the saigon ctt semester 1 chapter 7 le chi trung
TRANSCRIPT
Th
e S
aig
on
CT
T
Semester 1Semester 1
CHAPTER 7CHAPTER 7
Le Chi TrungLe Chi Trung
Th
e S
aig
on
CT
T
ContentContent
• Token-ring.
• FDDI LAN.
• Ethernet and IEEE 802.3.
• Layer 2 devices and effects on data flow.
Th
e S
aig
on
CT
T
ScheduleSchedule
DateLesson Lab
No Name Est time No Name Est Time
20-Aug Chapter 6 Online Exam
7.1 The basics of token ring 0:30:00
7.2 The basics of FDDI 0:30:00
22-Aug 7.3 The details of Ethernet and IEEE 802.3 1:00:00
7.4 Layer 2 devices 0:30:00
7.5 Effects of layer 2 devices on data flow 0:30:00
24-Aug 7.6 Basic of Ethernet 10Base-T troubleshooting 7.6.2 Network discovery 0:30:00
7.6.3 Network discovery 0:30:00
7.6.4 Protocol inspector Frame Stats 1:00:00
27-Aug Chapter 7 Online Exam
Th
e S
aig
on
CT
T
BASIC OF TOKEN-RINGBASIC OF TOKEN-RING
Th
e S
aig
on
CT
T
VariantsVariants
IBM developed the first IBM developed the first Token Ring network in Token Ring network in
the 1970s. It is still the 1970s. It is still IBM's primary LAN IBM's primary LAN technology, and is technology, and is
second only to Ethernet second only to Ethernet (IEEE 802.3) in terms of (IEEE 802.3) in terms of
LAN implementation. LAN implementation.
Th
e S
aig
on
CT
T
Ring topologyRing topology
Th
e S
aig
on
CT
T
Data passingData passing
• When a station has information to transmit, it seizes the token and sends data frame to the next station.
• When frame reaches the destination station, the data is copied for processing.
• Frame continues to circle the ring until it returns to the sending station.
• Sending station removes the frame from the ring, verifies receipt, and releases the token.
Th
e S
aig
on
CT
T
Token-Ring frame formatToken-Ring frame format
Th
e S
aig
on
CT
T
Start delimiter and End delimiterStart delimiter and End delimiter
• Start delimiter.
– Alert for the arrival of a token.
– Includes an identification symbol.
– Violates encoding system to differentiate from other frame fields.
• End Delimiter
– Completes the token or data/command frame.
– Contains damage indicator.
– Last of logical sequence.
Th
e S
aig
on
CT
T
Access controlAccess control
• P: Priority bits
• T: Token bit
• M: Monitor bit
• R: Reservation bits
PP PP PP TT MM RR RR RR
Th
e S
aig
on
CT
T
Priority and reservation bitsPriority and reservation bits
• B'000' Normal User Priority
• B'001' Normal User Priority
• B'010' Normal User Priority
• B'011' Normal User priority
• B'100' Bridge/Router
• B'101' Reserved IBM
• B'110' Reserved IBM
• B'111' Station Management
Th
e S
aig
on
CT
T
Priority managementPriority management
• Using the priority field and the reservation field.
• Stations with a higher priority can reserve the token for the next network pass.
• Stations that raise a token's priority level must reinstate the previous priority after their transmission has been completed.
Th
e S
aig
on
CT
T
Frame controlFrame control
• Only present in data/command frames.• Indicates whether frame contains data
or control information.• If control, this byte specifies type of
control information.
• Only present in data/command frames.• Indicates whether frame contains data
or control information.• If control, this byte specifies type of
control information.
Th
e S
aig
on
CT
T
Destination and Source addressesDestination and Source addresses
• Universal Address.• Local Administered Address.• Broadcast Address (D).• Functional Address (0x0C0000 00XXXX) (D).
• Universal Address.• Local Administered Address.• Broadcast Address (D).• Functional Address (0x0C0000 00XXXX) (D).
Th
e S
aig
on
CT
T
DataData
• Length limited by the maximum time a station may hold the token.
• Length limited by the maximum time a station may hold the token.
Th
e S
aig
on
CT
T
Frame checksumFrame checksum
• Frame Check Sequence.• Source fills field with calculated
value dependent on frame contents.• Destination recalculates to check
data integrity.• Frame is discarded if damaged.
• Frame Check Sequence.• Source fills field with calculated
value dependent on frame contents.• Destination recalculates to check
data integrity.• Frame is discarded if damaged.
Th
e S
aig
on
CT
T
Frame statusFrame status
• Address recognized / frame copied indicator.• Address recognized / frame copied indicator.
Th
e S
aig
on
CT
T
Management mechanismsManagement mechanisms
• Active Monitor
– One station acts as centralized source of timing information for other stations.
– Removes continuously circulating frames by set monitor bit to 1.
– Start a token, when token have been lost.
• Beaconing– Detects and repairs network faults.
– Initiates auto-reconfiguration.
Th
e S
aig
on
CT
T
Encoding:Encoding: Differential Manchester Differential Manchester
Th
e S
aig
on
CT
T
Physical topologyPhysical topology
• Physical topology : Star.
• Logical topology : Ring.
• IBM Token Ring network stations are connected to MSAU (Multi-Station Access Unit).
• Many MSAU can be wired together to form one large ring.
Th
e S
aig
on
CT
T
Multi-MSAUMulti-MSAU
Th
e S
aig
on
CT
T
Physical connectionPhysical connection
Th
e S
aig
on
CT
T
ReviewReview
• Operation of Token-Ring.
• Token-Ring frame structure.
• Encoding and topology.
Th
e S
aig
on
CT
T
BASIC OF FDDIBASIC OF FDDI
Th
e S
aig
on
CT
T
CharacteristicsCharacteristics
• Fiber Distributed Data Interface.
• FDDI is popular as a campus backbone technology.
100 Mbps
Token passing
Dual-ring
Fiber Optic Cable
Total fiber length of 200Km
Station distances up to 2Km
Th
e S
aig
on
CT
T
FDDI dual-ring (PR and SR)FDDI dual-ring (PR and SR)
Th
e S
aig
on
CT
T
FDDI MediaFDDI Media
• Fiber Optic
– Single-mode, Laser (< 40Km)
– Multi-mode, LED (< 2Km)
– Multi-mode low cost, LED (< 500m)
• Twisted Pair Copper
– UTP, STP (< 100m) - CDDI
Th
e S
aig
on
CT
T
Fiber-optic modesFiber-optic modes
Th
e S
aig
on
CT
T
FDDI ConnectionsFDDI Connections
• Class A: connect directly with PR – SR.
– DAC: Dual Attachment Concentrator
– DAS: Dual Attachment Station
• Class B: connect via FDDI concentrator.
– SAS: Single Attachment Station
Th
e S
aig
on
CT
T
AttachmentsAttachments
Th
e S
aig
on
CT
T
FDDI standard:FDDI standard: ANSI X3T9.5 ANSI X3T9.5
Th
e S
aig
on
CT
T
Physical Layer Medium Physical Layer Medium (PMD)(PMD)
• Physical Medium Dependent: How a station physically connect to a FDDI ring?
• Defines the characteristics of the transmission medium:
– Fiber optic link
– Power levels
– Bit error rates
– Optical components
– Connectors
Th
e S
aig
on
CT
T
Physical Layer Protocol Physical Layer Protocol (PHY)(PHY)
• PHysical laYer protocol: How the signals are transmitted around the FDDI ring?
• Part of the physical layer that are media independent.
• Defines data encoding/decoding procedures:
– Framing
– Clocking requirements
– Other functions (Link state…)
Th
e S
aig
on
CT
T
Media Access Control Media Access Control (MAC)(MAC)
• Media Access Control: How the physical medium is accessed on FDDI ring?
• Construction, transmission, receiving, and removal of frames and tokens.
• Defines how the medium is accessed:
– Frame format
– Token handling
– Addressing
– Error recovery mechanisms
Th
e S
aig
on
CT
T
Station Management Station Management (SMT)(SMT)
• Defines the FDDI station configuration, enables stations to work together within the ring :
– Ring configuration
– Initialization
– Station insertion and removal
– Fault isolation and recovery
– Scheduling
– Collection of statistics
Th
e S
aig
on
CT
T
Types of trafficTypes of traffic
• Synchronous traffic can consume a portion of the 100 Mbps total bandwidth of an FDDI network, while asynchronous traffic can consume the rest.
• Synchronous Mode: – Allocated parts of the bandwidth to one or
more workstations.
– Predictable response time.
• Asynchronous Mode: – Priority scheme.
Th
e S
aig
on
CT
T
FDDI frame formatFDDI frame format
Th
e S
aig
on
CT
T
Preamble, Start and End delimiterPreamble, Start and End delimiter
• Preamble.
– Prepares for the upcoming frame
• Start delimiter.
– Alert for the arrival of a token.
– Differentiate from other frame fields.
• End Delimiter
– Completes the frame.
– Contains damage indicator.
Th
e S
aig
on
CT
T
Frame controlFrame control
• The size of the address fields• Other control information• Asynchronous or Synchronous data
• The size of the address fields• Other control information• Asynchronous or Synchronous data
Th
e S
aig
on
CT
T
Source and destination addressesSource and destination addresses
• Addresses are 6 bytes• Unicast• Multicast (D)• Broadcast (D)
• Addresses are 6 bytes• Unicast• Multicast (D)• Broadcast (D)
Th
e S
aig
on
CT
T
DataData
• Control information, or information destined for an upper-layer protocol
• Control information, or information destined for an upper-layer protocol
Th
e S
aig
on
CT
T
FCSFCS
• Cyclic redundancy check (CRC).• For error control
• Cyclic redundancy check (CRC).• For error control
Th
e S
aig
on
CT
T
Frame statusFrame status
• Allows the source station to determine if an error occurred and if the frame was recognized and copied by a receiving station
• Allows the source station to determine if an error occurred and if the frame was recognized and copied by a receiving station
Th
e S
aig
on
CT
T
Operation mechanismsOperation mechanisms
• Connection Establishment– Station connect to neighbors to form the ring.
– Negotiate the length of the link.
• Ring Initialization– Station claim the right to generate a token.
• Steady-state Operation– Token passing
• Ring Maintenance– Detects and repairs token or network faults.
Th
e S
aig
on
CT
T
Encoding:Encoding: 4B/5B 4B/5B
Th
e S
aig
on
CT
T
FDDI topologyFDDI topology
Th
e S
aig
on
CT
T
ReviewReview
• Operation of FDDI.
• FDDI frame structure.
• Encoding and topology.
Th
e S
aig
on
CT
T
ETHERNET AND IEEE 802.3ETHERNET AND IEEE 802.3
Th
e S
aig
on
CT
T
Ethernet introductionEthernet introduction
• Ethernet is the most widely used local area network (LAN) technology.
• Ethernet was designed to carry data at high speeds for very limited distances.
• Ethernet is well suited to applications where a local communication medium must carry sporadic, occasionally heavy traffic at high peak data rates.
Th
e S
aig
on
CT
T
Ethernet historyEthernet history
• 1960s, the University of Hawaii.
• 1970s, Xerox developed the first system.
• 1980, IEEE released 802.3 specification.
• 1980s, Digital, Intel and Xerox jointly developed and released an Ethernet specification (v2.0), Compatible with 802.3
• Today, the term Ethernet is often used to refer to Ethernet specifications, including IEEE 802.3.
Th
e S
aig
on
CT
T
Datalink and Physical layersDatalink and Physical layers
Th
e S
aig
on
CT
T
Comparing Ethernet and IEEE 802.3Comparing Ethernet and IEEE 802.3
• Specify similar technologies.
• Broadcast network.
• Using CSMA/CD algorithm.
• Hardware implementation.
• Differences:– Ethernet provides services corresponding to
physical and datalink layer.
– IEEE 802.3 specifies the physical layer and the channel-access portion of the data link layer but does not define a LLC protocol.
Th
e S
aig
on
CT
T
Ethernet family: Ethernet family: 1000Base-SX-LX1000Base-SX-LX
Th
e S
aig
on
CT
T
Ethernet family: Ethernet family: 1000Base-T1000Base-T
Th
e S
aig
on
CT
T
Ethernet family: Ethernet family: 100Base-TX100Base-TX
Th
e S
aig
on
CT
T
Ethernet family: Ethernet family: 10Base-T10Base-T
Th
e S
aig
on
CT
T
Ethernet familyEthernet family
Th
e S
aig
on
CT
T
Ethernet frame formatEthernet frame format
Th
e S
aig
on
CT
T
PreamblePreamble
• Note that a frame is Ethernet or IEEE 802.3.
• Note that a frame is Ethernet or IEEE 802.3.
Th
e S
aig
on
CT
T
Start of frame delimiter (SOF)Start of frame delimiter (SOF)
• The IEEE 802.3: synchronize the frame-reception portions of all stations on the LAN.
• Be explicitly specified in Ethernet.
• The IEEE 802.3: synchronize the frame-reception portions of all stations on the LAN.
• Be explicitly specified in Ethernet.
Th
e S
aig
on
CT
T
Source and destination addressesSource and destination addresses
• MAC addresses.• Unicast.• Multicast (D)• Broadcast (D)
• MAC addresses.• Unicast.• Multicast (D)• Broadcast (D)
Th
e S
aig
on
CT
T
TypeType (Ethernet) (Ethernet)
• Specifies the upper-layer protocol to receive the data after Ethernet processing is completed
• Specifies the upper-layer protocol to receive the data after Ethernet processing is completed
Th
e S
aig
on
CT
T
Length Length (IEEE 802.3)(IEEE 802.3)
• The length indicates the number of bytes of data that follows this field
• The length indicates the number of bytes of data that follows this field
Th
e S
aig
on
CT
T
DataData (Ethernet) (Ethernet)
• the data contained in the frame is sent to an upper-layer protocol
• the data contained in the frame is sent to an upper-layer protocol
Th
e S
aig
on
CT
T
DataData (IEEE 802.3) (IEEE 802.3)
• Data send to LLC layer, including LLC header and upper-layer data
• Data send to LLC layer, including LLC header and upper-layer data
Th
e S
aig
on
CT
T
Frame check sequenceFrame check sequence (FCS) (FCS)
• This sequence contains a 4 byte CRC value that is created by the sender and is recalculated by the receiver to check for damaged frames
• This sequence contains a 4 byte CRC value that is created by the sender and is recalculated by the receiver to check for damaged frames
Th
e S
aig
on
CT
T
Media Access Control (MAC)Media Access Control (MAC)
• Shared-media broadcast technology.
• Ethernet’s MAC performs three functions:
1. transmitting and receiving data packets
2. decoding data packets and checking them for valid addresses before passing them to the upper layers of the OSI model
3. detecting errors within data packets or on the network
Th
e S
aig
on
CT
T
Broadcast technologyBroadcast technology
MAC
Th
e S
aig
on
CT
T
Broadcast addressBroadcast address
FF-FF-FF-FF-FF-FF
Th
e S
aig
on
CT
T
CSMA/CDCSMA/CD
• When a station wishes to transmit, it checks the network to determine whether another station is transmitting.
• If network is free, the station proceeds with the transmission.
• While sending, the station monitors the network to ensure that no other station is transmitting.
• If a transmitting node recognizes a collision, it transmits a jam signal so that all other nodes recognize collision.
• All transmitting nodes then stop sending for a backoff time (randomly 0 .. 2n - 1 of 51.2s).
Th
e S
aig
on
CT
T
CSMA/CD (cont.)CSMA/CD (cont.)
Th
e S
aig
on
CT
T
CSMA/CD AlgorithmCSMA/CD Algorithm
Th
e S
aig
on
CT
T
Encoding:Encoding: Manchester T+/- Manchester T+/-
Th
e S
aig
on
CT
T
Ethernet star topologyEthernet star topology
Th
e S
aig
on
CT
T
Ethernet star topology (cont.)Ethernet star topology (cont.)
Th
e S
aig
on
CT
T
TIA/EIA-568-A HC StandardTIA/EIA-568-A HC Standard
Th
e S
aig
on
CT
T
TIA/EIA-568-A:TIA/EIA-568-A: Distance limit Distance limit
Th
e S
aig
on
CT
T
ReviewReview
• Ethernet differences from IEEE 802.3.
• Ethernet and IEEE 802.3 frame structure.
• Encoding and topology.
Th
e S
aig
on
CT
T
LAYER 2 DEVICESLAYER 2 DEVICES
ANDAND
EFFECTS ON DATAFLOWEFFECTS ON DATAFLOW
Th
e S
aig
on
CT
T
Layer 2 DevicesLayer 2 Devices
• NIC (Network Interface Card)
– Connect your computer with network.
– Provide MAC addresses to each connection.
– Implement CSMA/CD algorithm.
• Bridge
– Forward or filter frame by MAC address.
• Switch
– Multi-port bridge.
Th
e S
aig
on
CT
T
NICNIC
Th
e S
aig
on
CT
T
NIC (cont.)NIC (cont.)
• Provides ports for network connection.
• When selecting a network card, consider:1. Type of network:
• Ethernet• Token Ring• FDDI
2. Type of media • Twisted-pair• Coaxial• Fiber-optic
3. Type of system bus• PCI• ISA
Th
e S
aig
on
CT
T
NIC: NIC: Layer 2 functionsLayer 2 functions
• Logical link control (LLC): communicates with upper layers in the computer
• Naming: provides a unique MAC address identifier
• Framing: part of the encapsulation process, packaging the bits for transport
• Media Access Control (MAC): provides structured access to shared access media
• Signaling: creates signals and interface with the media
Th
e S
aig
on
CT
T
BridgeBridge
• Connects network segments.
• Make intelligent decisions about whether to pass signals on to the next segment.
• Improve network performance by eliminating unnecessary traffic and minimizing the chances of collisions.
• Divides traffic into segments and filters traffic based on MAC address.
• Often pass frames b/w networks operating under different Layer 2 protocols.
Th
e S
aig
on
CT
T
Bridge (cont.)Bridge (cont.)
Th
e S
aig
on
CT
T
Bridge (cont.):Bridge (cont.): Filter Filter
Th
e S
aig
on
CT
T
Bridge (cont.):Bridge (cont.): Forward Forward
Th
e S
aig
on
CT
T
LAN SwitchLAN Switch
• Switches connect LAN segments.
• LAN switches are considered multi-port bridges with no collision domain.
• Use a MAC table to determine the segment on which a frame needs to be transmitted.
• Switches often replace shared hubs and work with existing cable infrastructures.
• Higher speeds than bridges.
• Support new functionality, such as VLAN.
Th
e S
aig
on
CT
T
LAN Switch (cont.)LAN Switch (cont.)
Th
e S
aig
on
CT
T
LAN Switch:LAN Switch: MAC table MAC table
Th
e S
aig
on
CT
T
LAN Switch:LAN Switch: Micro-segmentation Micro-segmentation
Th
e S
aig
on
CT
T
Benefits of LAN SwitchBenefits of LAN Switch
• No collision domain, because of micro-segmentation.
• Low latency levels and a high rate of speed for frame forwarding
• Increases the bandwidth available on a network
• Is performed in hardware instead of in software, it is significantly faster.
• BUT: All hosts connected to the switch are still in the same broadcast domain.
Th
e S
aig
on
CT
T
LAN SegmentationLAN Segmentation
Th
e S
aig
on
CT
T
Why segment LANs?Why segment LANs?
• Isolate traffic between segments.
• Achieve more bandwidth per user by creating smaller collision domains.
• LANs are segmented by devices like bridges, switches, and routers.
• Extend the effective length of a LAN, permitting the attachment of distant stations.
Th
e S
aig
on
CT
T
Segmentation with bridgesSegmentation with bridges
Th
e S
aig
on
CT
T
Segmentation with bridges (cont.)Segmentation with bridges (cont.)
• Bridges increase the latency (delay) in a network by 10-30%.
• A bridge is considered a store-and-forward device because it must receive the entire frame and compute the cyclic redundancy check (CRC) before forwarding can take place.
• The time it takes to perform these tasks can slow network transmissions, thus causing delay.
Th
e S
aig
on
CT
T
Segmentation with switchesSegmentation with switches
Th
e S
aig
on
CT
T
Segmentation with switches (cont.)Segmentation with switches (cont.)
• Allows a LAN topology to work faster and more efficiently.
• Uses bandwidth so efficiently, the available bandwidth can reach to 100%.
• Ease bandwidth shortages and network bottlenecks (such as client-server).
• A computer connected directly to an Ethernet switch is its own collision domain and accesses the full 10Mbps.
Th
e S
aig
on
CT
T
Segmentation with routersSegmentation with routers
Th
e S
aig
on
CT
T
Segmentation with routers (cont.)Segmentation with routers (cont.)
• Routers operates at the network layer
• Routers bases all of its forwarding decisions on the Layer 3 protocol address.
• Routers ability to make exact determinations of where to send the data packet.
• Router operate with a higher rate of latency.
Th
e S
aig
on
CT
T
Teaching topologyTeaching topology
Th
e S
aig
on
CT
T
ReviewReview
• Functions of layer 2 devices.
• How the layer 2 devices effect to dataflow.
Th
e S
aig
on
CT
T
Basic 10BaseT troubleshootingBasic 10BaseT troubleshooting
Th
e S
aig
on
CT
T