You are on page 1of 30

Networking Concepts

Lecture 1

Lecture 1

LAN

Concepts Attenuation, Noise Hardware Repeater, Amplifier Bridge, Router, Gateway, Switch, Hub Twisted pair, Coaxial cable, Fiber optics Server, Workstation Wireless access point Topology Bus, Tree, Star, Ring

Lecture 1

LAN

Standard OSI (Open Systems Interconnection) IEEE (Institute of Electrical and Electronic Engineers) ITU-T (Intl Telephone Union Telecom. Sector) ISO (International Standards Organization) EIA (Electronic Industries Association) ETS (European Telecom. Standard)

Lecture 1

Communications Hardware

Repeater Extends distance limitation on networks (both voice and data) Filters noise Regenerates signals For twisted pair wire, repeaters are placed every 100 meters Amplifier Extends distance limitation on networks (both voice and data) Amplifies both signal and noise

Lecture 1

Communications Hardware

Bridge Connects two LANs using same protocol Single path between LANs Minimal sophistication Router Connects multiple LANs using same protocol Choice of paths between LANs Mainstay of internetworking

Lecture 1

Communications Hardware

Gateway Connects multiple LANs using any protocol Very sophisticated Supports todays internet by providing access points to several networks Hub Connects nodes to a network Sometimes acts as repeater

Lecture 1

Communications Hardware

Switch Connects multiple LAN segments using the same protocol Connections may use twisted pair, coaxial cable, or fiber optics wiring Faster than bridges Enables simultaneous communication between multiple network segments

Lecture 1

Ethernet
Ethernet was developed jointly by Xerox, Intel, and DEC in 1980 DEC (Digital Equipment Corporation) a computer company that specialized in mini-computers in the 1970s. It was acquired by Compaq and Compaq merged with HP. This was the first commercial LAN system Ethernet is a simple protocol to implement Ethernet addresses the layers 1 and 2 functionality for the OSI model Ethernet standard is very close to IEEE 802.3 standard, but has some minor differences

Lecture 1

Ethernet
Ethernet uses bus topology (which we will discuss next) Ethernet transmits a baseband signal at 10 Mbps Baseband signals are digital and bidirectional Ethernet allows the user data to have a variable length up to 1500 bytes Unlike HDLC(High Level Data Link Control) and SDLC (Synchronous Data Link Control) protocols, Ethernet uses a length field in the header to identify the length of the user data in bytes. Because of this, no special bit pattern is needed to recognize the start and end of the user data.

Lecture 1

Ethernet frame format

6-bytes

6-bytes

2-bytes

Variable length

4-bytes

Destination address

Source address

length

User data

CRC-32

Cyclic Redundancy Check

Lecture 1

10

Ethernet diagram

PC1

PC3 Segment 1

PC2 Repeater

PC-B Segment 2

PC-C

PC-A

Lecture 1

11

Bus topology
It is a contention-based topology, which means that each node on the network must contend for access Each node listens to traffic on the network When a node has packets to transfer and the bus is not busy, then the packets are put on the bus in both directions, with the destination address marked on the packets All nodes listen to traffic on the network and the node that has packets addressed to it, receives the packets No routing or switching is involved in data transfer

Lecture 1

12

Bus topology diagram

PC1

PC2

PC3

PC4

Tap for a new node

Lecture 1

13

Tree topology
Tree topology is a variation on bus topology A special node is designated as root The primary reason for this topology is to segment nodes so that not all nodes need to listen to packets broadcast on a segment This adds a layer of security in the form of unwanted nodes not listening to the network traffic Speeds up data transfer since there will be fewer nodes on each segment

Lecture 1

14

Tree topology diagram

Root

PC 7

PC 1

PC 6 PC 2 PC 3 PC 4 PC 5

Lecture 1

15

Star topology This is another variation on bus topology This has a central hub, a passive device Star is a logical bus and a physical ring Hub has ports in multiples of 8. Multiple hubs can be connected in a daisy chain format Easy to add nodes to the network and remove nodes from the network Central node does switching between nodes Multiple nodes can communicate simultaneously without collision Potential problem is the single point of failure for the network when the central node fails

Lecture 1

16

Star topology diagram

PC 3
PC 2 PC 1 PC 8 PC 7 Hub PC 4 PC 5

PC 6

Lecture 1

17

Ring topology
The nodes are connected in a ring pattern Unlike bus topology, each node on the ring acts as a repeater on the network Nodes access the network using a token, which eliminates the need for contention as in bus topology Token is a series of bits that identifies the node that has the right to transmit at any given time Example of a token: Assume that there are 6 nodes on the network. The nodes are labeled 1 through 6 and the token would consist of 3 bits. The token 100 will indicate that node 4 has the token. Tokens circulate in a single direction from a node to its neighbor

Lecture 1

18

Ring topology diagram

PC 4 PC 3 PC 5

PC 6 PC 2 PC 1

Lecture 1

19

OSI 7-layer model

Source

Destination

Application
Presentation Session

Application
Presentation Session

Transport
Network Data link Physical
Lecture 1

Transport
Network Data link Physical
20

IEEE 802
802.1 General LAN management of OSI layers 3 through 7 LLC sublayer(Logical Link Control) Ethernet Token bus Token ring MAN Broadband, in general

802.2 802.3 802.4 802.5 802.6 802.7

Lecture 1

21

IEEE 802

802.10 802.11 802.12 802.13 802.14

Network Security Wireless LAN 100VG-AnyLAN (Voice Grade) unused Cable Modem

Lecture 1

22

WAN

Concepts Gateway, Frame Relay, ATM, DSL, T1, T3, STS (Synchronous Transport Signal) Standard TCP/IP (Transmission Control Protocol /Internet Protocol) IETF (Internet Engineering Task Force) ATM Forum (Asynchronous Transfer Mode)

Lecture 1

23

STS, STM, OC equivalencies


STS level STS-1 STS-3 STS-9 STS-12 STS-18 STS-24 STS-36 STS-48 -STM-1 STM-3 STM-4 STM-6 STM-8 STM-12 STM-16 STM level OC level OC-1 OC-3 OC-9 OC-12 OC-18 OC-24 OC-36 OC-48
Lecture 1

Data Rate 52 Mbps 155 Mbps 467 Mbps 622 Mbps 933 Mbps 1.2 Gbps 1.9 Gbps 2.5 Gbps
24

Synchronized Transfer Signal Synchronized Transfer Mode Level-1 Optical Carrier

ATM VPI and VCI


VP I 1 VC I 1 VC I 2 VP I 5 VC I 1 VC I 2 VCI 4 VP I 6 VCI 7
VC I 2 VC I 6 VP I 2

VC I 2 VC I 6

VP I 3 VCI 4 VCI 7

VP I 3

VP Switc h

Lecture 1

25

TCP/IP functions Establish a connection between nodes Manage data flow on the network Handle transmission errors Terminate connection at the end TCP is a connection-oriented protocol, meaning that a packet sent to the next node is monitored for proper receipt IP is a connection-less protocol, meaning that a packet sent to the next node is not monitored for proper delivery Since TCP and IP work together, the packet delivery is reliable Connection-less mode is known as User Datagram Protocol (UDP)

Lecture 1

26

TCP/IP 5-layer model TCP/IP protocol is divided into 5 layers Application layer Transport layer Network layer Data link layer Physical layer

Lecture 1

27

IP Addressing IP address consists of 4 octets: n.n.n.n where n is in the range 0 to 255 This form of IP address is known as IPv4, denoting IP address Version 4 A new form of IP address known as IPv6, denoting IP address Version 6, has been proposed. It uses 128-bit addressing instead of 32-bit addressing.

Lecture 1

28

IP Address Hierarchy
There are 3 main classes of IP addresses in use and two additional classes of IP addresses available for multicast and testing Class A First octet range: 1 126 IBM, AT&T, HP, Merck, Stanford University Class B First octet range: 128 191 U of L and most other universities Class C First octet range: 192 223 IGLOU, Louisvilles first ISP

Lecture 1

29

UDP
User Datagram Protocol is a best effort protocol best effort means no guarantee of delivery This is a connection-less protocol UDP does not provide reliability UDP sends out packets without first establishing a connection RFC 768 describes UDP UDP header consists of source port, destination port, length, checksum Example of UDP: TFTP (Trivial File Transfer Protocol). TFTP is used when bootsrapping diskless system TFTP is on UDP port 69

Lecture 1

30

You might also like