other lan technologies chapter 5 copyright 2003 prentice-hall panko’s business data networks and...
TRANSCRIPT
![Page 1: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/1.jpg)
Other LAN Technologies
Chapter 5
Copyright 2003 Prentice-HallPanko’s Business Data Networks and Telecommunications, 4th edition
![Page 2: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/2.jpg)
2
Other LAN Technologies
Large Ethernet networks
Wireless LANs
ATM LANS and QoS
Legacy LANs Token-Ring Networks
10 Mbps Ethernet co-axial cable LANs
![Page 3: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/3.jpg)
3
Figure 5.1: Multi-Switch Ethernet LAN
Switch 2
Switch 1 Switch 3
Port 5 on Switch 1to Port 3 on Switch 2
Port 7 on Switch 2to Port 4 on Switch 3
C3-2D-55-3B-A9-4FSwitch 2, Port 5
A1-44-D5-1F-AA-4CSwitch 1, Port 2
E5-BB-47-21-D3-56Switch 3, Port 6
D4-55-C4-B6-9FSwitch 3, Port 2
B2-CD-13-5B-E4-65Switch 1, Port 7
![Page 4: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/4.jpg)
4
Switching Table Switch 1Port Station
2 A1-44-D5-1F-AA-4C7 B2-CD-13-5B-E4-655 C3-2D-55-3B-A9-4F5 D4-47-55-C4-B6-9F5 E5-BB-47-21-D3-56
Figure 5.1: Multi-Switch Ethernet LAN
Switch 2
Switch 1
Port 5 on Switch 1to Port 3 on Switch 2
A1-44-D5-1F-AA-4CSwitch 1, Port 2
B2-CD-13-5B-E4-65Switch 1, Port 7
E5-BB-47-21-D3-56Switch 3, Port 6
![Page 5: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/5.jpg)
5
Figure 5.1: Multi-Switch Ethernet LAN
Switch 2
Switch 1 Switch 3
Port 5 on Switch 1to Port 3 on Switch 2
Port 7 on Switch 2to Port 4 on Switch 3
C3-2D-55-3B-A9-4FSwitch 2, Port 5
Switching Table Switch 2Port Station
3 A1-44-D5-1F-AA-4C3 B2-CD-13-5B-E4-655 C3-2D-55-3B-A9-4F7 D4-47-55-C4-B6-9F7 E5-BB-47-21-D3-56 E5-BB-47-21-D3-56
Switch 3, Port 6
![Page 6: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/6.jpg)
6
Figure 5.1: Multi-Switch Ethernet LAN
Switch 2
Switch 3
Port 7 on Switch 2to Port 4 on Switch 3
A1-44-D5-1F-AA-4CSwitch 1, Port 2
D4-55-C4-B6-9FSwitch 3, Port 2
Switching Table Switch 3Port Station
4 A1-44-D5-1F-AA-4C4 B2-CD-13-5B-E4-654 C3-2D-55-3B-A9-4F2 D4-47-55-C4-B6-9F6 E5-BB-47-21-D3-56
E5-BB-47-21-D3-56Switch 3, Port 6
![Page 7: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/7.jpg)
7
Figure 5.2: Hierarchical Ethernet LAN
Ethernet Switch F
Server YServer X
Client PC1
Only OnePossible Path
BetweenAny TwoStations
PC Client 2
EthernetSwitch E
EthernetSwitch D
EthernetSwitch B
EthernetSwitch A
EthernetSwitch C
![Page 8: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/8.jpg)
8
Figure 5.3: Single Point of Failure in a Switch Hierarchy
No CommunicationNo Communication
Switch 1
Switch 2
Switch 3
Switch Fails
A1-44-D5-1F-AA-4C
B2-CD-13-5B-E4-65
C3-2D-55-3B-A9-4F
D4-47-55-C4-B6-9F
E5-BB-47-21-D3-56
![Page 9: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/9.jpg)
9
Figure C.10: 802.1D Spanning Tree Protocol
Switch 1
Switch 2
Switch 3
A1-44-D5-1F-AA-4C
B2-CD-13-5B-E4-65
C3-2D-55-3B-A9-4F
D4-47-55-C4-B6-9F
E5-BB-47-21-D3-56
Activated
Activated
Deactivated
Normal OperationLoop, but Spanning Tree ProtocolDeactivates One Link
Module C
![Page 10: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/10.jpg)
10
Figure C.10: 802.1D Spanning Tree Protocol
Switch 1
Switch 2
Switch 3
A1-44-D5-1F-AA-4C
B2-CD-13-5B-E4-65
C3-2D-55-3B-A9-4F
D4-47-55-C4-B6-9F
E5-BB-47-21-D3-56
Deactivated Deactivated
Activated
Switch 2 FailsModule C
![Page 11: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/11.jpg)
11
Figure 5.2: Hierarchical Ethernet LAN
Core
WorkgroupEthernet Switch F
Server YServer XClient PC1
PC Client 2
WorkgroupEthernetSwitch E
WorkgroupEthernetSwitch D
Core EthernetSwitch B
CoreEthernetSwitch A
Core EthernetSwitch C
![Page 12: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/12.jpg)
12
Figure C.8: Switching Matrix with Queue
Switch Matrix
Input Queue
IncomingSignal
OutgoingSignal
Port1
Port2
Port3
Port4
Port5
Port6
Port7
Port8
Module C
![Page 13: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/13.jpg)
13
Figure 5.4: Workgroup Switches versus Core Switches
Ports = 4
Speed = 1 Gbps
Maximum input = 4 Gbps
Nonblocking switch matrix capacity = 4 Gbps
1 Gbps
1 Gbps
1 Gbps1 Gbps
Switching Matrix4Gbps
Nonblocking
![Page 14: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/14.jpg)
14
Figure 5.4: Workgroup Switches versus Core Switches
Connects
Typical PortSpeeds
Switching Matrix
Workgroup Switches
Client or Server to theEthernet Network via An access line
10/100 Mbps
Lower Percentage ofNonblocking CapacityBut not less than 25%
Core Switches
Ethernet Switchesto One Another viaA trunk line
100 Mbps, Gigabit Ethernet,10 Gbps Ethernet
80% or More ofNonblocking Capacity
![Page 15: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/15.jpg)
15
Client A
Client B
Client C
Server D Server E
ServerBroadcast
Figure 5.5: Virtual LAN with Ethernet Switches
Server Broadcasting without VLANS
Frame is BroadcastGoes to all stationsCreates congestion
![Page 16: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/16.jpg)
16
Figure 5.5: Virtual LAN with Ethernet Switches
Server Multicasting with VLANS
Client Aon VLAN1
Client Bon VLAN2
Client Con VLAN1
Server Don VLAN2
Server Eon VLAN1
ServerBroadcast
VLANs are collections of servers and their clients
Multicasting (some), not Broadcasting (all)
![Page 17: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/17.jpg)
17
Figure 5.6: Tagged Ethernet Frame
Source Address (6 Octets)
Length (2 Octets)Length of Data Field in
Octets1,500 (Decimal) Maximum
Tag Protocol ID (2 Octets)1000000100000000
81-00 hex; 33,024 decimalLarger than 1,500, So not
A Length
By lookingat the value
in the 2octets after
theaddresses,the switchcan tell ifthis frameis basic(value < 1,500)
or tagged(value = 33,024)
Basic 802.3 MAC Frame Tagged 802.3 MAC Frame
Source Address (6 Octets)
Tag Control Information(2 Octets) Priority Level (0-7)
(3 bits); VLAN ID (12 bits)(1 other bit)
Length (2 Octets)
Data Field (variable)
![Page 18: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/18.jpg)
18
Figure 5.7: Ethernet Physical Layer Standards
Physical LayerStandard
SpeedMaximum
Run Length
UTP
10Base-T
100Base-TX
10 Mbps
100 Mbps
100 meters
100 meters
Medium
4-pair Category 3, 4, or 5
4-pair Category 5
1000Base-T 1,000 Mbps 100 meters4-pair Category 5, 4-pairEnhanced Category 5 is
preferred
![Page 19: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/19.jpg)
19
Figure 5.7: Ethernet Physical Layer Standards
Physical LayerStandard
SpeedMaximum
Run Length
Optical Fiber
Medium
10Base-F* 10 Mbps UP to 2 km*62.5/125 micron
multimode, 850 nm.
100Base-FX 100 Mbps 412 m62.5/125 multimode,
1,300 nm, hub
100 Base-FX 100 Mbps 2 km62.5/125 multimode,
1,300 nm, switch
* Several 10 Mbps fiber standards were defined in 10Base-F.
![Page 20: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/20.jpg)
Wireless LANs
![Page 21: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/21.jpg)
21
Figure 5.8: Typical 802.11 Wireless LAN Operation with Access Points
Switch
Client PCServer
Large Wired LAN
AccessPoint A
AccessPoint B
UTP Radio Link
HandoffIf mobile computermoves to another
access point,it switches serviceto that access point
Notebook
CSMA/CA+ACK
UTP
![Page 22: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/22.jpg)
22
Figure 5.8: Typical 802.11 Wireless LAN Operation with Access Points
WirelessNotebook
NIC
Access Point
IndustryStandard
CoffeeCup
To EthernetSwitch
Antenna(Fan) PC Card
Connector
![Page 23: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/23.jpg)
23
Figure 5.8: Typical 802.11 Wireless LAN Operation with Access Points
D-LinkWirelessAccessPoint
Using Two Antennas Reduces Multipath Interference (See Ch. 3)
![Page 24: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/24.jpg)
24
LinksysSwitchWith
Built-InWirelessAccess Point
Using Two Antennas Reduces Multipath Interference (See Ch. 3)
Figure 5.8: Typical 802.11 Wireless LAN Operation with Access Points
![Page 25: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/25.jpg)
25
Figure 5.8: Typical 802.11 Wireless LAN Operation with Access Points
The Wireless Station sends an 802.11 frame to a server via the access point
The access point is a bridge that converts the 802.11 frame into an 802.3 Ethernet frame and sends the frame to the server
MobileStation
AccessPoint
EthernetSwitch
Server
802.11Frame
802.3Frame
![Page 26: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/26.jpg)
26
Figure 5.8: Typical 802.11 Wireless LAN Operation with Access Points
The server responds, sending an 802.3 frame to the access point
The access point converts the 802.3 frame into an 802.11 frame and sends the frame to the mobile station.
MobileStation
AccessPoint
EthernetSwitch
Server
802.11Frame
802.3Frame
![Page 27: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/27.jpg)
27
802.11 Wireless LAN Speeds
802.11 2 Mbps (rare)2.4 GHz band (limited in bandwidth)
802.11b 11 Mbps, 2.4 GHz3 channels/access point
802.11a 54 Mbps, 5 GHz (> bandwidth than 2.4 GHz)11 channels/access point
802.11g 54 Mbps, 2.4 GHzlimited bandwidth
![Page 28: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/28.jpg)
28
802.11 Broadcast Operation
The Wireless Stations and Access Points Broadcast their Signals. Only one access point or wireless station may
transmit at any moment or signals will become scrambled.
CollisionAbout toOccurAccess
Point
WirelessStation
WirelessStation
![Page 29: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/29.jpg)
29
Figure 5.9: CSMA/CA + ACK in 802.11 Wireless LANs
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) Station or access point sender listens for traffic
If there is no traffic, can send if there has been no traffic for a specified amount of time
If the specified amount of time has not been met, must wait for the specified amount of time. Can then send if the line is still clear
Correction
![Page 30: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/30.jpg)
30
Figure 5.9: CSMA/CA + ACK in 802.11 Wireless LANs
CSMA/CA (Carrier Sense Multiple Access with Collision Avoidance) Station or access point sender listens for traffic
If there is traffic, the sender must wait until traffic stops
The sender must then set a random timer and must wait while the timer is running
If there is no traffic when the station or access point finishes the wait, it may send
Correction
![Page 31: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/31.jpg)
31
Figure 5.9: CSMA/CA + ACK in 802.11 Wireless LANs
ACK (Acknowledgement) Receiver immediately sends back an
acknowledgement; no waiting because ACKs have highest priority
If sender does not receive the acknowledgement, retransmits using CSMA/CA
![Page 32: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/32.jpg)
32
Who Implements CSMA/CA+ACK?
Stations (when they send)
Access Points (when they send)
MobileStation
AccessPoint
802.11Frame
CSMA/CA+ACK
![Page 33: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/33.jpg)
33
Request to Send (RTS) / Clear to Send (CTS)
There is a widely used option we should cover.
After a station may send, its first message may be a Request-to-Send (RTS) message instead of a data message
Only if the other party sends a Clear-to-Send (CTS) message does the sender begin sending data
MobileStation
AccessPoint
RTS
CTS
New
![Page 34: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/34.jpg)
34
Ad Hoc 802.11 Networks
Ad Hoc Mode There is no access point. Stations broadcast to one another directly Not scalable but can be useful for SOHO use NICs automatically come up in ad hoc mode
Module C
![Page 35: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/35.jpg)
35
Wired Core / Wireless to the Desktop
Normal Networks: Core & Workgroup Switches
Core
WorkgroupEthernet Switch FWorkgroup
EthernetSwitch D
Core EthernetSwitch B
CoreEthernetSwitch A
Core EthernetSwitch CWorkgroup
SwitchesAttach toStationsBy UTP
Module C
![Page 36: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/36.jpg)
36
Wired Core / Wireless to the Desktop
With High-Speed Wireless LANs, Replace Workgroup Switches with Access Points
Core
AccessPoint 2
AccessPoint 1
Core EthernetSwitch B
CoreEthernetSwitch A
Core EthernetSwitch CAccess
PointsServe
Stations
Module C
![Page 37: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/37.jpg)
37
802.11 Security
Attackers can lurk outside your premises In “war driving,” drive around sniffing out unprotected
wireless LANs
In “drive by hacking,” eavesdrop on conversations or mount active attacks.
Site with 802.11 WLAN
OutsideAttacker
New
![Page 38: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/38.jpg)
38
802.11 Security
By default, security on 802.11 WLAN NICs and access points is turned off, making external attacks trivial
WLAN vendors offer Wired Equivalent Privacy (WEP), but this is weak and easily broken.
The 802.11 Working Group is working on a temporary replacement (TKIP) and longer-term security replacement, 802.11i
Even if corporate access points can be secured, many departments create unauthorized rogue access points that are seldom secured.
New
![Page 39: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/39.jpg)
39
Personal Area Networks (PANs)
Connect Devices On or Near a Single User’s Desk PC, Printer, PDA, Notebook Computer,
Cellphone
Connect Devices On or Near a Single User’s Body Notebook Computer, Printer, PDA,
Cellphone
The Goal is Cable Elimination
![Page 40: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/40.jpg)
40
Personal Area Networks (PANs)
There May be Multiple PANs in an Area May overlap
Also called piconets
![Page 41: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/41.jpg)
41
Figure 5.10: 802.11 versus Bluetooth LANs
Focus
Speed
802.11 Bluetooth
Large WLANs Personal Area Network
11 Mbps to 54 MbpsIn both directions
722 kbps with backchannel of 56 kbps.
May increase.
Distance100 meters for 802.11b(but shorter in reality)
Shorter of 802.11a
Numberof Devices
Limited in practice onlyby bandwidth and traffic
Only 10 piconets,each with
8 devices maximum
10 meters(may increase)
![Page 42: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/42.jpg)
42
Figure 5.10: 802.11 versus Bluetooth LANs
Scalability
Cost
Battery Drain
802.11 Bluetooth
Good through havingmultiple access points
Poor(but may get
access points)
Probably higher Probably Lower
Higher Lower
Discovery No Yes
Discovery allows devices to figure out how to work together automatically
![Page 43: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/43.jpg)
43
Figure 5.11: Bluetooth Operation
File Synchronization
Client PCSlave
NotebookMaster
Printer SlavePrinting
Cellphone
Telephone
Piconet 1
![Page 44: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/44.jpg)
44
Figure 5.11: Bluetooth Operation
Client PC
Notebook
Printer SlavePrinting
Call Through CompanyPhone System
CellphoneMaster
Telephone Slave
Piconet 2
![Page 45: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/45.jpg)
45
Figure 5.11: Bluetooth Operation
File Synchronization
Client PCSlave
NotebookMaster
Printer SlavePrinting
Call Through CompanyPhone System
CellphoneMaster
Telephone Slave
Piconet 1
Piconet 2
![Page 46: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/46.jpg)
46
Figure 5.12: Normal Radio Transmission and Spread Spectrum Transmission
Channel BandwidthRequired for a specificSignal speed
Normal Radio:Use only the requiredBandwidth to conserveThe frequency spectrum
Note: Height of Box Indicates Bandwidth of Channel
Shannon’s Law: W = B log2 (1/S/N)
Defines minimum bandwidth needed for a signal of a specific speed.
![Page 47: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/47.jpg)
47
Figure 5.12: Normal Radio Transmission and Spread Spectrum Transmission
Channel BandwidthRequired for Signal
Frequency HoppingSpread Spectrum (FHSS)
802.11
Direct SequenceSpread Spectrum (DSSS)
802.11b
Note: Height of Box Indicates Bandwidth of Channel
Wideband but Low-Intensity Signal
![Page 48: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/48.jpg)
48
Figure 5.13: Code Division Multiple Access (CDMA) Spread Spectrum Transmission
Client PC 1
Client PC 2
Low-Density Orthogonal Signal 1
Low-Density Orthogonal Signal 2
Server A
Server B
Radio Spectrum
Used in Some Cellular Telephone Systems
![Page 49: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/49.jpg)
49
OFDM
Orthogonal Frequency Division Multiplexing (OFDM) Divide a large channel into many subchannels Send part of the signal in each channel Stops using channels with impairment Used in 802.11a, 802.11g at 54 Mbps
Module B
Channel
Subchannel
ImpairedSubchannel(Not Used)
![Page 50: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/50.jpg)
50
Spread Spectrum Methods
Spread Spectrum Techniques
DSSS FHSS(Original802.11)
802.11bDSSS
CDMA(Cellular
Telephony)
OFDM(802.11a,802.11g)
![Page 51: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/51.jpg)
51
Ultrawideband (UWB)
EWB Uses Extremely Wide Channels
EWB channels are enormously wide—often cutting across several entire service bands
Extremely high speeds are possible
Can travel through thick walls
Because of concerns that EWB may it interfere with services in the service bands spanned, regulators require power to be kept extremely low
NewNot in Book
![Page 52: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/52.jpg)
52
ATM (Asynchronous Transfer Mode)
Ethernet competitor for switched LANs
Quality of Service (QoS) for telephony and multimedia transmissions
As scalable in speed as Ethernet
Highly complex and expensive to buy and manage
Not selling well for LANs
Increasingly popular for WANs
![Page 53: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/53.jpg)
53
Figure 5.15: Handling Brief Traffic Peaks
Traffic
Network Capacity
Momentary Traffic Peak:Congestion and Latency
Time
Congestion and Latency
![Page 54: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/54.jpg)
54
Figure 5.15: Handling Brief Traffic Peaks
Traffic
Network Capacity
Traffic Peak
Time
Quality of Service (QoS) Guarantees in ATM
Traffic with ReservedCapacity Always Goes(Voice)
Other Traffic Must Wait(Data)
![Page 55: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/55.jpg)
55
Figure 5.15: Handling Brief Traffic Peaks
Traffic
Overprovisioned Network CapacityTraffic Peak:No Congestion or Latency
Time
Overprovisioned Traffic Capacity in Ethernet
![Page 56: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/56.jpg)
56
Figure 5.15: Handling Brief Traffic Peaks
Traffic
Network Capacity
Peak Load
Time
Priority in Ethernet
High-Priority Traffic FirstLow-Priority Waits
![Page 57: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/57.jpg)
57
Figure 5.16: ATM Network with Virtual Circuits
Server
Client PC
ATM Switch 1 ATM Switch 2
ATMSwitch 3
ATM Switch 4
ATM Switch 5ATM switches can be arranged in amesh, so there are alternative paths. This makes switching slow and expensive.
![Page 58: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/58.jpg)
58
Figure 5.16: ATM Network with Virtual Circuits
Server
Client PC
ATM Switch 1 ATM Switch 2
ATMSwitch 3
ATM Switch 4
ATM Switch 5
VirtualCircuit
VirtualCircuit
ATM selects a single path, called aVirtual circuit, before two stationsBegin transmitting. This simplifiesSwitching and so lowers switching cost
![Page 59: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/59.jpg)
59
Figure 5.16: ATM Network with Virtual Circuits
Server
Client PC
ATM Switch 1 ATM Switch 2
ATMSwitch 3
ATM Switch 4
ATM Switch 5
VirtualCircuit
VirtualCircuit
Virtual CircuitA . . .B . . .C . . .D . . .
Port1234
Switch 4 Switching Table
ATM switching tables are as simple asEthernet switching tables
![Page 60: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/60.jpg)
60
ATM Reduces Switching Costs
Virtual circuits simplify switching, reducing switching costs
ATM (like Ethernet) is unreliable, also reducing switching costs by avoiding the expense of step-by-step error correction
Switches are the most expensive element in most networks, so minimizing switching cost usually is a major goal in network standards
![Page 61: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/61.jpg)
61
Figure 5.17: Virtual Circuit with VPI and VCI
Virtual Path is a Path to a SiteVirtual Channel is a Connection to a Particular Computer at the Site
Switches in Backbone Only Have to Look at the Virtual Path Indicator (VPI)
VirtualChannels Virtual Path
Site 1 Site 2
ATM Backbone
![Page 62: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/62.jpg)
62
Figure 5.17: ATM Cell
Bit 1 Bit 4Bit 3Bit 2 Bit 8Bit 7Bit 6Bit 5
Virtual Channel Identifier
Virtual Path Identifier Virtual Channel Identifier
Virtual Channel Identifier ReservedCall LossPriority
Payload Type
Header Error Check
Payload(48 Octets)
Virtual Path Identifier
VPI: Specifies a VC to siteVCI: Specifies a station at siteSwitches between sites only look at VPI
5 octets of header48 octets of payload53 octets total
![Page 63: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/63.jpg)
63
ATM Cells
ATM frames are short and fixed in length; called cells Only 53 octets long 5 octets of header 48 octets of data
Short length reduces latency at switches Switch may have to wait until entire frame arrives
before sending it back out—faster with short cells
Fixed length gives predictability for faster processing
![Page 64: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/64.jpg)
Token-Ring Networks
Legacy LAN Technologies
![Page 65: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/65.jpg)
65
Token-Ring Networks
Ring Topology
Inner Ring Outer Ring
Frame
NormalOperation
Dual Ring; normally only one is used
![Page 66: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/66.jpg)
66
Token-Ring Networks
Ring is wrapped if there is a break The wrapped ring is still a full ring
BreakWrapped Ring
![Page 67: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/67.jpg)
67
Token-Ring Networks
Special Frame Called Token Circulates when no station is transmitting For access control, station must have token to send
Inner Ring Outer Ring
Token
![Page 68: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/68.jpg)
68
Ring Network Technologies
802.5 Token-Ring Network
FDDI (Fiber Distributed Data Interchange)
SONET/SDH
16 Mbps 100 Mbps: 200 km circumference
54 Mbps to several Gbps
Small to Mid-size LANs
LAN Backbones Telephony
Lost out to cheaper and eventually faster Ethernet
Lost out to faster gigabit Ethernet
Growing rapidly in the telephone network core
![Page 69: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/69.jpg)
69
Figure 5.19: 802.5 Token-Ring Network
STP or UTP
STPOr Fiber
Wiring hubs are called multistation access units (MAUs).
Prefers to use shielded twisted pair (STP) wire for runs to stations and to link MAUs but will use UTP for stations and fiber for trunks.
STP has two twisted pairs. There is a metal mesh around each pair and around both pairs to reduce interference. STP is bulky and expensive.
MultistationAccess Unit
(MAU)
![Page 70: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/70.jpg)
70
Figure 5.18: Major Legacy Networks
Early Ethernet Standards General
Only 10 Mbps—shared by all stations
Before switches and hubs
Used coaxial cable (central wire surrounded by a conducting cylinder) You use this to connect your TV to your VCR
InnerWire
Outer Conductor Wrapped in Jacket
![Page 71: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/71.jpg)
71
Figure 5.18: Major Legacy Networks
Early Ethernet Standards 10Base5
Multidrop topologyThick trunk cable uses coaxial cable
technology; 500-meter limitDrop cable has 15 wiresNIC has 15-hole Attachment Unit Interface
(AUI) port
Trunk CableDrop Cable
15-HoleAUI Port
![Page 72: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/72.jpg)
72
Figure 5.18: Major Legacy Networks
Early Ethernet Standards 10Base2
Daisy chain topologyThin coaxial cable between stationsCircular BNC connector
BNCConnector
![Page 73: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/73.jpg)
73
Figure 5.18: Major Legacy Networks
Ethernet 10Base2
To NextStation
T-Connector to Link NIC to next segments
NIC
![Page 74: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/74.jpg)
74
Figure 5.18: Major Legacy Networks
RJ-45UTP
Connectors
BNC Connector10Base2T-Connector
UTP
ThinCoax
Ethernet 10Base2: UTP versus BNC Connectors
![Page 75: Other LAN Technologies Chapter 5 Copyright 2003 Prentice-Hall Panko’s Business Data Networks and Telecommunications, 4 th edition](https://reader035.vdocuments.us/reader035/viewer/2022070407/56649e265503460f94b15703/html5/thumbnails/75.jpg)
75
Figure 5.18: Major Legacy Networks
Ethernet 10Base2
BNC Connector
T-ConnectorTo NextStation