[go: up one dir, main page]

0% found this document useful (0 votes)
95 views10 pages

Network Lesson 4

sdfghjkl

Uploaded by

Mesele Berhanu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
95 views10 pages

Network Lesson 4

sdfghjkl

Uploaded by

Mesele Berhanu
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 10

Lesson 4: LAN Basics

In this lesson, we will cover the fundamentals of LAN technologies. We’ll look at Ethernet, Token
Ring, and FDDI. For each one, we’ll look at the technology as well as its operations.
The Agenda

- Ethernet

- Token Ring

- FDDI
Common LAN Technologies
The three LAN technologies shown here account for virtually all deployed LANs:

The most popular local area networking protocol today is Ethernet. Most network administrators
building a network from scratch use Ethernet as a fundamental technology.

Token Ring technology is widely used in IBM networks.

FDDI networks are popular for campus LANs – and are usually built to support high bandwidth
needs for backbone connectivity.

Let’s take a look at Ethernet in detail.

Ethernet
Ethernet and IEEE 802.3

Ethernet was initially developed by Xerox. They were later joined by Digital Equipment
Corporation (DEC) and Intel to define the Ethernet 1 specification in 1980. There have been
further revisions including the Ethernet standard (IEEE Standard 802.3) which defines rules for
configuring Ethernet as well as specifying how elements in an Ethernet network interact with
one another.
Ethernet is the most popular physical layer LAN technology because it strikes a good balance
between speed, cost, and ease of installation. These strong points, combined with wide
acceptance in the computer marketplace and the ability to support virtually all popular network
protocols, make Ethernet an ideal networking technology for most computer users today.
The Fast Ethernet standard (IEEE 802.3u) has been established for networks that need higher
transmission speeds. It raises the Ethernet speed limit from 10 Mbps to 100 Mbps with only
minimal changes to the existing cable structure. Incorporating Fast Ethernet into an existing
configuration presents a host of decisions for the network manager. Each site in the network
must determine the number of users that really need the higher throughput, decide which
segments of the backbone need to be reconfigured specifically for 100BaseT and then choose
the necessary hardware to connect the 100BaseT segments with existing 10BaseT segments.
Gigabit Ethernet is an extension of the IEEE 802.3 Ethernet standard. It increases speed tenfold
over Fast Ethernet, to 1000 Mbps, or 1 Gbps.
Benefits and background

- Ethernet is the most popular physical layer LAN technology because it strikes a good balance
between speed, cost, and ease of installation
- Supports virtually all network protocols
- Xerox initiated, then joined by DEC & Intel in 1980

Revisions of Ethernet specification

- Fast Ethernet (IEEE 802.3u) raises speed from 10 Mbps to 100 Mbps
- Gigabit Ethernet is an extension of IEEE 802.3 which increases speeds to 1000 Mbps, or 1
Gbps
One thing to keep in mind in Ethernet is that there are several framing variations that exist for
this common LAN technology.
These differences do not prohibit manufacturers from developing network interface cards that
support the common physical layer, and software that recognizes the differences between the
two data links
Ethernet Protocol Names

Ethernet protocol names follow a fixed scheme. The number at the beginning of the name
indicates the wire speed. If the word “base” appears next, the protocol is for baseband
applications. If the word “broad” appears, the protocol is for broadband applications. The
alphanumeric code at the end of the name indicates the type of cable and, in some cases, the
cable length. If a number appears alone, you can determine the maximum segment length by
multiplying that number by 100 meters. For example 10Base2 is a protocol with a maximum
segment length of approximately 200 meters (2 x 100 meters).

Ethernet and Fast Ethernet


This chart give you an idea of the range of Ethernet protocols including their data rate,
maximum segment length, and medium.
Ethernet has survived as an essential media technology because of its tremendous flexibility and
its relative simplicity to implement and understand. Although other technologies have been
touted as likely replacements, network managers have turned to Ethernet and its derivatives as
effective solutions for a range of campus implementation requirements. To resolve Ethernet’s
limitations, innovators (and standards bodies) have created progressively larger Ethernet pipes.
Critics might dismiss Ethernet as a technology that cannot scale, but its underlying transmission
scheme continues to be one of the principal means of transporting data for contemporary
campus applications.
The most popular today is 10BaseT and 100BaseT… 10Mbps and 100Mbps respectively using
UTP wiring.

Let’s take a look at how Ethernet works.


Ethernet Operation
Example:-

Let’s say in our example here that station A is going to send information to station D. Station A
will listen through its NIC card to the network. If no other users are using the network, station A
will go ahead and send its message out on to the network. Stations B and C and D will all
receive the communication.

At the data link layer it will inspect the MAC address. Upon inspection station D will see that the
MAC address matches its own and then will process the information up through the rest of the
layers of the seven layer model.
As for stations B & C, they too will pull this packet up to their data link layers and inspect the
MAC addresses. Upon inspection they will see that there is no match between the data link layer
MAC address for which it is intended and their own MAC address and will proceed to dump the
packet.
Ethernet Broadcast

Broadcasting is a powerful tool that sends a single frame to many stations at the same time.
Broadcasting uses a data link destination address of all 1s. In this example, station A transmits
a frame with a destination address of all 1s, stations B, C, and D all receive and pass the frame
to their respective upper layers for further processing.
When improperly used, however, broadcasting can seriously impact the performance of stations
by interrupting them unnecessarily. For this reason, broadcasts should be used only when the
MAC address of the destination is unknown or when the destination is all stations.
Ethernet Reliability

Ethernet is known as being a very reliable local area networking protocol. In this example, A is
transmitting information and B also has information to transmit. Let’s say that A & B listen to
the network, hear no traffic and broadcast at the same time. A collision occurs when these two
packets crash into one another on the network. Both transmissions are corrupted and unusable.

When a collision occurs on the network, the NIC card sensing the collision, in this case, station C
sends out a jam signal that jams the entire network for a designated amount of time.
Once the jam signal has been received and recognized by all of the stations on the network,
stations A and D will both back off for different amounts of time before they try to retransmit.
This type of technology is known as Carrier Sense Multiple Access With Collision Detection –
CSMA/CD.
High-Speed Ethernet Options

- Fast Ethernet
- Fast EtherChannel®
- Gigabit Ethernet
- Gigabit EtherChannel
We’ve mentioned that Ethernet also has high speed options that are currently available. Fast
Ethernet is used widely at this point and provides customers with 100 Mbps performance, a ten-
fold increase. Fast EtherChannel is a Cisco value-added feature that provides bandwidth up to
800 Mbps. There is now a standard for Gigabit Ethernet as well and Cisco provides Gigabit
Ethernet solutions with 1000 Mbps performance.

Let’s look more closely at Fast EtherChannel and Gigabit Ethernet.


What Is Fast Ether Channel?
Grouping of multiple Fast Ethernet interfaces into one logical transmission path

- Scalable bandwidth up to 800+ Mbps


- Using industry-standard Fast Ethernet
- Load balancing across parallel links
- Extendable to Gigabit Ethernet

Fast EtherChannel provides a solution for network managers who require higher bandwidth
between servers, routers, and switches than Fast Ethernet technology can currently provide.
Fast EtherChannel is the grouping of multiple Fast Ethernet interfaces into one logical
transmission path providing parallel bandwidth between switches, servers, and Cisco routers.
Fast EtherChannel provides bandwidth aggregation by combining parallel 100-Mbps Ethernet
links (200-Mbps full-duplex) to provide flexible, incremental bandwidth between network
devices.
For example, network managers can deploy Fast EtherChannel consisting of pairs of full-duplex
Fast Ethernet to provide 400+ Mbps between the wiring closet and the data center, while in the
data center bandwidths of up to 800 Mbps can be provided between servers and the network
backbone to provide large amounts of scalable incremental bandwidth.
Cisco’s Fast EtherChannel technology builds upon standards-based 802.3 full-duplex Fast
Ethernet. It is supported by industry leaders such as Adaptec, Compaq, Hewlett-Packard, Intel,
Micron, Silicon Graphics, Sun Microsystems, and Xircom and is scalable to Gigabit Ethernet in
the future.
What Is Gigabit Ethernet?
In some cases, Fast EtherChannel technology may not be enough.
The old 80/20 rule of network traffic (80 percent of traffic was local, 20 percent was over the
backbone) has been inverted by intranets and the World Wide Web. The rule of thumb today is
to plan for 80 percent of the traffic going over the backbone.

Gigabit networking is important to accommodate these evolving needs.


Gigabit Ethernet builds on the Ethernet protocol but increases speed tenfold over Fast Ethernet,
to 1000 Mbps, or 1 Gbps. It promises to be a dominant player in high-speed LAN backbones and
server connectivity. Because Gigabit Ethernet significantly leverages on Ethernet, network
managers will be able to leverage their existing knowledge base to manage and maintain
Gigabit networks.

The Gigabit Ethernet spec addresses three forms of transmission media though not all are
available yet:

- 1000BaseLX: Long-wave (LW) laser over single-mode and multimode fiber


- 1000BaseSX: Short-wave (SW) laser over multimode fiber
- 1000BaseCX: Transmission over balanced shielded 150-ohm 2-pair STP copper cable
- 1000BaseT: Category 5 UTP copper wiring Gigabit Ethernet allows Ethernet to scale from 10
Mbps at the desktop, to 100 Mbps to the workgroup, to 1000 Mbps in the data center. By
leveraging the current Ethernet standards as well as the installed base of Ethernet and Fast
Ethernet switches and routers, network managers do not need to retrain and relearn a new
technology to provide support for Gigabit Ethernet.
Token Ring (IEEE 802.5)
The Token Ring network was originally developed by IBM in the 1970s. It is still IBM’s primary
LAN technology and is second only to Ethernet in general LAN popularity. The related IEEE
802.5 specification is almost identical to and completely compatible with IBM’s Token Ring
network.
Collisions cannot occur in Token Ring networks. Possession of the token grants the right to
transmit. If a node receiving the token has no information to send, it passes the token to the
next end station. Each station can hold the token for a maximum period of time.
Token-passing networks are deterministic, which means that it is possible to calculate the
maximum time that will pass before any end station will be able to transmit. This feature and
several reliability features make Token Ring networks ideal for applications where delay must be
predictable and robust network operation is important. Factory automation environments are
examples of such applications.
Token Ring is more difficult and costly to implement. However, as the number of users in a
network rises, Token Ring’s performance drops very little. In contrast, Ethernet’s performance
drops significantly as more users are added to the network.
Token Ring Bandwidth

Here are some of the speeds associated with Token Ring. Note that Token Ring runs at 4 Mbps
or 16 Mbps. Today, most networks operate at 16 Mbps. If a network contains even one
component with a maximum speed of 4 Mbps, the whole network must operate at that speed.
When Ethernet first came out, networking professionals believed that Token Ring would die, but
this has not happened. Token Ring is primarily used with IBM networks running Systems
Network Architecture (SNA) networking operating systems. Token Ring has not yet left the
market because of the huge installed base of IBM mainframes being used in industries such as
banking.
The practical difference between Ethernet and Token Ring is that Ethernet is much cheaper and
simpler. However, Token Ring is more elegant and robust.
Token Ring Topology

The logical topology of an 802.5 network is a ring in which each station receives signals from its
nearest active upstream neighbor (NAUN) and repeats those signals to its downstream
neighbor. Physically, however, 802.5 networks are laid out as stars, with each station
connecting to a central hub called a multistation access unit or MAU. The stations connect to the
central hub through shielded or unshielded twisted-pair wire.
Typically, a MAU connects up to eight Token Ring stations. If a Token Ring network consists of
more stations than a MAU can handle, or if stations are located in different parts of a building–
for example on different floors–MAUs can be chained together to create an extended ring. When
installing an extended ring, you must ensure that the MAUs themselves are oriented in a ring.
Otherwise, the Token Ring will have a break in it and will not operate.

Token Ring Operation

Station access to a Token Ring is deterministic; a station can transmit only when it receives a
special frame called a token. One station on a token ring network is designated as the active
monitor. The active monitor will prepare a token. A token is usually a few bits with significance
to each one of the network interface cards on the network. The active monitor will pass the
token into the multistation access unit. The multistation access unit then will pass the token to
the first downstream neighbor. Let’s say in this example that station A has something to
transmit. Station A will seize the token and append its data to the token. Station A will then
send its token back to the multistation access unit. The MAU will then grab the token and push
it to the next downstream neighbor. This process is followed until the token reaches the
destination for which it is intended.
If a station receiving the token has no information to send, it simply passes the token to the
next station. If a station possessing the token has information to transmit, it claims the token
by altering one bit of the frame, the T bit. The station then appends the information it wishes to
transmit and sends the information frame to the next station on the Token Ring.

The information frame circulates the ring until it reaches the destination station, where the
frame is copied by the station and tagged as having been copied. The information frame
continues around the ring until it returns to the station that originated it, and is removed.
Because frames proceed serially around the ring, and because a station must claim the token
before transmitting, collisions are not expected in a Token Ring network.
Broadcasting is supported in the form of a special mechanism known as explorer packets. These
are used to locate a route to a destination through one or more source route bridges.

- Token Ring Summary -


- Reliable transport, minimized collisions

- Token passing/token seizing

- 4- or 16-Mbps transport

- Little performance impact with increased number of users

- Popular at IBM-oriented sites such as banks and automated factories


FDDI - Fiber Distributed Data Interface

FDDI is an American National Standards Institute (ANSI) standard that defines a dual Token
Ring LAN operating at 100 Mbps over an optical fiber medium. It is used primarily for corporate
and carrier backbones.
Token Ring and FDDI share several characteristics including token passing and a ring
architecture which were explored in the previous section on Token Ring.
Copper Distributed Data Interface (CDDI) is the implementation of FDDI protocols over STP and
UTP cabling. CDDI transmits over relatively short distances (about 100 meters), providing data
rates of 100 Mbps using a dual-ring architecture to provide redundancy.
While FDDI is fast, reliable, and handles a lot of data well, its major problem is the use of
expensive fiber-optic cable. CDDI addresses this problem by using UTP or STP. However, notice
that the maximum segment length drops significantly.
FDDI was developed in the mid-1980s to fill the needs of growing high-speed engineering
workstation capacity and network reliability. Today, FDDI is frequently used as a high-speed
backbone technology because of its support for high bandwidth and greater distances than
copper.
FDDI Network Architecture
FDDI uses a dual-ring architecture. Traffic on each ring flows in opposite directions (called
counter-rotating). The dual-rings consist of a primary and a secondary ring. During normal
operation, the primary ring is used for data transmissions, and the secondary ring remains idle.
The primary purpose of the dual rings is to provide superior reliability and robustness.
One of the unique characteristics of FDDI is that multiple ways exist to connect devices to the
ring. FDDI defines three types of devices: single-attachment station (SAS) such as PCs, dual
attachment station (DAS) such as routers and servers, and a concentrator.

- Dual-ring architecture

- Primary ring for data transmissions


- Secondary ring for reliability and robustness

- Components

- Single attachment station (SAS)—PCs


- Dual attachment station (DAS)—Servers
- Concentrator

- FDDI concentrator

- Also called a dual-attached concentrator (DAC)


- Building block of an FDDI network
- Attaches directly to both rings and ensures that any SAS failure or power-down does not
bring down the ring

Example:-

An FDDI concentrator (also called a dual-attachment concentrator [DAC]) is the building block
of an FDDI network. It attaches directly to both the primary and secondary rings and ensures
that the failure or power-down of any single attachment station (SAS) does not bring down the
ring. This is particularly useful when PCs, or similar devices that are frequently powered on and
off, connect to the ring.
- FDDI Summary -
- Features

- 100-Mbps token-passing network


- Single-mode (100 km), double-mode (2 km)
- CDDI transmits at 100 Mbps over about 100 m
- Dual-ring architecture for reliability

- Optical fiber advantages versus copper


- Security, reliability, and performance are enhanced because it does not emit electrical
signals
- Much higher bandwidth than copper

- Used for corporate and carrier backbones

- Summary -
- LAN technologies include Ethernet, Token Ring, and FDDI

- Ethernet

- Most widely used


- Good balance between speed, cost, and ease of installation
- 10 Mbps to 1000 Mbps

- Token Ring

- Primarily used with IBM networks


- 4 Mbps to 16 Mbps
- FDDI

- Primarily used for corporate backbones


- Supports longer distances
- 100 Mbps

You might also like