• No results found

On a peer-to-peer LAN, every computer is equal and can communicate with any other

N/A
N/A
Protected

Academic year: 2022

Share "On a peer-to-peer LAN, every computer is equal and can communicate with any other "

Copied!
39
0
0

Loading.... (view fulltext now)

Full text

(1)

13.1

LANs Establishment and

Administration

(2)

13.2

Components

Hardware:

PCs

NICs

Connecting Devices

Cables

Connectors

Software

Topology

LAN model:

Client-Server

Peer-to-Peer

(3)

13.3

LAN models

Although every device on a LAN is connected to every other device, they do not necessarily communicate with each other.

•There are two basic types of LANs, based on the communication patterns between the machines:

1. client/server networks 2. peer-to-peer networks.

(4)

13.4

Client Server Model

(5)

13.5

Peer to Peer Model

(6)

13.6

On a peer-to-peer LAN, every computer is equal and can communicate with any other

computer on the network to which it has been granted access rights.

Note

(7)

13.7

Every computer on a peer-to-peer LAN can function as both a server and a client.

Note

(8)

13.8

13-1 IEEE STANDARDS

In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety of manufacturers. Project 802 is a way of specifying functions of the physical layer and the data link layer of major LAN protocols.

(9)

13.9

Figure 13.1 IEEE standard for LANs

(10)

13.10

13-2 STANDARD ETHERNET

The original Ethernet was created in 1976 at Xerox’s Palo Alto Research Center (PARC). Since then, it has gone through four generations. We briefly discuss the Standard (or traditional) Ethernet in this section.

(11)

13.11

Some IEEE STANDARDS

IEEE 802.3: Ethernet

IEEE 802.4: Token Bus

IEEE 802.5: Token Ring

IEEE 802.11: Wireless LAN (WLAN)

IEEE 802.15: Bluetooth network (WPAN)

(12)

13.12

Figure 13.3 Ethernet evolution through four generations

(13)

13.13

Figure 13.4 802.3 MAC frame

(14)

13.14

Figure 13.5 Minimum and maximum lengths

(15)

13.15

Frame length:

Minimum: 64 bytes (512 bits)

Maximum: 1518 bytes (12,144 bits)

Note

(16)

13.16

Figure 13.6 Example of an Ethernet address in hexadecimal notation

(17)

13.17

Figure 13.7 Unicast and multicast addresses

(18)

13.18

The least significant bit of the first byte defines the type of address.

If the bit is 0, the address is unicast;

otherwise, it is multicast.

Note

(19)

13.19

The broadcast destination address is a special case of the multicast address in

which all bits are 1s.

Note

(20)

13.20

Define the type of the following destination addresses:

a. 4A:30:10:21:10:1A b. 47:20:1B:2E:08:EE c. FF:FF:FF:FF:FF:FF

Example 13.1

(21)

13.21

Define the type of the following destination addresses:

a. 4A:30:10:21:10:1A b. 47:20:1B:2E:08:EE c. FF:FF:FF:FF:FF:FF

Solution

a. This is a unicast address because A in binary is 1010.

b. This is a multicast address because 7 in binary is 0111.

c. This is a broadcast address because all digits are F’s.

Example 13.1

(22)

13.22

Standard Ethernet uses 1-persistent CSMA/CD for access resolution.

Note

(23)

13.23

Figure 13.8 Categories of Standard Ethernet

(24)

13.24

Figure 13.9 Encoding in a Standard Ethernet implementation

(25)

13.25

Figure 13.10 10Base5 implementation

(26)

13.26

Figure 13.11 10Base2 implementation

(27)

13.27

Figure 13.12 10Base-T implementation

(28)

13.28

Figure 13.13 10Base-F implementation

(29)

13.29

Table 13.1 Summary of Standard Ethernet implementations

(30)

13.30

13-4 FAST ETHERNET

IEEE created Fast Ethernet under the name 802.3u.

Fast Ethernet is backward-compatible with Standard Ethernet, but it can transmit data 10 times faster at a rate of 100 Mbps.

(31)

13.31

Figure 13.20 Fast Ethernet implementations

(32)

13.32

Figure 13.21 Encoding for Fast Ethernet implementation

(33)

13.33

Table 13.2 Summary of Fast Ethernet implementations

(34)

13.34

13-5 GIGABIT ETHERNET

The need for an even higher data rate resulted in the design of the Gigabit Ethernet protocol (1000 Mbps).

The IEEE committee calls the standard 802.3z.

(35)

13.35

Figure 13.22 Topologies of Gigabit Ethernet

(36)

13.36

Figure 13.23 Gigabit Ethernet implementations

(37)

13.37

Figure 13.24 Encoding in Gigabit Ethernet implementations

(38)

13.38

Table 13.3 Summary of Gigabit Ethernet implementations

(39)

13.39

Table 13.4 Summary of Ten-Gigabit Ethernet implementations

References

Related documents

– Limited aggregate throughput due to shared link – Cannot support multiple rates or formats.. (e.g., 10 Mbps vs. 100 Mbps Ethernet) – Limitations on maximum

Integrated Ethernet Connection10/100/1000 Networking Card, Remote Booting Facility, Remote System Installation, Remote Wake Up, out of Band Management using any standard management

lower limits of dimensions Intentional difference between the sizes of the shaft and hole Influenced by the method of. manufacture

We propose a new peer-grading mechanism, Peer Evaluation with Quality Assurance (PEQA), that determines how graders are assigned to papers, how final scores are evaluated from

In both cases, the application has 5000 peer interactions with malicious probability value equal to 0.3, and the trust model has a trust threshold value of 0.8 and degree of trust

Policy Based Framework for Trust Management and Evolution of Peer to Peer Groups.. Madhumita

Consistent Hashing Simple Key Location Scalable Key Location Node Joins and Stabilization Failure and Replication Test Results.. Simulation Load Balance Path Length Future

Technical metadata include where the data come from, how the data were changed, how the data are organized, how the data are stored, who owns the data, who is responsible for the