0% found this document useful (0 votes)
29 views38 pages

Komunikasi Data Dan Jaringan Komputer - Pertemuan 4

Komunikasi Data dan Jaringan Komputer discusses Local Area Networks (LANs) and wireless networks. It describes how LANs can connect computers within an organization and how most LANs today are also connected to wide area networks. It focuses on Ethernet as the dominant LAN technology and discusses IEEE standards for regulating interconnectivity between LANs. It also provides an overview of wireless network standards including IEEE 802.11, basic service sets, extended service sets, and the proliferation of wireless technologies driven by mobile devices.

Uploaded by

Ksatria AFK
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views38 pages

Komunikasi Data Dan Jaringan Komputer - Pertemuan 4

Komunikasi Data dan Jaringan Komputer discusses Local Area Networks (LANs) and wireless networks. It describes how LANs can connect computers within an organization and how most LANs today are also connected to wide area networks. It focuses on Ethernet as the dominant LAN technology and discusses IEEE standards for regulating interconnectivity between LANs. It also provides an overview of wireless network standards including IEEE 802.11, basic service sets, extended service sets, and the proliferation of wireless technologies driven by mobile devices.

Uploaded by

Ksatria AFK
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

Komunikasi Data dan

Jaringan Komputer :

Aries Kusdaryono
Magister Komputer
Universitas Budi Luhur
LAN
• Local Area Network (LAN) is a computer network that is
designed for a limited geographic area such as a building or a
campus
• can be used as an isolated network to connect computers in an
organization for the sole purpose of sharing resources
• most LANs today are also linked to a wide area network (WAN)
or the Internet
• The LAN market has seen several technologies such as
Ethernet, Token Ring, Token Bus, FDDI, and ATM LAN
• Some of these technologies survived for a while, but Ethernet is by
far the dominant technology
• IEEE Standard Project 802
• designed to regulate the manufacturing and interconnectivity
between different LANs
• Ethernet LANs
IEEE STANDARDS
• Computer Society of the IEEE started a project, called Project
802, to set standards to enable intercommunication among
equipment from a variety of manufacturers
• It is a way of specifying functions of the physical layer and the
data link layer of major LAN protocols
• The IEEE has subdivided the data link layer into two sub
layers:
• logical link control (LLC) and
• media access control (MAC).
• IEEE has also created several physical layer standards for different
LAN protocols
Data Link Layer
• Logical Link Control (LLC)
• Data link control handles framing, flow control, error control.
• Flow control, error control and part of the framing duties are
collected into one sub layer called LLC
• Provides one single data link control protocol for all IEEE LANs
• Provide interconnectivity between different LANs because it makes
the MAC sub layer transparent
• Framing
• LLC defines a protocol data unit (PDU)
• The header contains a control field that is used for flow and error
control
• Ttwo other header fields define the upper-layer protocol at the source
and destination that uses LLC. Destination Service Access Point (DSAP)
and the Source Service Access Point (SSAP)
• Purpose : Provide flow and error control for the upper layer
protocols that actually demand these services
• most upper-layer protocols such as IP do not use the services of
LLC
Data Link Layer
• Media Access Control (MAC)
• defines the specific access method for each LAN
• Example
• it defines CSMA/CD as the media access method for Ethernet LAN
• Token-passing method for Token Ring and Token Bus LANs
• MAC sub layer contains a number of distinct modules
• each defines the access method and the framing format specific to
the corresponding LAN protocol
STANDARD ETHERNET
• History
• The original Ethernet was created in 1976 at Xerox's Palo Alto
Research Center (PARC)
• Four generations
• Standard Ethernet (10 Mbps),
• Fast Ethernet (100 Mbps),
• Gigabit Ethernet (1 Gbps),
• and Ten-Gigabit Ethernet (10 Gbps)
STANDARD ETHERNET
• MAC Sub layer
• In Standard Ethernet, the MAC sub layer governs the operation
of the access method.
• frames data received from the upper layer and passes them to
the physical layer
• Frame Format
• Ethernet frame contains seven fields
• preamble, SFD, DA, SA, length or type of protocol data unit (PDU),
upper-layer data, and the CRC
STANDARD ETHERNET
• Preamble
• The first field of the 802.3 frame contains 7 bytes (56 bits) of alternating 0s and 1s
• alerts the receiving system to the coming frame and enables it to synchronize its input timing
• Pattern provides only an alert and a timing pulse
• Start frame delimiter (SFD)
• second field (1 byte) signals the beginning of the frame
• SFD warns the station or stations that this is the last chance for synchronization
• Destination address (DA)
• DA field is 6 bytes and contains the physical address of the destination station or stations
to receive the packet
• Source address (SA)
• SA field is also 6 bytes and contains the physical address of the sender of the packet
• Length or type
• defined as a type field or length field
• IEEE standard used it as the length field to define the number of bytes in the data field
• Data
• field carries data encapsulated from the upper-layer protocols
• minimum of 46 and a maximum of 1500 bytes
• CRC (Cyclic Redundancy Check)
• last field contains error detection information
STANDARD ETHERNET
• Frame Length
• Ethernet frame needs to have a minimum length of 512 bits or
64 bytes
• Part of this length is the header and the trailer.
• minimum length of data from the upper layer is 46 bytes
• upper-layer packet is less than 46 bytes, padding is added to make
up the difference
• Standard defines the maximum length of a frame as 1518 bytes
• the maximum length of the payload is 1500 bytes
• maximum length restriction has two reasons
• a maximum length restriction helped to reduce the size of the buffer
• maximum length restriction prevents one station from monopolizing the
shared medium, blocking other stations that have data to send
STANDARD ETHERNET
• Frame Length
STANDARD ETHERNET
• Addressing
• Each station on an Ethernet network (such as a PC, workstation,
or printer) has its own network interface card (NIC)
• The NIC fits inside the station and provides the station with a 6-
byte (48 bits) physical address, written in hexadecimal notation
• A source address is always a unicast address-the frame comes
from only one station. The destination address, can be unicast,
multicast, or broadcast
STANDARD ETHERNET
• Addressing
• Unicast and Multicast
• If the least significant bit of the first byte in a destination address is
0, the address is unicast; otherwise, it is multicast
• A unicast destination address defines only one recipient; the
relationship between the sender and the receiver is one-to-one
• Multicast destination address defines a group of addresses; the
relationship between the sender and the receivers is one-to-many
• Broadcast
• broadcast address is a special case of the multicast address; the
recipients are all the stations on the LAN
• A broadcast destination address is forty-eight ls
STANDARD ETHERNET
• Define the type of the following destination addresses:
• a. 4A:30:10:21:10:1A
• B. 47:20:1B:2E:08:EE
• c. FF:FF:FF:FF:FF:FF
STANDARD ETHERNET
• Access Method: CSMA/CD
• Slot Time
• In an Ethernet network, the round-trip time required for a frame
to travel from one end of a maximum-length network to the other
plus the time needed to send the jam sequence is called the slot
time
Slot time = round-trip time + time required to send the jam sequence
• defined in bits (time required for a station to send 512 bits)
STANDARD ETHERNET
• Physical Layer
• The Standard Ethernet defines several physical layer
implementations; four of the most common
• Encoding and Decoding
• All standard implementations use digital signaling (baseband)
at 10 Mbps
• At the sender, data are converted to a digital signal using the
Manchester scheme
• At the receiver, the received signal is interpreted as
Manchester and decoded into data
STANDARD ETHERNET
• 10Base5: Thick Ethernet (Thick Net)
• derives from the size of the cable, which is roughly the size of
a garden hose and too stiff to bend with your hands
• 10Base5 was the first Ethernet specification to use a bus
topology with an external transceiver (transmitter/receiver)
connected via a tap to a thick coaxial cable
• The transceiver is responsible for transmitting, receiving, and
detecting collisions.
STANDARD ETHERNET
• 10Base2: Thin Ethernet (Cheapernet)
• 10Base2 also uses a bus topology, but the cable is much thinner
and more flexible.
• The cable can be bent to pass very close to the stations
STANDARD ETHERNET
• 10Base-T: Twisted-Pair Ethernet
• 1O Base-T uses a physical star topology
• The stations are connected to a hub via two pairs of twisted
cable
• that two pair of twisted cable create two paths (one for sending
and one for receiving between the station and the hub
STANDARD ETHERNET
• 10Base-F: Fiber Ethernet
• 1OBase-F uses a star topology to connect stations to a hub
• The stations are connected to the hub using two fiber-optic
cables
STANDARD ETHERNET
• Summary
Komunikasi Data dan
Jaringan Komputer :

Aries Kusdaryono
Magister Komputer
Universitas Budi Luhur
Introduction
• What is a wireless network?
• A technology that enables two or more entities to
communicate without network cabling
• IEEE Specification for Wireless LAN: IEEE 802.11, which
covers the physical and data link layers.
• Basic Service Set (BSS) is made of stationary or mobile
wireless stations and a possible central base station,
known as the access point (AP).
• BSS without AP is a stand-alone network and cannot send
data to other BSSs. It is what is called as adhoc
architecture.
• Extended Service Set (ESS) is made up of two or more BSSs with
APs.
• BSSs are connected through a Distributed System, which is
usually a wired LAN.
• Nodes can be mobile or stationary.
• A mobile can belong to more than one BSS at the same time.
• Communication among stations in different BSS is via APs
• Communication among stations within a single BSS might be
direct.
Wireless Local Area Networks
• The proliferation of laptop computers and other mobile devices
(PDAs and cell phones) created an obvious application level
demand for wireless local area networking.
• Companies jumped in, quickly developing incompatible wireless
products in the 1990’s.
• Industry decided to entrust standardization to IEEE committee
that dealt with wired LANS – namely, the IEEE 802 committee!!
IEEE 802 Standards Working Groups
Categories of Wireless Networks
• Base Station :: all communication through an access point
{note hub topology}. Other nodes can be fixed or mobile.
• Infrastructure Wireless :: base station network is connected to
the wired Internet.
• Ad hoc Wireless :: wireless nodes communicate directly with
one another.
• MANETs (Mobile Ad Hoc Networks) :: ad hoc nodes are mobile.
Wireless LANs

(a) Wireless networking with a base station. (b) Ad hoc networking.


Types of Wireless Network
• 4 different types of wireless networks
• IrDA (Infrared Data Association)
• Bluetooth
• HomeRF (SWAP)
• “Shared Wireless Access Protocol”
• WECA (Wi-Fi)
• “Wireless Ethernet Compatibility Alliance”
IrDA (Infrared Data Association)
• Uses beams of light in the infrared spectrum
• Remote controls
• Fairly reliable and low-cost
• Drawback: It is a “line-of-sight” technology
• less interference
• Drawback: “one-to-one” technology
• You can send data only between two things at once (but
increased security?)
Bluetooth
• The magic number: 2.45 gigahertz
• Radio-frequency also used by baby monitors, garage door openers,
and cordless phones
• How do you avoid interference?
• Bluetooth sends weak signals of 1 milliwatt
• Powerful cell phones use 3 watts
• Bluetooth devices limited to 10 meters
• But they can go through walls better than others
Bluetooth
• Bluetooth is a wireless LAN technology designed to
connect devices of different functions such as telephones,
notebooks, computers, cameras, printers,…
• A Bluetooth LAN is an ad hoc network, which means that
the network is formed spontaneously; the devices,
sometimes called gadgets, find each other and make a
network called piconet.
• Ex. Wireless mouse or keyboard, conference among
palmtop computers, …
• IEEE 802.15 standard
• A Bluetooth network is called a piconet, or a small net.
• It can have up to eight stations, one of which is called the
master; the rest are called slaves.
• Maximum of seven slaves. Only one master.
• Slaves synchronize their clocks and hopping sequence with
the master.
• But an additional eight slaves can stay in parked state,
which means they can be synchronized with the master
but cannot take part in communication until it is moved
from the parked state.
• Piconets can be combined to form what is called a
scatternet.
• A slave station in one piconet can become the master in
another piconet.
• Bluetooth devices has a built-in short-range radio
transmitter.
Wireless Fidelity (Wi-Fi)
• Essentially, this technology is a variation of the IEEE
802.11 specification known as 802.11b
• Focuses on Direct-Sequence Spread Spectrum (DSSS)
• High data rate (max of 11 Mbps)
• In the case of interference, speed drops in halves (11 Mbps to 5.5
Mbps to 2 Mbps to 1 Mbps)
Wi-Fi
• Advantages:
• Fast (11 Mbps)
• Reliable
• Long Range (up to 1000 ft outdoors, 400 ft indoors)
• Easy integration to wired networks
• Compatible with original 802.11 DSSS standard
• Disadvantages:
• Speed may fluctuate

You might also like