0% found this document useful (0 votes)
54 views

Lect06 Ethernet

The document discusses various Ethernet standards and wireless networking technologies. It covers the evolution of Ethernet standards such as IEEE802.3 to support higher data rates up to 40/100 Gigabit Ethernet. It also discusses wireless LAN standards including IEEE802.11, Bluetooth, WiMAX and various wireless access technologies. Key aspects covered include Ethernet frame format, addressing, access methods, switched Ethernet, VLAN, wireless network architectures, MAC protocols and specifications of different wireless standards.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views

Lect06 Ethernet

The document discusses various Ethernet standards and wireless networking technologies. It covers the evolution of Ethernet standards such as IEEE802.3 to support higher data rates up to 40/100 Gigabit Ethernet. It also discusses wireless LAN standards including IEEE802.11, Bluetooth, WiMAX and various wireless access technologies. Key aspects covered include Ethernet frame format, addressing, access methods, switched Ethernet, VLAN, wireless network architectures, MAC protocols and specifications of different wireless standards.
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 42

Data Communication and

Networking
Ethernet and Wireless LAN

IEEE802 Standard for LANS

1.#

Ethernet Evolution

IEEE802.3 Ethernet Frame

1.#

Addressing
Each station on an Ethernet network (such as a PC,
workstation, or printer) has its own network interface card
(NIC). The NIC fits inside the station and provides the station
with a link-layer address. The Ethernet address is 6 bytes (48
bits), normally written in hexadecimal notation, with a colon
between the bytes.

Implementation of standard Ethernet

1.#

Access Method
Since the network that uses the standard Ethernet protocol is
a broadcast network, we need to use an access method to
control access to the sharing medium. The standard Ethernet
chose CSMA/CD with 1-persistent method.

10BASE5 Implementation

1.#

10BASE-T Implementation

Collision domains

1.#

Switched Ethernet

Full duplex switched Ethernet

1.#

IEEE802.3u Fast Ethernet

IEEE802.3z Gigabit Ethernet


The need for an even higher data rate resulted in the design
of the Gigabit Ethernet Protocol (1000 Mbps). The IEEE
committee calls it the Standard 802.3z. The goals of the
Gigabit Ethernet were to upgrade the data rate to 1 Gbps, but
keep the address length, the frame format, and the maximum
and minimum frame length the same.

1.#

MAC Sublayer
A main consideration in the evolution of Ethernet was to keep
the MAC sublayer untouched. However, to achieve a data
rate of 1 Gbps, this was no longer possible. Gigabit Ethernet
has two distinctive approaches for medium access: halfduplex and full-duplex. Almost all implementations of Gigabit
Ethernet follow the full-duplex approach, so we mostly ignore
the half-duplex mode.

Encoding in Gigabit Ethernet

IEEE802.3ab

1.#

Gigabit Ethernet implementations

IEEE802.3ae 10-Gigabit Ethernet


In recent years, there has been another look into the Ethernet
for use in metropolitan areas. The idea is to extend the
technology, the data rate, and the coverage distance so that
the Ethernet can be used as LAN and MAN, Metro Ethernet
or MetroLAN.

1.#

10-GbE implementations

IEEE802.3ba 40/100-Gigabit Ethernet


40 Gbit/s and 100 Gbit/s Ethernet. 40 Gbit/s over 1m
backplane, 10 m Cu cable assembly (4x25 Gbit or 10x10 Gbit
lanes) and 100 m ofMMF and 100 Gbit/s up to 10 m of Cu
cable assembly, 100 m of MMF or 40 km of SMF respectively.

1.#

10

Hierarchical Ethernet LAN

Three categories of connecting devices

1.#

11

Layer 1: Hub
A hub is a device that operates only in the physical layer.
Signals that carry information within a network can travel a
fixed distance before attenuation endangers the integrity of
the data. A repeater receives a signal and, before it becomes
too weak or corrupted, regenerates and retimes the original
bit pattern.

Layer2: Link-Layer Switches


A link-layer switch (or switch) operates in both the physical
and the data-link layers. As a physical-layer device, it
regenerates the signal it receives. As a link-layer device, the
link-layer switch can check the MAC addresses (source and
destination) contained in the frame.

1.#

12

Ethernet Switch

Learning switch

1.#

13

Loop problem in a learning switch (Part a)

Loop problem in a learning switch (Part b)

1.#

14

Loop problem in a learning switch (Part C)

Loop problem in a learning switch (Part D)

1.#

15

System of connected LANs and its graph(Part a)

System of connected LANs and its graph(Part b)

1.#

16

Finding the shortest path and the spanning tree

Forwarding and blocking ports after using spanning


tree algorithm

1.#

17

Layer 3: Routers and Layer3 Switch

Virtual LAN
A station is considered part of a LAN if it physically belongs to
that LAN. The criterion of membership is geographic. What
happens if we need a virtual connection between two stations
belonging to two different physical LANs? We can roughly
define a virtual local area network (VLAN) as a local area
network configured by software, not by physical wiring.

1.#

18

A switch connecting three LANs

A switch using VLAN software

1.#

19

Two switches in a backbone using VLAN

VLAN with Ethernet Switches

1.#

20

VLAN Membership
Vendors use different characteristics such as interface
numbers, port numbers, MAC addresses, IP addresses, IP
multicast addresses, or a combination of two or more of
these.

Single Point of Failure and 802.1D

1.#

21

Switch Purchasing Considerations


Number and Speeds of Ports
Buyers must decide on the number of ports needed and
the speed of each
Buyers often can buy a prebuilt switch with this
configuration

Store-and-Forward Versus Cut-Through Switching

Store-and-forward switches receive the entire frame before


sending bits back out
Cut-through switches send the frame out after only a few
octets
Cut-through switches reduce latency, but this is rarely
important at todays switch speeds

1.#

22

Manageability

SNMP Manager controls many managed switches

Manageability

1.#

Polling enables managers to collect data and diagnose


problems
Switches can be fixed remotely by changing their
configurations

23

Manageability

Manager provides the network administrator with summary


performance data
Managed switches are substantially more expensive than
unmanaged switches
However, in large networks, the savings in labor costs and
rapid response are worth it, reducing the TCO compared
with unmanaged switches

Physical and Electrical Features

Switches fit into standard


19-inch wide (48-cm wide)
equipment racks
Switch heights usually are
multiples of 1U (1.75 in or
4.4 cm)

19 inches
(48 cm)

1.#

24

Fixed-port switches

No flexibility: The number of ports is fixed


1 or 2U tall
Most workgroup switches are fixed-port switches

Stackable switches

1.#

Fixed number of ports


1U or 2U tall
High-speed interconnect bus connects stacked switches
Ports can be added in increments of as few as 12

25

Modular switches

1U or 2U tall
Contain one or a few slots
Each slot module contains 1 to 4 ports

Module

Chassis switches

1.#

Several U tall
Contain several expansion
slots
Each expansion board
contains several slots
Most core switches are
chassis switches

26

IEEE802.3at Power Over Ethernet

Switches require electrical power


In addition, switches can provide electrical power to devices
connected by UTP cables
With PoE, switches can supply 25.5 W DC power to devices
connected by UTP cables

IEEE802.3az Energy-Efficient Ethernet

1.#

27

Wireless LANs

Isolated LANs: wired versus wireless

1.#

28

Connection of a wired LAN and a wireless LAN to


other

Access Control
Maybe the most important issue we need to discuss in a
wireless LAN is access controlhow a wireless host can get
access to the shared medium (air). The CSMA/CD algorithm
does not work in wireless LANs for three reasons:
Wireless hosts do not have enough power to send and
receive at the same time.
The hidden station problem prevents collision detection
The distance between stations can be great.

1.#

29

Hidden station problem

Hidden station problem

1.#

30

IEEE 802.11 PROJECT


IEEE has defined the specifications for a wireless LAN, called
IEEE 802.11, which covers the physical and data-link layers.
It is sometimes called wireless Ethernet. In some countries,
including the United States, the public uses the term WiFi
(short for wireless fidelity) as a synonym for wireless LAN.
WiFi, however, is a wireless LAN that is certified by the WiFi
Alliance.

Architecture
The standard defines two kinds of services: the basic service
set (BSS) and the extended service set (ESS).

1.#

31

Basic service sets (BSSs)

Extended service set (ESS)

1.#

32

MAC Sublayer
IEEE 802.11 defines two MAC sublayers: the distributed
coordination function (DCF) and point coordination function
(PCF). Next figure shows the relationship between the two
MAC sublayers, the LLC sublayer, and the physical layer. We
discuss the physical layer implementations later in the
chapter and will now concentrate on the MAC sublayer.

MAC layers in IEEE 802.11 standard

1.#

33

CSMA/CA and NAV

NAV

Example of repetition interval

1.#

34

Frame format

Specifications

1.#

35

802.11 Wireless Access Points and NICs

Bluetooth
Bluetooth is a wireless LAN technology designed to connect
devices of different functions when they are at a short
distance from each other. Bluetooth was standardized as
IEEE 802.15.1, but the standard is no longer maintained. A
Bluetooth LAN is an ad hoc network. The devices, sometimes
called gadgets, find each other and make a network called a
piconet.

1.#

36

Piconet

Scatternet

1.#

37

Single-secondary communication

Multiple-secondary communication

1.#

38

Other Local Wireless Technologies

UWB
ZigBee
RFIDs
NFC
Software-defined radio

RFID (Radio Frequency ID) Tags

1.#

Like UPC tags but readable remotely


In most cases, the radio signal from the reader provides
power for the RFID tag
The RFID tag uses this power to send information about
itself
Battery-operated RFID tags can send farther and send
more information

39

Near Field Communication

Software-Defined Radio

1.#

Can implement multiple wireless protocols


No need to have separate radio circuits for each protocol
Reduces the cost of multi-protocol devices

40

IEEE802.16 WiMAX
People want to have access to the Internet from home or
office (fixed) where the wired access to the Internet is either
not available or is expensive. People also need to access the
Internet when they are using their cellular phones. WiMAX
has been designed for these types of applications.

Fixed WiMAX

1.#

41

Mobile WiMAX

1.#

42

You might also like