to a linear transmission medium, or bus. Full-duplex operation between the station and
the tap permits data to be transmitted onto the bus and received from the bus. A
transmission from any station propagates throughout the length of the medium in both
directions and can be received (heard) by all other stations. At each end of the bus is a
terminator, to avoid reflection of signals.
Tap
Flow of data
Terminating
Resistance
Flow of data
Terminating
Resistance
Station
Head end
The tree topology is a generalization of the bus topology. The transmission medium is a
branched cable with no closed loops. The tree layout begins at a point known as the headend, where one or more cable start, and each of these may have branches. The branches
BSNL, India
Page: 3
in turn may have additional branches. Transmission from any station propagates
throughout the medium and can be received (heard) by all other stations.
However, there are two problems in this arrangement. First, since a transmission from
any one station can be received by all other stations, there needs to be some way of
indicating that for whom the transmission is intended. Second, a mechanism is needed to
regulate the transmission. To visualise the logic behind this, consider that if two stations
on the bus attempt to transmit at the same time, their signals will overlap and become
garbled. Or, consider that one station decides to transmit continuously for a long period
of time.
To solve these problems, stations transmit data in small blocks, known as frames. Each
frame consists of a portion of data that a station wishes to transmit, plus a frame header
that contains control information. Each station on the bus is assigned a unique address, or
identifier, and the destination address for a frame is included in its header.
Figure 4 illustrates the concept. In this example, station C wishes to transmit a frame of
data to A. The frame header includes As address. As the frame propagates along the bus,
it passes B, which observes the address and ignores the frame. A, on the other hand, sees
that the frame is addressed to itself and therefore copies the data from the frame as it goes
by.
A
BSNL, India
Page: 4
So the frame structure solves the first problem mentioned above: It provides a mechanism
for indicating that who is the intended recipient of data. It also provides the basic tool for
solving the second problem, i.e. regulation of access. In particular, the station take turns
sending frames in some co-operative fashion; this involves putting additional control
information into the frame header.
Ring Topology
In the ring topology, the network consists of a set of repeaters joined by point-to point
links in a closed loop. The repeater is a comparatively simple device, capable of receiving
data on one link and transmitting them, bit by bit, on the other link as quickly as they are
received, with no buffering at the repeater. The links are unidirectional, i.e. data is
transmitted in one direction (clockwise or counter-clockwise).
Each station is attached to the network at a repeater and can transmit data onto the
network through that repeater.
Fig 3 Ring
Topology
As with the bus and tree, data is transmitted in frames. As a frame circulates past all other
stations, the destination station recognizes its address and copies the frame into a local
buffer as it goes by. The frame continues to circulate until it reaches the source station,
where it is ultimately removed
Because multiple stations share the ring , medium access control is needed to determine
when each station may insert frames.
BSNL, India
Page: 5
C
C
A
A
A
A
(a)
C transmits a frame
addressed to A
as it goes by
C
A
B
B
A
A
(b) Frame is not addressed to B
therefore B ignores it
Fig. 4
(d)
C absorbs the
returning frame
Star Topology
In the Star type topology, each station is directly connected to a common central node.
Typically, each station attaches to a central node, referred to as the star coupler, via two
point-to point links, one for transmission in each direction.
In general, there are two alternatives for the operation of the central node :
One method is for the central node to operate in a broadcast fashion. The transmission of
a frame from one station to the Central Node is retransmitted in all of the outgoing links.
In this case, although the arrangement is physically a star, it is logically a bus; a
transmission from any station is received by all other stations, and only one station at a
time may transmit (successfully).
BSNL, India
Page: 6
Another method is for the central node to act as a frame switching device. An incoming
frame is buffered in the node and then retransmitted on an outgoing link to the destination
station.
Central Hub,
Switch/
Repeater
Fig 5
BSNL, India
Page: 7
The second parameter, how, is determined by the topology and is a trade-off among
competing factors such as- including cost, performance, and complexity. Access control
techniques could follow the same approach used in circuit switching, viz. frequencydivision multiplexing (FDM), and synchronous time-division multiplexing (TDM). Such
techniques are generally not suitable for LANs because the data transmission needs of the
stations are unpredictable. It is desirable to allocate capacity in an asynchronous
(dynamic) fashion, more or less in response to immediate demand. The asynchronous
approach can be further subdivided into three categories: round robin, reservation and
contention.
Round Robin
With Round robin, each station in turn is given an opportunity to transmit. During that
period, the station may decline to transmit or may transmit subject to a specified upper
bound, usually expressed as a maximum amount of data transmitted or time for this
opportunity. In any case, the station, when it is finished, relinquishes its turn, and the
right to transmit passes to the next station in logical sequence. Control of this sequence
may be centralized or distributed. Polling is an example of a centralized technique.
When many stations have to transmit data over an extended period of time, round robin
techniques can be very efficient. If only a few stations have data to transmit over an
extended period of time, then there is a considerable overhead in passing the turn from
station to station, as most of the stations will not transmit but simply pass their turns.
Under such circumstances, other techniques may be preferable, largely depending on
whether the data traffic has a stream or bursty characteristic. Stream traffic is
characterized by lengthy and fairly continuous transmissions; examples are voice
communication, telemetry, and bulk file transfer. Bursty traffic is characterized by short,
sporadic transmissions, (interactive terminal-host traffic fits this description).
BSNL, India
Page: 8
Reservation
For stream traffic, reservation techniques are well suited. In general, for these techniques,
time on the medium is divided into slots, similar to synchronous TDM. A station wanting
to transmit, reserves future slots for an extended or even an indefinite period. Again,
reservations may be made in a centralised or distributed manner.
Contention
For bursty traffic, contention techniques are more appropriate. With these techniques, no
control is required to determine whose turn it is; all stations contend for time. These
techniques are by nature distributed. Their principal advantage is that they are simple to
implement and, under light to moderate load, quite efficient. For some of these
techniques, however, performance tends to collapse under heavy load.
Although both centralised and distributed reservation techniques have been implemented
in some LAN products, round robin and contention techniques are the most common.
The specific access techniques are discussed further in this chapter. Table 2 lists the
MAC protocols that are defined in LAN standards.
Table 2
Ring Topology
Token Ring
(IEEE 802.5 & FDDI)
Switched Topology
Round Robin
Request/ Priority
(IEEE 802.12)
Reservation
Contention
CSMA/CD
(IEEE 802.3)
BSNL, India
Page: 9
implements these functions, by making use of protocol data unit at its layer; in this case,
the PDU is referred to as a MAC frame.
The exact format of the MAC frame differs for the various MAC protocols in use. In
general, all of the MAC frames have a format similar to that of Figure 6. The fields of
this frame are:
MAC control: This field contains any protocol control information needed for
the functioning of the MAC protocol. For example, a priority level could be
indicated here.
Source MAC Address: The source physical attachment point on the LAN for this
frame.
CRC: The cyclic redundancy check field (also known as the frame check
sequence, FCS, field). This is an error-detecting code, as we have seen in HDLC
and other data link control protocols
MAC
Frame
MAC
control
Destination
Source
MAC Address MAC Address
1 or 2
1 octet
LLC
PDU
DSAP
I/G
SSAP
CRC
Variable
LLC control
DSAP value
LLC PDU
Information
C/R
SSAP value
BSNL, India
Page: 10
twisted pair
coaxial
fiber optic
BSNL, India
cost
distance
speed
Page: 11
Repeaters
Repeaters extend the network segments. They amplify the incoming signal received from
one segment and send it on to all other attached segments. This allows the distance
limitations of network cabling to be extended. There are limits on the number of repeaters
which can be used. The repeater counts as a single node in the maximum node count
associated with the Ethernet standard (30 for thin coax).
Repeaters also allow isolation of segments in the event of failures or fault conditions.
Disconnecting one side of a repeater effectively isolates the associated segments from the
network.
Using repeaters simply allows you to extend your network distance limitations. It does
not give you any more bandwidth or allow you to transmit data faster.
Repeater
Workstation
BSNL, India
Page: 12
Bridges
Bridges interconnect Ethernet segments. Most bridges today support filtering and
forwarding, as well as Spanning Tree Algorithm. The IEEE 802.1D specification is the
standard for bridges.
During initialization, the bridge learns about the network and the routes. Packets are
passed onto other network segments based on the MAC layer. Each time the bridge is
presented with a frame, the source address is stored. The bridge builds up a table which
identifies the segment to which the device is located on. This internal table is then used to
determine which segment incoming frames should be forwarded to. The size of this table
is important, especially if the network has a large number of workstations/ servers.
Network Segment A
Network Segment B
Bridge
BSNL, India
Page: 13
since bridges work at the MAC layer, they are transparent to higher level
protocols
used for non routable protocols like NETBEUI which must be bridged
help in localizing the network traffic by only forwarding data onto other
segments as required (unlike repeaters)
Routers
In an environment consisting of several network segments with differing protocols and
architectures, a bridge may not be adequate for ensuring fast communication among all of
the segments. A network this complex needs a device which not only knows the address
of each segment, but also determine the best path for sending data and filtering broadcast
traffic to the local segment. Such a device is called a router.
Routers work at the Network layer of the OSI model. This means they can switch and
route packets across multiple networks. They do this by exchanging protocol-specific
information between separate networks. Routers read complex network addressing
information in the packet and, because they function at a higher layer in the OSI model
than bridges, they have access to additional information.
Routers can provide the following functions of a bridge:
Routers have access to more information in the packet than bridges, and use this
information to improve packet deliveries. Routers are used in complex network situation
because they provide better traffic management than bridges and do not pass broadcast
traffic. Routers can share status and routing information with one another and use this
information to bypass slow or malfunctioning connections.
BSNL, India
Page: 14
The router selects the best route for the data based on cost & available paths.
Using the router addressing scheme, administrators can break one large network into
many separate networks, and because routers do not pass or even handle every packet,
they act as a safety barrier between network segments. This can greatly reduce the
amount of traffic on the network and the wait time experienced by users.
Routable Protocols
Not all protocols work with routers. The one that are routable include:
DECnet
IP
IPX
OSI
XNS
DDP (AppleTalk)
NetBEUI
Summary of Router features:
BSNL, India
Page: 15
provides security
Hubs
There are many types of hubs. Passive hubs are simple splitters or combiners that group
workstations into a single segment, whereas active hubs include a repeater function and
are thus capable of supporting many more connections.
Nowadays, with the advent of 10BaseT, hub concentrators are being very popular. These
are very sophisticated and offer significant features which make them radically different
from the older hubs which were available during the 1980's. These 10BaseT hubs provide
each client with exclusive access to the full bandwidth, unlike bus networks where the
bandwidth is shared. Each workstation plugs into a separate port, which runs at 10 Mbps
and is for the exclusive use of that workstation, thus there is no contention to worry about
like in Ethernet.
In standard Ethernet, all stations are connected to the same network segment in bus
configuration. Traffic on the bus is controlled using CSMA (Carrier Sense Multiple
Access) protocol, and all stations share the available bandwidth.
Backplane
PORT 1
PORT 2
PORT 3
PORT 4
BSNL, India
Page: 16
10BaseT Hubs dedicate the entire bandwidth to each port (workstation). The W/S attach
to the Hub using UTP. The Hub provides a number of ports, which are logically
combined using a single backplane, which often runs at a much higher data rate than that
of the ports.
Ports can also be buffered, to allow packets to be held in case the hub or port is busy.
And, because each workstation has its own port, it does not contend with other
workstations for access, having the entire bandwidth available for its exclusive use.
The ports on a hub all appear as one Ethernet segment. In addition, hubs can be stacked
or cascaded (using master/ slave configurations) together, to add more ports per segment.
As hubs do not count as repeaters, this is a better solution for adding more workstations
than the use of a repeater.
Hub options also include an SNMP (Simple Network Management Protocol) agent. This
allows the use of network management software to remotely administer and configure the
hub.
Each port has exclusive access to its bandwidth (no CSMA/ CD)
BSNL, India
Page: 17
Ethernet Features
Ethernet media is passive which means it draws power from the computer and thus will
not fail unless the media is physically cut or improperly terminated.
The following list summarizes Ethernet features:
Traditional topology
Other Topologies
Type of Architecture
Access Method
Specifications
Transfer Speed
Cable Types
Linear Bus
Star Bus
Baseband
CSMA/ CD
IEEE 802.3
10 Mbps or 100 Mbps
Thicknet, Thinnet, UTP
xxxx
BSNL, India
Page: 18
BSNL, India
Page: 19