Sie sind auf Seite 1von 36

Lecture:04

LAN: Ethernet,
CSMA/CD,HUB,
Repeater

1
A Typical LAN

2
Local Area Network (LAN)
Topology Review

3
LAN Device & Host
 Devices that
connect directly to a
network segment
are referred to as
hosts.
 These hosts include
computers, both
clients and servers,
printers, scanners,
and many other user
devices. 4
Network Interface Card (NIC)
 Host devices are not
part of any layer.
 They have a
physical connection
to the network
media by a network
interface card (NIC)
 The other OSI layers
are performed in
software inside the
host 5
6
NIC & MAC Address
 Each individual NIC throughout the world
carries a unique code, called a Media Access
Control (MAC) address.
 This address is used to control data
communication for the host on the network.

7
Network Media
 The basic functions of
media are to carry a
flow of information, in
the form of bits and
bytes, through a LAN.
 Other than wireless
LANs networking
media confine network
signals to a wire,
cable, or fiber.
 Networking media are
considered Layer 1
components of LANs. 8
Selecting Media
 Each media has advantages and
disadvantages, what is an advantage for one
media might be a disadvantage for another
 Some of the advantages and disadvantages
are:
 Cable length
 Cost

 Ease of installation
 Total number of computers on the media
9
Ethernet : it’s Origin..
 In the late 1960s, the University of Hawaii
developed a WAN called ALOHA.
 In 1972, Robert Metcalfe and David Boggs
invented a cabling and signaling scheme at
the Xerox Palo Alto Research Center (PARC)
and in 1975 introduced the first Ethernet
product s a system of 2.94 megabits per
second (Mbps) to connect over 100
computers on a 1-kilometer (.62 miles) cable.
10
Ethernet Specifications
 Inthe 1980s the IEEE published Project 802.
This project generated standards for design
and compatibility for hardware components
that operated within the OSI physical and
data-link layers.
 The standard that pertains to Ethernet is the
IEEE 802.3 specification.

11
Ethernet Features
 This baseband architecture uses a bus
topology, usually transmits at 10 Mbps, a
 Relies on CSMA/CD to regulate traffic on the
main cable segment.
 The Ethernet media is passive ,it requires no
power source of its own
 This will not fail unless the media is
physically cut or improperly terminated.

12
Ethernet Summary
 Traditional topology: Linear bus
 Other topologies: Star bus

 Type of architecture: Baseband

 Access method: CSMA/CD

 Specification: IEEE 802.3

 Transfer speed: 10 Mbps or 100 Mbps

 Cable type: Thicknet, thinnet, UTP

13
Network Operating Systems
on Ethernet
 Microsoft Windows 95, Windows 98, and Windows 2000.
 Microsoft Windows NT Workstation and Windows NT
Server.
 Microsoft Windows 2000 Professional and Windows
2000 Server.
 Microsoft LAN Manager.
 Microsoft Windows for Workgroups.
 Novell NetWare.
 IBM LAN Server.
 AppleShare.
 UNIX.
14
Ethernet Specifications (IEEE
802.3) 10BaseT
Topology: Star bus
Cable type: Category 3, 4, or 5 unshielded twisted-pair cable

Connection to NIC: RJ-45

Maximum cable segment length:100 meters (328 feet)

Maximum connected segments: 100 meters (328 feet)

15
Access method: CSMA/CD
 The set of rules that defines how a computer
puts data onto the network cable and takes
data from the cable is called an access
method.
 Once data is moving on the network, access
methods help to regulate the flow of network
traffic.

16
Traffic Control on the Cable
 If data is to be sent over the network from
one user to another there must be some way
for the data to access the cable without
running into other data.
 If different computers were to use different
access methods, the network would fail
because some methods would dominate the
cable.
 Access methods prevent computers from
gaining simultaneous access to the cable.
17
Major Access Methods
 Carrier-sense multiple access methods (with
collision detection or with collision
avoidance).
 Token-passing methods that allow only a
single opportunity to send data.
 Demand-priority methods.

18
CSMA/CD Access Method
 Only when a computer "senses" that the
cable is free and that there is no traffic on the
cable it can send data.
 Once the computer has transmitted data on
the cable, no other computer can transmit
data until the original data has reached its
destination and the cable is free again.
 Remember, if two or more computers happen
to send data at exactly the same time, there
will be a data collision.
19
… CSMA/CD
 When that happens, the two computers
involved stop transmitting for a random
period of time and then attempt to retransmit.
 Each computer determines its own waiting
period; this reduces the chance that the
computers will once again transmit
simultaneously.

20
… CSMA/CD
 The name of the access method—carrier-
sense multiple access with collision detection
(CSMA/CD)—makes sense. Computers
listen to or "sense" the cable (carrier-sense).
Commonly, many computers on the network
attempt to transmit data (multiple access);
each one first listens to detect any possible
collisions.
 If a computer detects a possible collision, it
waits for a random period of time before
retransmitting (collision detection).
21
Contention Method
 CSMA/CD is known as a contention method
because computers on the network contend,
or compete, for an opportunity to send data.
 Current implementations of CSMA/CD are so
fast that users are not even aware they are
using a contention access method.

22
CSMA/CD Considerations
 CSMA/CD can be a slow-access method.
 The occurrence of this problem depends on
the number of users attempting to use the
network and which applications they are
using.

23
HUB

24
…HUB

 The purpose of a hub is to regenerate and


retime network signals.
 This is done at the bit level to a large number
of hosts (e.g. 4, 8, or even 24) using a
process known as concentration
25
…HUB
 The reasons for using hubs is to create a
central connection point for the wiring media,
and an increase in the reliability of the
network.
 The reliability of the network is increased by
allowing any single cable to fail without
disrupting the entire network.
 This differs from the bus topology where
having one cable fail will disrupt the entire
network.
26
HUB- Layer 1 Device
 Hubs are
considered Layer
1 devices
because they only
regenerate the
signal and
broadcast it out all
of their ports
(network
connections). 27
Classification of Hub
 active or passive hubs
 Most modern hubs are active; they take energy
from a power supply to regenerate network
signals.
 Some hubs are called passive devices because
they merely split the signal to multiple users,
like using a "Y" cord on a CD player to use more
than one set of headphones.
 Passive hubs do not regenerate bits, so they do
not extend a cables length, they only allow two
or more hosts to connect to the same cable
segment.

28
… Classification of Hub
 Intelligent and Dumb hubs
 Intelligent hubs have console ports, which
means they can be programmed to manage
network traffic.
 Dumb hubs simply take an incoming
networking signal and repeat it to every port
without the ability to do any management.

29
Repeater
 The maximum length for UTP(CAT-5) cable in
a network, is 100 meters (approximately 333
feet). If we need to extend our network beyond
that limit, we must add a device called a
repeater
 As signals travel along a cable, they degrade
and become distorted in a process called
"attenuation” .If a cable is long enough,
attenuation will finally make a signal
unrecognizable. Installing a repeater enables
signals to travel farther. 30
How Repeaters Work
A repeater works at
the physical layer of
the OSI Reference
Model to regenerate
the network's
signals and resend
them out on other
segments.

31
…Repeater
 The repeater takes a weak signal from one
segment, regenerates it, and passes it to the
next segment.
 To pass data through the repeater from one
segment to the next, the packets and the
Logical Link Control (LLC) protocols must be
identical on each segment.
 A repeater will not enable communication, for
example, between an 802.3 LAN (Ethernet)
and an 802.5 LAN (Token Ring).
32
…Repeater
 Repeaters do not translate or filter signals.
 For a repeater to work, both segments that
the repeater joins must use the same access
method. The two most common access
methods are carrier-sense multiple-access
with collision detection (CSMA/CD) and token
passing.
 Repeaters can move packets from one kind
of physical media to another, Ethernet packet
coming from a thinnet coaxial-cable segment
and pass it on to a fiber-optic segment. 33
Repeater Considerations
 Repeaters afford the least expensive way to
expand a network.
 No Isolation or Filtering

 Repeaters will also pass a broadcast storm


along from one segment to the next
 network performance will be degraded.

34
Use a repeater to:
 Connect two segments of similar or dissimilar
media.
 Regenerate the signal to increase the distance
transmitted.
 Pass all traffic in both directions.
 Connect two segments in the most cost-
effective manner.

35
Do not use a repeater when:
 There is heavy network traffic.
 Segments are using different access
methods.
 Data filtering is needed.

36

Das könnte Ihnen auch gefallen