Chapter Five
Chapter Five
Chapter Five
Page 1 of 24
Media
Devices can be connected by twisted-pair wire, coaxial cables, or fiber optic cables. Some
networks do without connecting media altogether, communicating instead via radio waves.
Characteristics of WANs
Similarities to LANs
Interconnect computers.
Use some form of media for the interconnection.
Support network applications.
Differences to LANs
Include both data networks, such as the Internet, and voice networks, like telephone
systems.
Interconnect more workstations, so that any one workstation can transfer data to any other
workstation.
Cover large geographic distances, including the earth.
The Four Repeater Rule for 10-Mbps Ethernet should be used as a standard when extending LAN
segments. This rule states that no more than four repeaters can be used between hosts on a LAN.
This rule is used to limit latency added to frame travel by each repeater. A repeater does not
actually connect two LANs; it connects two segments of the same LAN. The segments connected
are still part of one single LAN. A repeater is not a device that can connect two LANs of different
protocols. A repeater is used to lengthen Ethernet network distance limitation by creating network
segments. A repeater forwards every frame; it has no filtering capability.
Page 2 of 24
HUB
An unintelligent network device that sends one signal to all of the stations connected to it.Hubs
are used to connect multiple nodes to a single physical device, which connects to the network.
Hubs are actually multiport repeaters. Using a hub changes the network topology from a linear
bus, to a star. With hubs, data arriving over the cables to a hub port is electrically repeated on all
the other ports connected to the same network segment.
Traditionally, hubs are used for star topology networks, but they are often used with other
configurations to make it easy to add and remove computers without bringing down the network.
Hubs work at the OSI physical layer to regenerate the network’s signal and resend them to other
segments.
TYPES OF HUBS
1. Passive hubs do not amplify the electrical signal of incoming packets before broadcasting them
out to the network. It is just a connector. It connects the wires coming from different branches. In
a star-topology Ethernet LAN, a passive hub is just a point where the signals coming from different
Page 3 of 24
stations collide; the hub is the collision point. This type of a hub is part of the media; its location
in the Internet model is below the physical layer.
2. Active hubs, a type of hub that can perform amplification, as does a repeater. Some people use
the terms concentrator when referring to a passive hub and multiport repeater when referring to an
active hub.
3. Intelligent hubs add extra features to an active hub that are of particular importance to
businesses. An intelligent hub typically is stackable (built in such a way that multiple units can be
placed one on top of the other to conserve space). It also typically includes remote management
capabilities via SNMP and virtual LAN (VLAN) support.
BRIDGE
Bridges are used to logically separate network segments within the same network. Connects two
LANs and forwards or filters data packets between them. It creates an extended network in which
any two workstations on the linked LANs can share data. It forward data depending on the
Hardware (MAC) address, not the Network address (IP).It resides on Layer 2 of the OSI model. It
has one input and one output. It is used to isolate network traffic and computers and also it has the
intelligent to examine incoming packet source and destination addresses.
They operate at the OSI physical and data link layer and are independent of higher-layer protocols.
As a data link layer device, the bridge can check the physical (MAC) addresses (source and
destination) contained in the frame. The function of the bridge is to make intelligent decisions
about whether or not to pass signals on to the next segment of a network. When a bridge receives
a frame on the network, the destination MAC address is looked up in the bridge table to determine
whether to filter, flood, or copy the frame onto another segment Broadcast directions packets are
forwarded to all.
A bridge has filtering capability. It can check the destination address of a frame and decide if the
frame should be forwarded or dropped. If the frame is to be forwarded, the decision must specify
the port. A bridge has a table that maps addresses to ports.
Page 4 of 24
In the above figure two LANs are connected by a bridge. A frame destined for station
712B13456142 arrives at port 1, the bridge consults its table to find the departing port. According
to its table, frames for 712B13456142 leave through port 1; therefore, there is no need for
forwarding, and the frame is dropped. On the other hand, if a frame for 712B13456141 arrives at
port 2, the departing port is port 1 and the frame is forwarded. In the first case, LAN 2 remains
free of traffic; in the second case, both LANs have traffic. Note also that a bridge does not change
the physical addresses contained in the frame.
Transparent Bridges
A transparent bridge is a bridge in which the stations are completely unaware of the bridge's
existence. If a bridge is added or deleted from the system, reconfiguration of the stations is
unnecessary. According to the IEEE 802.1 d specification, a system equipped with transparent
bridges must meet three criteria:
Page 5 of 24
SWITCHES
Switches are Multiport Bridges. Switches provide a unique network segment on each
port, thereby separating collision domains. Today, network designers are replacing hubs in their
wiring closets with switches to increase their network performance and bandwidth while protecting
their existing wiring investments. Like bridges, switches learn certain information about
the data packets that are received from various computers on the network. Switches use this
information to build forwarding tables to determine the destination of data being sent
by one computer to another computer on the network.
Switches operate at the Data Link layer (layer 2) of the OSI model. It can interpret address
information .Switches divide a network into several isolated channels .Each channel has its own
capacity and need not be shared with other channels
Advantages of Switches
• Switches divide a network into several isolated channels (or collision domains)
• Reduce the possibility of collision
• Collision only occurs when two devices try to get access to one channel
• Can be solved by buffering one of them for later access
• Each channel has its own network capacity
• Suitable for real-time applications, e.g. video conferencing
• Since isolated, hence secure
• Data will only go to the destination, but not others
Page 6 of 24
Limitations of Switches
• Although contains buffers to accommodate bursts of traffic, can become overwhelmed by
heavy traffic
• Device cannot detect collision when buffer is full
• CSMA/CD scheme will not work since the data channels are isolated, not
the case as in Ethernet
• Some higher level protocols do not detect error
• E.g. UDP
• Those data packets are continuously pumped to the switch and introduce more
problems.
When we use the term switch, we must be careful because a switch can mean two different things.
We must clarify the term by adding the level at which the device operates.
We can have a two-layer switch or a three-layer switch. A three-layer switch is used at the network
layer; it is a kind of router. The two-layer switch performs at the physical and data link layers.
A two-layer switch is a bridge, a bridge with many ports and a design that allows better (faster)
performance. A bridge with a few ports can connect a few LANs together.
A bridge with many ports may be able to allocate a unique port to each station, with each station
on its own independent entity. This means no competing traffic (no Collision)
TYPES OF SWITCHS
Cut-through switch
Cut-through switch is a packet switch wherein the switch starts forwarding that frame (or packet)
before the whole frame has been received, normally as soon as the destination address is
processed. A cut-through switch can achieve the lowest forwarding delays, but it propagates errors
from one LAN to another, because errors can only be detected at the end of each
frame. In other words, this technique reduces latency through the switch, but decreases reliability.
A switching device that stores a complete incoming data packet before it is sent out. Such switches
are used when incoming and outgoing speeds differ.
Page 7 of 24
5.3 LAN TECHNOLOGY OPTIONS
Ethernet
Destination Address: Unique identifier found nowhere else but on the Network Interface Card to
whom the datagram is being sent
Type Field: Tells the recipient what kind of datagram is being received (IP, UDP, etc.)
Data: What it is that you are trying to send (text, JEPG, MP3, etc.)
Ethernet Tidbits
If a message has less than 46 bytes of data, “padding” is added. Ethernet is often referred to as 100
Base T.
Page 8 of 24
T refers to the system is UTP: Unshielded Twisted Pair
10 Base 5 stands for 10 Mbps on a cable that can go 500 m (multiply the last number by
100 meters)
10 Base 2 stands for 10 Mbps for 2 hundred meters
10 Base 5 and 10 Base 2 identifies Ethernet LANs using thick net and thin net coax cables,
respectively
Ethernet Address
End nodes are identified by their Ethernet Addresses (MAC Address or Hardware Address) which
is a unique 6 Byte address.
The first 3 bytes identify a vendor (also called prefix) and the last 3 bytes are unique for every
host or device the least significant bit of the first byte defines the type of address. If the bit is 0,
the address is unicast; otherwise, it is multicast. The broadcast destination address is a special case
of the multicast address in which all bits are 1s.
EXAMPLE
A.4A:30:10:21:10:1A
B. 47:20:1B:2E:08:E7
Solution
to find the type of the address, we need to look at the second hexadecimal digit from the left. If it
is even, the address is unicast. If it is odd, the address is multicast. If all digits are F’s, the address
is broadcast. Therefore, we have the following:
Page 9 of 24
c. This is a broadcast address because all digits are F’s
STANDARD ETHERNET
ETHERNET
Physical Media:-
10 Base5 - 500 m with at most 4 repeaters (Use Bridge to extend the network)
10 Base2 - 185 m with at most 4 repeaters (Use Bridge to extend the network)
10 Base T - 100 m with at most 4 hubs (Use Switch to extend the network)
FAST ETHERNET
It has 100 Mbps bandwidth. It uses same CSMA/CD media access protocol and packet format as
in Ethernet. 100BaseTX (UTP) and 100BaseFX (Fiber) standards.
Page 10 of 24
Physical media:-
Provision for Auto-Negotiation of media speed: 10 Mbps or 100Mbps (popularly available for
copper media only).
Gigabit Ethernet
1 Gb/s bandwidth. Uses same CSMA/CD media access protocol as in Ethernet and is backward
compatible (10/100/100 modules are available). 1000BaseT (UTP), 1000BaseSX (Multimode
Fiber) and 1000BaseLX (Multimode/Single mode Fiber) standards.
10 GIG ETHERNET
Page 11 of 24
5.4 WIDE AREA NETWORK BASICS
A station is a device that interfaces a user to a network.
•A node is a device that allows one or more stations to access the physical network and is a transfer
point for passing information through a network. A node is often a computer, a router, or a
telephone switch.
•The subnet (old terminology) or physical network is the underlying connection of nodes and
telecommunication links.
A switched network consists of a series of interlinked nodes, called switches. Switches are devices
capable of creating temporary connections between two or more devices linked to the switch. In a
switched network, some of these nodes are connected to the end systems (computers or telephones,
for example). Others are used only for routing. A network categorized by the way it transfers
information from one node to another as
CIRCUIT-SWITCHED NETWORKS
Page 12 of 24
As shown above, when end system A needs to communicate with end system M, system A
needs to request a connection to M that must be accepted by all switches as well as by M itself.
This is called the setup phase; a circuit (channel) is reserved on each link, and the combination of
circuits or channels defines the dedicated path. After the dedicated path made of connected circuits
(channels) is established, data transfer can take place. After all data have been transferred, the
circuits are torn down.
Page 13 of 24
PACKET SWITCHED NETWORKS
DATAGRAM NETWORKS
In data communications, we need to send messages from one end system to another. If the message
is going to pass through a packet-switched network, it needs to be divided into packets of fixed or
variable size. The size of the packet is determined by the network and the governing protocol.
In packet switching, there is no resource allocation for a packet. This means that there is no
reserved bandwidth on the links, and there is no scheduled processing time for each packet.
Resources are allocated on demand. The allocation is done on a first-come, first-served basis.
When a switch receives a packet, no matter what is the source or destination, the packet must wait
if there are other packets being processed. As with other systems in our daily life, this lack of
reservation may create delay.
In a datagram network, each packet is treated independently of all others. Even if a packet
is part of a multi packet transmission, the network treats it as though it existed alone. Packets in
this approach are referred to as datagrams.
In this example, all four packets (or datagrams) belong to the same message, but may travel
different paths to reach their destination. This is so because the links may be involved in carrying
packets from other sources and do not have the necessary bandwidth available to carry all the
packets from A to X.
Page 14 of 24
This approach can cause the datagrams of a transmission to arrive at their destination out of order
with different delays between the packets. Packets may also be lost or dropped because of a lack
of resources. In most protocols, it is the responsibility of an upper-layer protocol to reorder
the datagrams or ask for lost datagrams before passing them on to the application.
The datagram networks are sometimes referred to as connectionless networks. The term
connectionless here means that the switch (packet switch) does not keep information about the
connection state. There are no setup or teardown phases. Each packet is treated the same by a
switch regardless of its source or destination.
Routing Table
If there are no setup or teardown phases, how are the packets routed to their destinations in a
datagram network? In this type of network, each switch (or packet switch) has a routing table
which is based on the destination address. The routing tables are dynamic and are updated
periodically.
The destination addresses and the corresponding forwarding output ports are recorded in the tables.
This is different from the table of a circuit-switched network in which each entry is created when
the setup phase is completed and deleted when the teardown phase is over.
Destination Address
Every packet in a datagram network carries a header that contains, among other information, the
destination address of the packet. When the switch receives the packet, this destination address is
examined; the routing table is consulted to find the corresponding port through which the packet
should be forwarded.
This address, unlike the address in a virtual-circuit switched network, remains the same during the
entire journey of the packet.
Efficiency
• the efficiency of a datagram network is better than that of a circuit-switched network; resources
are allocated only when there are packets to be transferred. If a source sends a packet and there is
a delay of a few minutes before another packet can be sent, the resources can be reallocated during
these minutes for other packets from other sources.
Page 15 of 24
VIRTUAL-CIRCUIT NETWORKS
1. As in a circuit-switched network, there are setup and teardown phases in addition to the
data transfer phase.
2. Resources can be allocated during the setup phase, as in a circuit-switched network, or on
demand, as in a datagram network.
3. As in a datagram network, data are packetized and each packet carries an address in the
header. However, the address in the header has local jurisdiction (it defines what should be
the next switch and the channel on which the packet is being carried), not end-to-end
jurisdiction. How the intermediate switches know where to send the packet if there is no
final destination address carried by a packet? Using virtual-circuit identifiers.
4. As in a circuit-switched network, all packets follow the same path established during the
connection.
5. A virtual-circuit network is normally implemented in the data link layer, while a circuit-
switched network is implemented in the physical layer and a datagram network in the
network layer.
The above figure is an example of a virtual circuit network. The network has switches that allow
traffic from sources to destinations. A source or destination can be a computer, packet switch,
bridge, or any other device that connects other networks.
Page 16 of 24
In a virtual-circuit network, two types of addressing are involved: global and local (virtual-circuit
identifier).
Global Addressing
A source or a destination needs to have a global address-an address that can be unique in the scope
of the network or internationally if the network is part of an international network. However, a
global address in virtual-circuit networks is used only to create a virtual circuit identifier.
Virtual-Circuit Identifier
The identifier that is actually used for data transfer is called the virtual-circuit identifier (VCI). A
VCI, unlike a global address, is a small number that has only switch scope; it is
used by a frame between two switches. When a frame arrives at a switch, it has a VCI; when it
leaves, it has a different VCI.
Note that a VCI does not need to be a large number since each switch can use its own unique set
of VCI.
Switch (layer 3 switch) - A switch is a network device that selects a path or circuit for sending a
unit of data to its next destination. Operates at layer 2 (and 3), and uses MAC addresses/IP
Addresses to send data to correct destination. (LAN switches are not this type)
Page 17 of 24
Routed networks are often large and complex, and it would be prohibitively difficult to manage
and update network information on all routers all the time. Several algorithms have been developed
to help address these difficulties. These algorithms allow the routers to learn about the network
and then make decisions based on that information.
To learn paths (or routes) through a network, and make decisions on where to send packets, a
router use
Destination address - Typically the Internet Protocol (IP) address of the data’s (packet)
destination.
Possible routes - Routes that can get information from its present location or source to some other
location (the destination or closest known point).
Best route - The best path to the intended destination. (“Best” can mean many things.)
Status of routes - The current state of routes, which routers track to ensure timely delivery of
information.
Routers often make decisions about the best possible path to get information from a source to a
destination. “Best,” however, is loosely defined, and it depends on what is valued by the network.
These measurements of value are referred to as metrics. Which metrics are valued by the network
is determined by the network administrator. Several metrics are listed here:
Maximum transmission unit (MTU) - Maximum message length (or packet size) allowed on the
path.
Cost - Arbitrary value based on a network- administrator‘s determined value. Usually some
combination of other metrics.
Page 18 of 24
Static versus Dynamic
Routers must learn about the network around them to make determinations on where to send
packets. This information can either be manually entered (static routes) or learned from other
routers in the network (dynamic routes):
Static routes - When a network administrator manually enters information about a route, it is
considered a static route. Only a network administrator can change this information. (That is, the
router does not learn from, or update, its routing tables based on network events.) Static routes
allow for tight control of packets but are difficult to maintain and prone to human error.
Dynamic routes - Routers on a network can learn about possible routes and current route status
from other routers in the network. Routes learned in this way are called dynamic routes. Routers
in dynamic routes learn about changes in the network without administrative intervention
and automatically propagate them throughout the network.
With flat networks, all routers must keep track of all other routers on the network. As
networks grow, the amount of information contained in the routing tables increases.
Although this method is simple, it can result in poor network performance because the number of
routing updates traffic grows with each new router.
Hierarchical networks segment routers into logical groupings. This arrangement simplifies routing
tables and greatly reduces overhead traffic.
The two main classes of routing are distant vector routing and link-state routing. With distance-
vector routing, routers share their routing table information with each other. Also referred to as
routing by rumor,” each router provides and receives updates from its direct neighbor.
The only information a router knows about a remote network is the distance or metric to reach that
network and which path or interface to use to get there
Page 19 of 24
A distance vector describes the direction (port) and the distance (number of hops or other metric)
to some other router. When a router receives information from another router, it increments
whatever metric it is using. This process is called distance accumulation.
Routers using this method know the distance between any two points in the network, but they do
not know the exact topology of an internetwork.
Network discovery is the process of learning about indirectly connected routers. During network
discovery, routers accumulate metrics and learn the best paths to various destinations in the
network.
With link-state routing, also known as shortest path first (SPF), each router maintains a database
of topology information for the entire network. Link-state routing provides better scaling than
distance-vector routing because it only sends updates when there is a change in the network, and
then it only sends information specific to the change that occurred.
A router configured with a link-state routing protocol can create a "complete view" or topology of
the network by gathering information from all of the other routers.
Distance vector uses regular updates and sends the whole routing table every time. Link-state
routing also uses a hierarchical model, limiting the scope of route changes that occur.
Uses POTS (Plain Old Telephone System). It provides a low cost need based access. Bandwidth
33.6 /56 Kbps.
On the Customer End: Modem is connected to a Telephone Line on the Service Provider End.
Remote Access Server (RAS) is connected to Telephone Lines (33.6 Kbps connectivity) or E1/R2
Line (56 Kbps connectivity) RAS provide dial in connectivity, authentication and metering.
Achievable bandwidth depends on the line quality.
Page 20 of 24
Leased Line
Used to provide point-to-point dedicated network connectivity. Each side of the line permanently
connected to the other, unlike dial-up connections, a leased line is always active. Connecting two
locations in exchange for a monthly rent, the fee for the connection is a fixed monthly
rate.
Typically, leased lines are used by businesses to connect geographically distant offices Analog
leased line can provide maximum bandwidth of 9.6 Kbps. Digital leased lines can provide
bandwidths : 64 Kbps, 2 Mbps (E1), 8 Mbps (E2), 34 Mbps (E3)
Page 21 of 24
Another alternative to using analog telephones lines to establish a connection is ISDN. It is s a set
of communications standards for simultaneous digital transmission of voice, video, data, and other
network services over the traditional circuits of the public switched telephone network. Speed is
one advantage ISDN has over telephone line connections. ISDN network is a switched digital
network consisting of ISDN Switches. ISDN user accesses network through a set of standard
interfaces provided by ISDN User Interfaces.
Basic Access - Consists of two 64Kbps user channels (B channel) and one 16Kbps signal channel
(timing and alarm channel) (D channel) providing service at 144 Kbps.
Primary access - Consists of thirty 64Kbps user channels (B channels) and a 64 Kbps signal
channel (timing and alarm channel) (D channel) providing service at 2.048Mbps (One 64 Kbps
channel is used for Framing and Synchronization).
(DSL) uses the Ordinary Telephone line and is an always-on technology. This means there is no
need to dial up each time to connect to the Internet. Because DSL is highly dependent upon noise
levels, a subscriber cannot be any more than 5.5 kilometers (2-3 miles) from the DSL Exchange
Service can be symmetric, in which downstream and upstream speeds are identical, or asymmetric
in which downstream speed is faster than upstream speed. DSL comes in several varieties:
Page 22 of 24
Asymmetric DSL (ADSL)
High Data Rate DSL (HDSL)
Symmetric DSL (SDSL)
Very High Data Rate DSL (VDSL)
Cable Modems
The cable modem connects a computer to the cable company network through the same coaxial
cabling that feeds cable TV (CATV) signals to a television set. Uses Cable Modem at Home End
and CMTS (Cable Modem Termination System) at Head End.
Characteristics:
Cable modems are primarily used to deliver broadband Internet access in the form of cable Internet,
taking advantage of the high bandwidth of a cable television network.
VSAT
Very Small Aperture Terminal (VSAT) provide communication between two nodes through a
powerful Earth station called a Hub. If two terminals want to communicate, they send their
messages to the satellite, which sends it to the Hub and the Hub then broadcasts the message
through the satellite. Typical Bandwidth offered is 9.6/19.2/32/64/128/256/512 Kbps Each satellite
sends and receives over two bands
Page 23 of 24
Uplink: From the earth to the satellite
Ku-band based networks, are used primarily in Europe and North America and utilize the smaller
sizes of VSAT antennas. C-band, used extensively in Asia, Africa and Latin America, require
larger antenna.
VSATs are most commonly used to transmit narrowband data (point of sale transactions such as
credit card, polling or RFID data), or broadband data (for the provision of Satellite Internet access
to remote locations, VoIP or video).
VSATs are also used for transportable, on-the-move (utilizing phased array antennas) or mobile
maritime communications.
Page 24 of 24