1 / 34

Understanding LAN Technologies: Basics and Implementations

Explore LAN components, IEEE standards, Ethernet technologies, and their implementations. Learn about LAN use in organizations and different network topologies. Dive into Ethernet addressing, signaling, and frame formats. Technical insights on collision detection and Token Ring networks.

aleidae
Download Presentation

Understanding LAN Technologies: Basics and Implementations

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Chapter 9 Local Area Networks Part I: Basic Concepts and Wired Ethernet LANs

  2. OBJECTIVES List the components of a LAN. Be familiar with the IEEE standards. Be familiar with traditional Ethernet technology and its implementations. Be familiar with Gigabit Ethernet technology and its implementations. Be familiar with Fast Ethernet technology and its implementations. Understand the use of LANs in an organization. After reading this chapter, the reader should be able to:

  3. 9.1 BASIC CONCEPTS

  4. Figure 9-1 A client-server model with dedicated servers

  5. Figure 9-2 A client-server model with a general server

  6. Figure 9-3 Peer-to-peer model

  7. Figure 9-4 Physical bus topology

  8. Figure 9-5 Physical star topology

  9. Note: The star topology is the dominant physical topology today.

  10. Figure 9-6 Logical bus topology

  11. Note: In 1985, the Computer Society of the IEEE developed Project 802. It covers the first two layers of the Internet model.

  12. Figure 9-7 Logical star topology

  13. Technical Focus:Ring Topology Another physical topology common at the beginning of the LAN era was the ring topology. In a ring topology, each station is connected to the next station as shown in the following figure:

  14. Note: Project 802 has split the data link layer into two different sublayers: logical link control (LLC) and media access control (MAC).

  15. Figure 9-8 LAN compared with the Internet model

  16. 9.2 WIRED ETHERNET LANs

  17. Figure 9-9 Collision in CSMA/CD

  18. Technical Focus:Ethernet Addressing Each station on an Ethernet network (such as a PC, workstation, or printer) has its own network interface card (NIC). The NIC usually fits inside the station and provides the station with a 6-byte (48-bit) physical address.

  19. Technical Focus:Signaling Traditional Ethernet uses Manchester digital encoding (discussed in Chapter 6). In this type of signaling, the transition at the middle of each bit is used for synchronization between the sender and receiver.

  20. Figure 9-10 Implementations of Ethernet

  21. Figure 9-11:a Ethernet connection to the medium

  22. Figure 9-11:b Ethernet connection to the medium

  23. Figure 9-11:c Ethernet connection to the medium

  24. Figure 9-11:d Ethernet connection to the medium

  25. Technical Focus:Ethernet Frame Traditional Ethernet has a frame with the following format:

  26. Figure 9-12 Switched Ethernet

  27. Figure 9-13 Fast Ethernet implementations

  28. Figure 9-14:a Fast Ethernet connection to the medium

  29. Figure 9-14:b Fast Ethernet connection to the medium

  30. Figure 9-14:c Fast Ethernet connection to the medium

  31. Figure 9-15 Gigabit Ethernet implementations

  32. Figure 9-16:a Gigabit Ethernet connection to the medium

  33. Figure 9-16:b Gigabit Ethernet connection to the medium

  34. Technical Focus:Token Ring Networks At the beginning of the LAN era, a LAN technology called Token Ring was developed that uses a token passing method. Whenever the network is unoccupied, a token circulates freely from one station to another. When a station has data to send, it captures the token and sends its frame.

More Related