Ch17. Chapter LAN
Ch17. Chapter LAN
Ch17. Chapter LAN
Chapter-17
Local Area Network LAN
Course Contents
Different topologies of Computers connectivity
Various Network types
Various network connecting devices
LAN Architecture
Objectives
After studying this module on Local Networking and the various network connecting
devices, participants are able to join and understand the networking devices
OSI Page 1 of 25
The layered protocol concept can be employed to describe the architecture of a LAN,
wherein each layer represents the basic functions of a LAN.
2.2.1 Protocol Architecture
The Protocols defined for LAN transmission address issues relating to the
transmission of blocks of data over the network. In the context of OSI model, higher layer
protocols (layer 3 or 4 and above) are independent of network architecture and are not
applicable to LAN. Therefore LAN protocols are concerned primarily with the lower layers of
the OSI model.
OSI Page 2 of 25
Application
IEEE 802
Presentation Reference
Model )LLC Service
Session Access Point
~ Upper
layer
~ (LSAP
Transport protocols
Network
() () ()
Logical Link
Control Scope of
Data Link IEEE 802
Medium Standards
access control
Physical Physical
Medium Medium
The lowest layer of the IEEE 802 reference model corresponds to the physical layer
of the OSI model, and includes the following functions:
OSI Page 3 of 25
OSI Page 4 of 25
LAN Topologies
The common topologies for LANs are bus, tree, ring, and star. The bus is a special
case of the tree, with only one trunk and no branches.
OSI Page 5 of 25
OSI Page 6 of 25
OSI Page 7 of 25
B
A
B A
A A
(a) C transmits a frame (c) A copies the frame
addressed to A as it goes by
C
OSI A Page 8 of 25
B
For Restricted Circulation
A
JTO(T) to SDE(T) Broadband Module
d) Star Topology
In the Star type topology, each station is directly connected to a common central
node. Typically, each station attaches to a central node, referred to as the star coupler, via
two point-to point links, one for transmission in each direction.
There are two alternatives for the operation of the central node :
One method is for the central node to operate in a broadcast fashion.
Another method is for the central node to act as a frame switching device. An
incoming frame is buffered in the node and then retransmitted on an outgoing link to the
destination station.
OSI Page 9 of 25
More expensive than linear bus topologies because of the cost of the
concentrators.
The protocols used with star configurations are usually Ethernet or LocalTalk.
2.3 Medium Access Control
Some means of controlling access to the transmission medium is needed to provide
for an orderly and efficient use of network’s transmission capacity. This is the function of
medium access control (MAC) protocol.
There are two areas for MAC
Where and
How to implement MAC in a LAN.
Where refers to whether control is in a centralized or distributed fashion.
In a centralized scheme, a controller is designated that has the authority to grant
access to the network. A station wishing to transmit must wait until it receives permissions
from the controller.
In a decentralized network, each station collectively performs a medium access
control function to dynamically determine the order in which stations transmit
how, is determined by the topology and is a trade-off among competing factors such
as- including cost, performance, and complexity
Access control techniques could follow the same approach used in circuit switching,
viz. frequency-division multiplexing (FDM), and synchronous time-division multiplexing
(TDM). It is desirable to allocate capacity in an asynchronous (dynamic) fashion,. The
asynchronous approach can be further subdivided into three categories: round robin,
reservation and contention.
OSI Page 10 of 25
Table 2
OSI Page 11 of 25
1 octet 1 or 2 Variable
LLC
PDU DSAP SSAP LLC control Information
OSI Page 12 of 25
OSI Page 13 of 25
t1
OSI Page 14 of 25
A B C D
For Restricted Circulation
t2
JTO(T) to SDE(T) Broadband Module
New cards are software configurable, using a software programs to configure the
resources used by the card. Other cards are PNP (plug and Play), which automatically
configure their resources when installed in the computer, simplifying the installation. With
an operating system like Windows 95, auto-detection of new hardware makes network
connections simple and quick.
2.6.2 Cabling
Cables are used to interconnect computers and network components together.
There are 3 main cable types used today :
Twisted pair
Coaxial
Fibre optic
The choice of cable depends upon a number of factors like:
cost
distance
number of computers involved
speed
bandwidth i.e. how fast data is to be transferred
OSI Page 15 of 25
OSI Page 16 of 25
BACKPLANE
Figure 10 : HUB
OSI Page 17 of 25
2.7 Switch
A switch is a networking component used to connect workgroup hubs to form a
larger network or to connect computers that have high bandwidth needs.
Switch working
When a signal enters a port of the switch, the switch looks at the destination
address of the frame and internally establishes a logical connection with the port connected
to the destination node.
Each port on the switch corresponds to an individual collision domain, and network
congestion is avoided. Thus, if a 10-Mbps Ethernet switch has 10 ports, each port effectively
gets the entire bandwidth of 10 Mbps-to the frame, the switch's port appears to provide a
dedicated connection to the destination node. Ethernet switches are capable of establishing
multiple internal logical connections simultaneously, while routers generally process
packets on a first-come, first-served.
OSI Page 18 of 25
OSI Page 19 of 25
BRIDGE
OSI Page 20 of 25
OSI Page 21 of 25
2.9 Routers
In an environment consisting of several network segments with differing protocols
and architectures, a bridge may not be adequate for ensuring fast communication among all
of the segments. A network this complex needs a device which not only knows the address of
each segment, but also determine the best path for sending data and filtering broadcast traffic
to the local segment. Such a device is called a router.
Routers work at the Network layer of the OSI model. This means they can switch and
route packets across multiple networks. They do this by exchanging protocol-specific
information between separate networks. Routers read complex network addressing
information in the packet and, because they function at a higher layer in the OSI model than
bridges, they have access to additional information.
Routers can provide the following functions of a bridge :
Filtering and isolating traffic
Connecting network segments
Routers have access to more information in the packet than bridges, and use this
information to improve packet deliveries. Routers are used in complex network situation
because they provide better traffic management than bridges and do not pass broadcast
traffic. Routers can share status and routing information with one another and use this
information to bypass slow or malfunctioning connections.
OSI Page 22 of 25
OSI Page 23 of 25
OSI Page 24 of 25
OSI Page 25 of 25