[go: up one dir, main page]

0% found this document useful (0 votes)
355 views36 pages

Overview of Network Access Methods

The document outlines various network access methods including CSMA/CD, CSMA/CA, Token Passing, and Fiber Distributed Data Interface (FDDI). It explains how CSMA/CD and CSMA/CA manage data transmission in wired and wireless networks, respectively, while FDDI serves as a high-speed backbone for local area networks using fiber optics. Additionally, it discusses the importance of network protocols in facilitating communication between devices and provides examples of commonly used protocols.

Uploaded by

mwendamark125125
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
355 views36 pages

Overview of Network Access Methods

The document outlines various network access methods including CSMA/CD, CSMA/CA, Token Passing, and Fiber Distributed Data Interface (FDDI). It explains how CSMA/CD and CSMA/CA manage data transmission in wired and wireless networks, respectively, while FDDI serves as a high-speed backbone for local area networks using fiber optics. Additionally, it discusses the importance of network protocols in facilitating communication between devices and provides examples of commonly used protocols.

Uploaded by

mwendamark125125
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Network Access Methods

CSMA/CD
CSMA/CA
Token Passing
Fiber Distributed Data Interface (FDD1)
Introduction
• What CSMA/CD and CSMA/CA are?
• CSMA/CD and CSMA/CA are the media access methods that govern
how a device can transmit data to the network.
• CSMA/CD stands for Carrier Sense Multiple Access / Collision
Detection.
• CSMA/CA stands for Carrier Sense Multiple Access/Collision
Avoidance.
• Both methods are used in a single collision domain. A single collision
domain is a group of devices that share a collision.
• Since all devices share a collision, they use a method to avoid and remove the
collision.
Cont.
• Based on the media type used in the network, this method is known
as either CSMA/CD or as CSMA/CA.
• If the network uses wired media, this method is known as CSMA/CD.
If the network uses wireless media, this method is known
as CSMA/CA.
CSMA/CD
How CSMA/CD works
• In a single collision domain, only one NIC can send a frame at a time.
All NICs, however, can simultaneously listen to the frame on the wire.
• Before a NIC puts a frame on the wire, it first senses the wire to
ensure that no other frame is currently on the wire.
• If it is a copper wire, the NIC can detect the frame by examining the
voltage levels on the wire.
• If it is a fiber wire, the NIC can detect the frame by examining the light
frequencies on the wire. This process is known as carrier sense.
How CSMA/CD works cont.
• If a NIC detects a frame on the wire, it waits until the frame is
transmitted.
• A NIC transmits a frame only when it detects no frame on the wire.
Sometimes two or more NICs may accidentally detect no frame at the
same time.
• For example, two NICs want to transmit frames, and there is no frame on the
wire.
• Since there is no frame on the wire, both NICs put their frames on the
wire at the same time. This process is known as multiple access.
How CSMA/CD works cont.
• If two or more NICs simultaneously sense the wire and see no frame, and
each places its frame on the wire, a collision will occur.
• In this situation, the voltage levels on a copper wire and the light
frequencies on a fiber wire get messed up.
• For example, if two NICs put the same voltage on the electrical part of the wire, the
voltage level will be different from that of only one device.
• The two original frames become indecipherable. This process is known
as collision detection.
• Let's take a simple a simple example. There are four PCs in a single collision
domain. PC-1 sends data to PC-3.
• At the same time, PC-2 also sends data to PC-3. Since both PC-1 and PC-3
put their frames on the wire at the same time, a collision will occur.
Key points
• This mechanism is only used in a single collision domain.
• All devices have equal priority.
• In this process, only one device can send data at a time.
• Before a device sends data, it will first sense the wire to ensure that
no other device is currently sending data.
• If another device is currently using the media, it will have to wait till that
transmission is over. If no device is currently using wire it can send the data.
• If two or more devices simultaneously sense wire and see no data in
it, they could place their data on the wire at the same time.
• In this situation, a collision will occur.
Key Points Cont.
• When a collision occurs, a special jam signal is created in the wire.
• Jam signal has a waiting time.
• All devices have to wait till the jam signal time is over.
• Once this time is over, devices can sense the wire again.
• If a device's data is lost in the collision, the device sends the same
piece of data again.
CSMA/CD Process
CSMA/CA
CSMA/CA
• WLANs use a mechanism called Carrier Sense, Multiple
Access/Collision Avoidance (CSMA/CA).
• Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) is a
network protocol for carrier transmission that operates in the Media
Access Control (MAC) layer.
• In contrast to CSMA/CD (Carrier Sense Multiple Access/Collision
Detection) that deals with collisions after their occurrence, CSMA/CA
prevents collisions prior to their occurrence.
Algorithm
• When a frame is ready, the transmitting station checks whether the
channel is idle or busy.
• If the channel is busy, the station waits until the channel becomes idle.
• If the channel is idle, the station waits for an Inter-frame gap (IFG) amount
of time and then sends the frame.
• After sending the frame, it sets a timer.
• The station then waits for acknowledgement from the receiver. If it
receives the acknowledgement before expiry of timer, it marks a successful
transmission.
• Otherwise, it waits for a back-off time period and restarts the algorithm.
Token Passing
Token Passing
• In CSMA/CD and CSMA/CA the chances of collisions are there. As the
number of hosts in the network increases, the chances of collisions also
will become more.
• The Token-Passing Protocol relies on a control signal called the token.
• A token is a 24-bit packet that circulates throughout the network from NIC
to NIC in an orderly fashion.
• If a workstation wants to transmit a message, first it must seize the token.
• At that point, the workstation has complete control over the
communications channel.
• The existence of only one token eliminates the possibility of signal
collisions. This means that only one station can speak at a time.
Fiber Distributed Data Interface
(FDDI)
FDDI
• Fiber Distributed Data Interface (FDDI) is a set of ANSI (American
National Standards Institute) and ISO standards for transmission of
data in local area network (LAN) over fiber optic cables.
• It is most often used as a network backbone, for connecting high-end
computers (mainframes, minicomputers, and peripherals),
and for LANs connecting high-performance engineering, graphics, and other
workstations that demand a rapid transfer of large amounts of data.
• FDDI developed for two primary reasons: to support and help extend
the capabilities of older LANs, such as Ethernet and Token Ring,
and to provide a reliable infrastructure for businesses, moving even mission-
critical applications to networks.
Cont.
• FDDI is an efficient network topology with regard to fault-tolerance
and integrated network management functions.
• With its deterministic access methods, FDDI guarantees high
aggregated throughput rates, even in large and high traffic networks.
• FDDI can be added easily to existing network topologies (such as
Ethernet and Token Ring) as a strong backbone to eliminate severe
network bottlenecks in existing LANs.
FDDI features
• FDDI uses optical fiber as its physical medium.
• It operates in the physical and media access control (MAC layer) of the
Open Systems Interconnection (OSI) network model
• It provides high data rate of 100 Mbps and can support thousands of users.
• It is used in LANs up to a diameter of 100 kilometers for long distance voice
and multimedia communication.
• It uses ring based token passing mechanism and is derived from IEEE 802.4
token bus standard.
• It contains two token rings, a primary ring for data and token transmission
and a secondary ring that provides backup if the primary ring fails.
• FDDI technology can also be used as a backbone for a wide area network
(WAN)
FDDI Diag
• The diagram shows the FDDI
dual ring architecture.
• The architecture has two rings
namely secondary and primary
rings
Advantages of FDDI
• Fiber optic cables transmit signals over more noteworthy separations
of approximately 100 km.
• FDDI employs different tokens to make strides organize speed.
• It offers a higher transmission capacity (up to 250 Gbps). Thus, it can
handle information rates up to 100 Mbps.
• It offers tall security because it is difficult to spy on the fiber-optic
link.
• FDDI is highly reliable because FDDI networks consist of two counter-
rotating rings. A secondary ring provides an alternate data path in the
event a fault occurring on the primary ring.
Disadvantages of FDDI
• FDDI is complex. Thus establishment and support require an
incredible bargain of expertise.
• FDDI is expensive. Typically since fiber optic cable, connectors and
concentrators are exceptionally costly.
Network Protocols
Introduction
• A network protocol is an established set of rules that determine how
data is transmitted between different devices in the same network.
• Essentially, it allows connected devices to communicate with each
other, regardless of any differences in their internal processes,
structure or design.
• Network protocols are the reason you can easily communicate with
people all over the world, and thus play a critical role in modern
digital communications.
Introduction Cont.
• Similar to the way that speaking the same language simplifies
communication between two people, network protocols make it
possible for devices to interact with each other because of
predetermined rules built into devices’ software and hardware.
• Neither local area networks (LAN) nor wide area networks
(WAN) could function the way they do today without the use of
network protocols.
How Network Protocols Work
• Network protocols take large-scale processes and break them down
into small, specific tasks or functions.
• This occurs at every level of the network, and each function must
cooperate at each level to complete the larger task at hand.
• The term protocol suite refers to a set of smaller network protocols
working in conjunction with each other.
• Network protocols are typically created according to industry
standard by various networking or information technology
organizations.
Groups/Industry players who have published
notable networking protocols and standards
• The Institute of Electrical and Electronics Engineers (IEEE)
• The Internet Engineering Task Force (IETF)
• The International Organization for Standardization (ISO)
• The International Telecommunications Union (ITU)
• The World Wide Web Consortium (W3C)
Who Uses Network Protocols?
• Network protocols aren’t only relevant to certified network specialists or IT
professionals.
• Billions of people use network protocols daily, whether they know it or
not.
• Every time you use the internet, you leverage network protocols.
• Though you may not know how network protocols work or how frequently
you encounter them, they are necessary for using the internet or digital
communications in any capacity.
• There are thousands of different network protocols, but they all perform
one of three primary actions:
• Communication
• Network management
• Security
Examples of Commonly used protocols
• Transmission Control Protocol (TCP): TCP is a popular communication
protocol which is used for communicating over a network. It divides any
message into series of packets that are sent from source to destination and
there it gets reassembled at the destination.
• Internet Protocol (IP): IP is designed explicitly as addressing protocol. It is
mostly used with TCP. The IP addresses in packets help in routing them
through different nodes in a network until it reaches the destination
system. TCP/IP is the most popular protocol connecting the networks.
• User Datagram Protocol (UDP): UDP is a substitute communication
protocol to Transmission Control Protocol implemented primarily for
creating loss-tolerating and low-latency linking between different
applications.
Examples of Commonly used protocols Cont.
• Post office Protocol (POP): POP3 is designed for receiving incoming E-
mails.
• Simple mail transport Protocol (SMTP): SMTP is designed to send
and distribute outgoing E-Mail. SMTP uses a process called “Store and
forward “, to move your email across networks
• File Transfer Protocol (FTP): FTP allows users to transfer files from
one machine to another. Types of files may include program files,
multimedia files, text files, and documents, etc.
Examples of Commonly used protocols Cont.
• Hyper Text Transfer Protocol (HTTP): HTTP is designed for
transferring a hypertext among two or more systems.
• HTML tags are used for creating links. These links may be in any form
like text or images.
• HTTP is designed on Client-server principles which allow a client
system for establishing a connection with the server machine for
making a request.
• The server acknowledges the request initiated by the client and
responds accordingly.
Examples of Commonly used protocols Cont.
• Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as
Hyper Text Transfer Protocol Secure is a standard protocol to secure
the communication among two computers one using the browser and
other fetching data from web server.
• HTTP is used for transferring data between the client browser
(request) and the web server (response) in the hypertext format,
same in case of HTTPS except that the transferring of data is done in
an encrypted format.
• So it can be said that https thwart hackers from interpretation or
modification of data throughout the transfer of packets.
Examples of Commonly used protocols Cont.
• Telnet: Telnet is a set of rules designed for connecting one system with
another. The connecting process here is termed as remote login.
• The system which requests for connection is the local computer, and the system
which accepts the connection is the remote computer.
• Gopher: Gopher is a collection of rules implemented for searching,
retrieving as well as displaying documents from isolated sites.
• Gopher also works on the client/server principle.
• TFTP-: The Trivial File Transfer Protocol is the stripped-down, stock version
of FTP.
• It is the protocol of choice if you know exactly what you want and where
to find it.
• It’s a technology for transferring files between network devices and is a simplified
version of FTP
Examples of Commonly used protocols Cont.
• NFS-: stands for network file system. It allows remote hosts to mount file
systems over a network and interact with those fie systems as though they
are mounted locally.
• This enables system administrators to consolidate resources onto centralized servers
on the network.
• LPD-: stands for Line Printer Daemon. It is designed for printer sharing.
• X window-: it defines a protocol for the writing of graphical user interface-
based client/server applications.
• DNS-: it stands for Domain Name System. It translates domain names to
their corresponding IP address, Domain is an address like [Link]
Examples of Commonly used protocols Cont.
• SNMP-: Stands for Simple Network Management Protocol.
• It gathers data by polling the devices on the network from a
management station at a fixed or random interval, requiring them to
disclose certain information.
• It is a way that servers can share information about their current
state, and also a channel through which an administrator can modify
pre-defined values.
• DHCP-: stands for Dynamic Host Configuration Protocol (DHCP). It
gives IP addresses to hosts.
Task
• Discuss the protocols in Each layer of the OSI model

You might also like