Sie sind auf Seite 1von 15

MMC

Unit-5

MM Networks

UNIT 5: MULTIMEDIA INFORMATION NETWORKS


Contents: 1) Introduction 2) LAN 3) Ethernet 4) Token ring 5) Bridges 6) FDDI 7) High-speed LANs

Instructional Objectives: At the end of the unit, the students should be able to:

1 BSS ECE, REVA

1. INTRODUCTION:
With the rapid paradigm shift from conventional circuit-switching telephone networks to the packet-switching, data-centric, and IP-based internet, networked multimedia computer applications have created a tremendous impact on computing and network infrastructures. More specifically, most multimedia content providers, such as news, television, and the entertainment industry have started their own streaming infrastructures to deliver their content, either live or on-demand. Numerous multimedia networking applications have also matured in the past few years, ranging from distance learning to desktop video conferencing, instant messaging, workgroup collaboration, multimedia kiosks, entertainment, and imaging.

2. LAN:
A LAN is a high-speed, fault-tolerant data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, and other devices. LANs offer computer users many advantages, including shared access to devices and applications, file exchange between connected users, and communication between users via electronic mail and other applications.3 LAN implementations that are used most commonly:

MMC

Unit-5

MM Networks

2.1 LAN protocols and OSI reference model LAN protocols function at the lowest two layers of the OSI reference model, as discussed in chapter 1, internetworking basics, between the physical layer and the data link layer. The following figure illustrates how several popular LAN protocols map to the OSI reference model.

2.2 LAN media-access methods: LAN protocols typically use one of two methods to access the physical network medium: carrier sense multiple access collision detect (CSMA/CD) and token passing. In the CSMA/CD media-access scheme, network devices contend for use of the physical network medium. CSMA/CD is therefore sometimes called contention access. Examples of LAN that uses the CSMA/CD media-access scheme are Ethernet/IEEE 802.3 networks, including 100baset in the token-passing media-access scheme, network devices access the physical medium based on possession of a token. Examples of LANS that use the tokenpassing media-access scheme are token ring/IEEE 802.5 and FDDI. 2.3 LAN transmission methods: LAN data transmissions fall into three classifications: unicast, multicast, and broadcast. in each type of transmission, a single packet is sent to one or more nodes. In a unicast transmission, a single packet is sent from the source to a destination on a network. First, the source node addresses the packet by using the address of the destination node. The
3 BSS ECE, REVA

package is then sent onto the network, and finally, the network passes the packet to its destination. A multicast transmission consists of a single data packet that is copied and sent to a specific subset of nodes on the network. First, the source node addresses the packet by using a multicast address. The packet is then sent into the network, which makes copies of the packet and sends a copy to each node that is part of the multicast address. A broadcast transmission consists of a single data packet that is copied and sent to all nodes on the network. In these types of transmissions, the source node addresses the packet by using the broadcast address. The packet is then sent into the network, which makes copies of the packet and sends a copy to every node on the network. 2.4 LAN topologies: LAN topologies define the manner in which network devices are organized. four common LAN topologies exist: bus, ring, star, and tree. These topologies are logical architectures, but the actual devices need not be physically organized in these configurations. Logical bus and ring topologies, for example, are commonly organized physically as a star. a bus topology is a linear LAN architecture in which transmissions from network stations propagate the length of the medium and are received by all other stations. of the three most widely used LAN implementations, ETHERNET/IEEE 802.3 networks including 100baset, implement a bus topology, which is illustrated in figure.

A ring topology is a LAN architecture that consists of a series of devices connected to one another by unidirectional transmission links to form a single closed loop. Both token ring/IEEE 802.5 and FDDI networks implement a ring topology. A star topology is a LAN architecture in which the endpoints on a network are connected to a common central hub, or switch, by dedicated links. LOGICAL bus and ring topologies are often implemented physically in a star topology, which is illustrated in figure. A tree topology is a LAN architecture that is identical to the bus topology, except that branches with multiple nodes are possible in this case.

0100090000032a0200000200a20100000000a201000026060f003a03574d46430100000000000100 3a9e0000000001000000180300000000000018030000010000006c00000000000000000000003500 00006f0000000000000000000000a92000001d19000020454d460000010018030000120000000200 00000000000000000000000000002413000000190000cf0000000f010000000000000000000000000 0009828030098220400160000000c000000180000000a00000010000000000000000000000009000 00010000000b7070000ef050000250000000c0000000e000080250000000c0000000e000080120000 000c00000001000000520000007001000001000000a4ffffff00000000000000000000000090010000 0000000004400022430061006c006900620072006900000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000000012006cd01200

MMC

Unit-5

MM Networks

10000000d0d3120050d1120052516032d0d31200c8d012001000000038d21200b4d312002451603 2d0d31200c8d012002000000049642f31c8d01200d0d3120020000000ffffffff5c2bd700d0642f3126 000600ffff0180ffff01800fff0180ffffffff000000000008000000080000d4fbb1050100000000000000 5802000025000000372e90010000020f0502020204030204ef0200a07b20004000000000000000009 f00000000000000430061006c00690062007200000000000048030e70a06032eeba176e3c2bd70060 4bc800fcd012009c382731080000000100000038d1120038d11200e87825310800000060d112005c 2bd7006476000800000000250000000c00000001000000250000000c00000001000000250000000c 00000001000000180000000c0000000000000254000000540000000000000000000000350000006f0 0000001000000052f8740008087400000000057000000010000004c00000004000000000000000000 0000b7070000ef050000500000002000eab93600000046000000280000001c0000004744494302000 000ffffffffffffffffb8070000f1050000000000004600000014000000080000004744494303000000250 000000c0000000e000080250000000c0000000e0000800e0000001400000000000000100000001400 00000400000003010800050000000b0200000000050000000c02ce000c01040000002e0118001c000 000fb020200010000000000bc02000000000102022253797374656d0000000000000000000000000 000000000000000000000000000040000002d010000040000002d01000004000000020101001c000 000fb02f4ff0000000000009001000000000440002243616c69627269000000000000000000000000 00000000000000000000000000040000002d010100040000002d010100040000002d010100050000 000902000000020d000000320a0c00000001000400000000000b01ce00207f0700040000002d0100 00040000002d010000030000000000

0100090000032a0200000200a20100000000a201000026060f003a03574d46430100000000000100 3a9e0000000001000000180300000000000018030000010000006c00000000000000000000003500 00006f0000000000000000000000a92000001d19000020454d460000010018030000120000000200 00000000000000000000000000002413000000190000cf0000000f010000000000000000000000000 0009828030098220400160000000c000000180000000a00000010000000000000000000000009000 00010000000b7070000ef050000250000000c0000000e000080250000000c0000000e000080120000 000c00000001000000520000007001000001000000a4ffffff00000000000000000000000090010000 0000000004400022430061006c006900620072006900000000000000000000000000000000000000 0000000000000000000000000000000000000000000000000000000000000000000012006cd01200 10000000d0d3120050d1120052516032d0d31200c8d012001000000038d21200b4d312002451603
5 BSS ECE, REVA

2d0d31200c8d012002000000049642f31c8d01200d0d3120020000000ffffffff5c2bd700d0642f3126 000600ffff0180ffff01800fff0180ffffffff000000000008000000080000d4fbb1050100000000000000 5802000025000000372e90010000020f0502020204030204ef0200a07b20004000000000000000009 f00000000000000430061006c00690062007200000000000048030e70a06032eeba176e3c2bd70060 4bc800fcd012009c382731080000000100000038d1120038d11200e87825310800000060d112005c 2bd7006476000800000000250000000c00000001000000250000000c00000001000000250000000c 00000001000000180000000c0000000000000254000000540000000000000000000000350000006f0 0000001000000052f8740008087400000000057000000010000004c00000004000000000000000000 0000b7070000ef050000500000002000eab93600000046000000280000001c0000004744494302000 000ffffffffffffffffb8070000f1050000000000004600000014000000080000004744494303000000250 000000c0000000e000080250000000c0000000e0000800e0000001400000000000000100000001400 00000400000003010800050000000b0200000000050000000c02ce000c01040000002e0118001c000 000fb020200010000000000bc02000000000102022253797374656d0000000000000000000000000 000000000000000000000000000040000002d010000040000002d01000004000000020101001c000 000fb02f4ff0000000000009001000000000440002243616c69627269000000000000000000000000 00000000000000000000000000040000002d010100040000002d010100040000002d010100050000 000902000000020d000000320a0c00000001000400000000000b01ce00207f0700040000002d0100 00040000002d010000030000000000

2.5 LAN devices: Devices commonly used in LANS include repeaters, hubs, LAN extenders, bridges, LAN switches, and routers. A repeater is a physical layer device used to interconnect the media segments of an extended network. a repeater essentially enables a series of cable segments to be treated as a single cable. Repeaters receive signals from one network segment and amplify, retime, and retransmit those signals to another network segment. These actions prevent signal deterioration caused by long cable lengths and large numbers of connected devices. Repeaters are incapable of performing complex filtering and other traffic processing. In addition, all electrical signals, including electrical disturbances and other errors, are repeated and amplified. The total number of repeaters and network segments that can be connected is limited due to timing and other issues. The following figure illustrates a repeater connecting two network segments.

MMC

Unit-5

MM Networks

A hub is a physical-layer device that connects multiple user stations, each via a dedicated cable. Electrical interconnections are established inside the hub. Hubs are used to create a physical star network while maintaining the logical bus or ring configuration of the LAN. In some respects, a hub functions as a multiport repeater. A LAN extender is a remote-access multilayer switch that connects to a host router. LAN extenders forward traffic from all the standard network-layer protocols (such as IP, IPX, and Appletalk), and filter traffic based on the MAC address or network-layer protocol type. LAN extenders scale well because the host router filters out unwanted broadcasts and multicasts. LAN extenders, however, are not capable of segmenting traffic or creating security firewalls. The following figure illustrates multiple LAN extenders connected to the host router through a WAN.

3. ETHERNET: Ethernet networks and the more recent derivative ieee802.3 are used extensively in technical and office environment.
3.1 CSMA/CD All the stations are attached directly to the same cable/bus ,it is said to operate in a multiple access mode. The bus operates in the broadcast mode which means that every frames transmitted is received by all the other stations that are attached to the bus because of the broadcast mode ,this will result in the contents of the two frames being corrupted.
7 BSS ECE, REVA

collision signal is generated by physical layer. Jam signal (collision enforcement): to make sure that all stations involved in the collision will detect collision. a pattern of 32 bits. Collision backoff and retransmission method (truncated binary exponential backoff algorithm, beba): o n : number of collisions experienced (n <= 16) o k : min (n,10) -- truncation o r : random delay time (unit: slot time) between 0 <= r < 2k

MMC

Unit-5

MM Networks

The protocol for the CSMA/CD is illustrated below:

4. TOKEN RINGS:
All the stations are connected together by a set of unidirectional links in the form of a ring and all frame transmissions between any of the stations take place over it by circulating the frame around the ring. Only one frame transfer around the ring can be in progress over the ring at a time.

9 BSS ECE, REVA

Passing the token: In CSMA/CD (802.3) starvation may occur, i.e., stations can wait forever to transmit. In token bus, every station has a chance to transmit (token) therefore - no collisions. It is contention-free. Token passes around in pre-defined order and once station acquires token, it can start transmitting. When complete, the token is passed onto the next station. Stations transmitting: However there is limited efficiency due to passing of the token. It is most commonly used MAC protocol for ring topologies. It also uses a special-purpose, circulating frame, or token (3 bytes). Station that wants to transmit waits till token passes by. When station wants to transmit: Waits for token. Seizes it by changing 1 bit and token becomes start-of-frame sequence. Station appends remainder of frame. When station seizes token and begins transmission, theres no token on the ring; so nobody else can transmit. Transmitting station inserts a new token when the station completes frame transmission and the leading edge of frame returns to it after a round-trip. Under light load, inefficiency due to waiting for the token to transmit. Under a heavy load, round-robin is fair and efficient. In fact this is one of the major advantages of the token ring. The monitoring station however is responsible for ring maintenance (removing duplicates, inserting token). Token ring frame format:

MMC

Unit-5

MM Networks

SD: starting delimiter; indicates starting of frame. AC: access control. FC: frame control; if LLC data or control. DA and SA: destination and source addresses. FCS: frame check sequence. ED: ending delimiter; contains the error detection bit e; contains frame continuation bit i (multiple frame transmissions). FS: frame status. Token ring priorities: There is an optional priority mechanism in 802.5. It has 3 priority bits: 8 priority levels. Service priority: priority of current token. Station can only transmit frame with priority >= service priority. Reservation bits allow station to influence priority levels trying to reserve next token. Generally a station waits for frame to come back before issuing a new token. This can lead to low ring utilization. Therefore there is an early token release (ETR) option where a station may release token as soon as it completes transmission. Token ring summary: a token ring is: Efficient at heavy traffic. Guaranteed delay. Fair. Supports priorities. But, ring/token maintenance overhead.

5. BRIDGES:
There are two types of bridges, the one are used with Ethernet LANS, knows as transparent bridges , and the others with token ring LANS, known as source routing bridges.

11 BSS ECE, REVA

5.1 Transparent Bridges: With a transparent bridge, as with a repeater, the presence of one (or more) bridges in a route between two communicating stations is transparent to the two stations. All routing decisions are made exclusively by the bridge(s). A bridge maintains a forwarding database and bridge learning is achieved by forwarding database to be created in advance.

5.2 SOURCE ROUTING BRIDGES: The major difference between a LAN base on source routing bridges and one base on spanning tree bridges is that with the latter the bridges collectively perform the routing operation in a way that is transparent to the end stations. Conversely, with source routing, the end stations perform the routing function.

MMC

Unit-5

MM Networks

6. FDDI:
FDDI is an optical fiber-based ring network that supports a bit rate of 100 mbps. It can be used for the interconnection of segments spread over a wider geographical area than a single building, such as a university campus or manufacturing plant. Fiber distributed data interface is similar to 802.5 with some changes due to higher data rates.

7. HIGH SPEED LANS:


The high speed LANS that are generally used are: 13 BSS ECE, REVA

7.1 FAST ETHERNET: Fast ethernet was to use the same shared, half-duplex transmission mode as ethernet but to obtain a*10 increase in operational bit rate over 10baset while at the same time retaining the same wiring systems , MAC method , and frame format. The major technological hurdle to overcome with fast ethernet was to achieve a bit rate of 100mbps over 100m of UTP cable. Detects a collision by detecting a signal on pair 2 while it is transmitting and , the hub detects a collision by the presence of a signal on pair 1

FAST ETHERNET SWITCHED FAST ETHERNET GIGABIT ETHERNET

7.2 SWITCHED FAST ETHERNET: In order to allow multiple access/transfers to be in progress concurrently, two developments have been made: Switch hub architecture. Duplex working over the circuits that connect the stations to the hub.

MMC

Unit-5

MM Networks

15 BSS ECE, REVA

Das könnte Ihnen auch gefallen