Introduction To LAN Protocols: Chapter Goals
Introduction To LAN Protocols: Chapter Goals
Introduction To LAN Protocols: Chapter Goals
Chapter Goals
2-1
Chapter 2
What Is a LAN?
Figure 2-1
FDDI
Ethernet/IEEE 802.3
100BaseT
Token Ring/IEEE 802.5
What Is a LAN?
A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects
workstations, personal computers, printers, servers, and other devices. LANs offer computer users many
advantages, including shared access to devices and applications, file exchange between connected users,
and communication between users via electronic mail and other applications.
2-2
1-58705-001-3
Chapter 2
Figure 2-2
LLC
sublayer
IEEE 802.2
OSI layers
FDDI
100BaseT
Physical
layer
IEEE 802.3
Ethernet
MAC
sublayer
Data link
layer
LAN specification
2-3
Chapter 2
Normally CSMA/CD networks are half-duplex, meaning that while a device sends information, it cannot
receive at the time. While that device is talking, it is incapable of also listening for other traffic. This is
much like a walkie-talkie. When one person wants to talk, he presses the transmit button and begins
speaking. While he is talking, no one else on the same frequency can talk. When the sending person is
finished, he releases the transmit button and the frequency is available to others.
When switches are introduced, full-duplex operation is possible. Full-duplex works much like a
telephoneyou can listen as well as talk at the same time. When a network device is attached directly
to the port of a network switch, the two devices may be capable of operating in full-duplex mode. In
full-duplex mode, performance can be increased, but
not quite as much as some like to claim. A 100-Mbps Ethernet segment is capable of transmitting 200
Mbps of data, but only 100 Mbps can travel in one direction at a time. Because most data connections
are asymmetric (with more data traveling in one direction than the other), the gain is not as great as many
claim. However, full-duplex operation does increase the throughput of most applications because the
network media is no longer shared. Two devices on a full-duplex connection can send data as soon as it
is ready.
Token-passing networks such as Token Ring can also benefit from network switches. In large networks,
the delay between turns to transmit may be significant because the token is passed around the network.
LAN Topologies
LAN topologies define the manner in which network devices are organized. Four common LAN
topologies exist: bus, ring, star, and tree. These topologies are logical architectures, but the actual
devices need not be physically organized in these configurations. Logical bus and ring topologies, for
example, are commonly organized physically as a star. A bus topology is a linear LAN architecture in
which transmissions from network stations propagate the length of the medium and are received by all
other stations. Of the three
most widely used LAN implementations, Ethernet/IEEE 802.3 networksincluding
100BaseTimplement a bus topology, which is illustrated in Figure 2-3.
2-4
1-58705-001-3
Chapter 2
Figure 2-3
A ring topology is a LAN architecture that consists of a series of devices connected to one another by
unidirectional transmission links to form a single closed loop. Both Token Ring/IEEE 802.5 and FDDI
networks implement a ring topology. Figure 2-4 depicts a logical ring topology.
Figure 2-4
A star topology is a LAN architecture in which the endpoints on a network are connected to a common
central hub, or switch, by dedicated links. Logical bus and ring topologies are often implemented
physically in a star topology, which is illustrated in Figure 2-5.
A tree topology is a LAN architecture that is identical to the bus topology, except that branches with
multiple nodes are possible in this case. Figure 2-5 illustrates a logical tree topology.
2-5
Chapter 2
LAN Devices
Figure 2-5
LAN Devices
Devices commonly used in LANs include repeaters, hubs, LAN extenders, bridges, LAN switches, and
routers.
Note
Repeaters, hubs, and LAN extenders are discussed briefly in this section. The function and
operation of bridges, switches, and routers are discussed generally in Chapter 4, Bridging
and Switching Basics, and Chapter 5, Routing Basics.
A repeater is a physical layer device used to interconnect the media segments of an extended network.
A repeater essentially enables a series of cable segments to be treated as a single cable. Repeaters receive
signals from one network segment and amplify, retime, and retransmit those signals to another network
segment. These actions prevent signal deterioration caused by long cable lengths and large numbers of
connected devices. Repeaters are incapable of performing complex filtering and other traffic processing.
In addition, all electrical signals, including electrical disturbances and other errors, are repeated and
amplified. The total number of repeaters and network segments that can be connected is limited due to
timing and other issues. Figure 2-6 illustrates a repeater connecting two network segments.
Figure 2-6
Repeater
A hub is a physical layer device that connects multiple user stations, each via a dedicated cable.
Electrical interconnections are established inside the hub. Hubs are used to create a physical star network
while maintaining the logical bus or ring configuration of the LAN. In some respects, a hub functions as
a multiport repeater.
2-6
1-58705-001-3
Chapter 2
A LAN extender is a remote-access multilayer switch that connects to a host router. LAN extenders
forward traffic from all the standard network layer protocols (such as IP, IPX, and AppleTalk) and filter
traffic based on the MAC address or network layer protocol type. LAN extenders scale well because the
host router filters out unwanted broadcasts and multicasts. However, LAN extenders are not capable of
segmenting traffic or creating security firewalls. Figure 27 illustrates multiple LAN extenders
connected to the host router through a WAN.
Figure 2-7
Multiple LAN Extenders Can Connect to the Host Router Through a WAN
WAN
LAN
extender
Review Questions
QDescribe the type of media access used by Ethernet.
AEthernet uses carrier sense multiple access collision detect (CSMA/CD). Each network station
listens before and after transmitting data. If a collision is detected, both stations wait a random time
before trying to resend.
QDescribe the type of media access used by Token Ring.
AToken Ring passes a special type of packet called a token around the network. If a network device
has data to send, it must wait until it has the token to send it. After the data has been sent, the token is
released back on the network.
QDescribe unicast, multicast, and broadcast transmissions.
AA unicast is a transmission from one source to one destination. A multicast is a transmission from
one source to many stations that register to receive the traffic. A broadcast is a transmission from one
source to every station on the local network segment.
2-7
Chapter 2
2-8
1-58705-001-3