Escolar Documentos
Profissional Documentos
Cultura Documentos
Topics
What is a LAN ? MAC ? MAC Address ? The growing of LAN the problems of growing LAN
Physical distance Congestion Locality Scalability Repeater, Hub Bridge, Switch Router
LAN
LANs make it possible for businesses that use computer technology to locally share files and printers efficiently, and make internal communications possible. LANs consist of the following components: Computers. Network Interface Cards (NIC) Peripheral devices. Networking media Nework devices
Data Link
LAN contains a group of devices connected by a common, shared medium, or datalink. This medium can be twisted-pair wire, coaxial cable, optical fiber, infrared light, or whatever. All devices attach to the datalink through some network interface.( i.e: interface for twisted-pair wire is different from interface for coaxial cable).
4
a Local Area Network (LAN), this set of rules, or protocol, is generally called Media Access Control (MAC). MAC, as the name implies, dictates (ra lnh) how each machine will access and share a given medium.
5
The
A LAN has been defined as being a group of devices such as PCs, printers, and servers coexisting on a common communications medium and following a common protocol that regulates (quy nh) how they access on the medium. But there is one large requirement: As in any community (cng ng), each individual must be uniquely identifiable. For example, in a certain company in Viet Nam, there are two individuals (c nhn) named Nguyen, and it is very hard for a telephone receiver to forward when there is a phone call to Mr Nguyen.
Devices on a LAN must also be uniquely and individually identified. When data is delivered on a LAN , it is encapsulated within an entity called a frame. Think of data encapsulation as being the equivalent of placing a letter inside an envelope.
As in the figure, destination address and a return (source) address are written on the outside of the envelope. Without a destination address, the postal service would have no know where to deliver the letter.
8
DATA
Destination Address
Source Address
DATA
Likewise, when a frame is placed on a data link, all devices attached to the link "see" the frame; therefore, some mechanism must indicate which device should pick up the frame and read 9 the enclosed data.
Destination Address
Source Address
length
DATA
FDDI
Preamble SD FC Destination Address Source Address length DATA Frame Check ED FS Sequence
The three most common data links currently used in LANs are Ethernet, Token Ring, and FDDI (Fiber Distributed Data Interface). Although each link is drastically (trm trng) different from the others, they share a common format for addressing devices on the network. 10
Destination Address
Source Address
length
DATA
FDDI
Preamble SD FC Destination Address Source Address length DATA Frame Check ED FS Sequence
Figure above shows the format of most common LAN frames. Notice that every case includes a destination address and a source address. The format of the address depends on the particular MAC protocol, but all the addresses serve the same purpose: to uniquely identify the machine for which the frame is destined and 11 the device from which it was sent.
000000000000000000001100 000100101000101001111101
0000.0c12.8a7d
The MAC address is a 48-bit number, which, as Figure below shows, is designed so that every device anywhere on the planet should be uniquely identifiable. 12
000000000000000000001100 000100101000101001111101
0000.0c12.8a7d
It is now administered by the Institute of Electrical and Electronics Engineers (IEEE), is variously called the burned-in address, the physical address, the machine address, or most commonly, the MAC address.
13
000000000000000000001100 000100101000101001111101
0000.0c12.8a7d
MAC addresses have no structure, and are considered flat address. Example: 0000.0c12.3456 or 00-00-0c-12-34-56.
14
TheThe remaining six first six hexadecimal hexadecimal digits comprise digits, which are administered the NIC number or interface by the IEEE, identify the serial number. manufacturer or vendor.
15
Although the MAC addresses are referred by convention as "addresses," they are really names. Think about it: Because the identifier is burned in, or permanently assigned to a device, it is a part of that device and goes wherever the device goes. ( )
Mc d quy c MAC address nh addresses, n tht ra l ci tn m thi, b73i v n c ghi c nh vo thit b
17
Now we have a resource-sharing tool called LAN Its so wonderful, so everyone wants to be connected to it. But as a LAN grows, new problems present. The first is one of physical distance. The second problem associated with growing LANs is congestion The third problem is one of locality. The fourth problem is one of scalability.
18
There are three factors that may decrease or eliminate any intelligence the signal represents: ( Attenuation (S suy yu)
Interference : (noise).
19
The Repeater
As the distance the signal must travel down the wire increases, so do the degrading (lm gim gi tr) effects of these three factors. Repeaters are added to the wire at certain intervals to alleviate (gim bt) the difficulties associated with excessive distance. A repeater is placed on the media some distance from the signal source but still near enough to be able to correctly interpret the signal. (Repeater t vo phi gn c th hiu signal chnh xc)
Repeater
A repeater may be thought of as part of the physical medium. It has no real intelligence, but merely regenerates a signal. (Repeater c th c coi nh mi trng physical. N khng thng minh nhng ch n thun l to li Signal
20
The repeater can extend the network. But it has only 1 in and 1 out port. Because of that it is not flexible to attach more networks.
Repeater
21
To solve the problem, a hub is used to replace the repeater. A hub has the same function as a repeater but it has multi ports, so we can attach many to networks to extend LAN. A hub is also called a multi-port repeater.
22
The second problem with growing LAN is congestion. Repeaters and Hubs are added to extend the distance of the wire and to add devices. However, the fundamental reason for having LAN is to share resources. When too-large population (dn s) tries to share limited resource, the rules of behavior begin to be conflicts erupt.
23
On Ethernet networks, collisions deplete the available bandwidth. (Collision lm suy yu bng thng) In a LAN like below, when a host (a pc, or a server) sends a packet, every others on the LAN have to wait until the host finish then one of them can begin transmit and others continue to wait or a collision will occurs.
Collision
24
Drawing boundaries between populations of LAN devices is a solution to overcrowding. (V ranh gii gia nhng thit b LAN l 1 gii php n tnh trng
qu nhiu ngi ti mt ni )
25
Bridges and switches allow the distance of a LAN to extended, but only within a certain geographic limitation.
26
Bridges and switches allow the distance of a LAN to extended, but only within a certain geographic limitation. Extending a LAN across the city or across the continent.
Viet Nam
Thailand
27
Viet Nam
Thailand
28
Bridges and Switches allow a network to be divided into smaller populations of stations; in this way station-to-station traffic is localized.(khoanh vng)
29
Certain types of frames cannot be localized (khoanh vng), though. Some applications require data to be broadcast - that is, the data must be delivered to all stations on a network.
30
Bridges must forward a broadcast frame out all ports to ensure that all stations receive a copy.
31
As a bridged network becomes larger and larger, more and more stations will be originating broadcast traffic; soon, broadcasted frames cause the network to become congested again.
Company A
Company B
32
To manage broadcast traffic and other scaling challenges, another kind of boundary is necessary. This kind of networks is better known as an internetwork. The device that makes internetworks possible is a router.
Company A
Company B Company B
33
LAN Topology
So far, The information presented may be summary into a few brief statements: A data communication network (LAN) is a group of two or more devices connected by a common, shared medium. These devices have an agreed-upon set of rules, usually called the Media Access Control (MAC) , that govern how the media is shared. Each device has an identifier, and each identifier is unique to only one device. Using these identifiers, the devices communicate by encapsulating the data they need to send within a virtual envelope called a frame.
34
In networking terminology, the physical layout of a networks devices is the physical topology. The way in which data accesses media and transmits packets across it is the logical topology of a network. The logical topology you choose will influence the physical layout of the cable and vice-versa(ngc li). The decisions you make will be difficult to change later on. So you need to consider both the physical and logical implications (s dnh lu) before you make any decisions about the type of network to install. The physical and logical topologies depend on the way the cabling is installed, the network connection devices used, and the protocols used to transmit data.
35
For example, a physical star topology usually uses a logical bus topology. A physical ring topology uses a logical ring topology.
36
37
A bus topology uses a single backbone cable that is terminated at both ends by a terminator. All the hosts connect directly to this backbone. Networks that have a bus topology usually use thin coaxial cable that connects to the NIC using a BNC connector. As you can see above, this connector can be used to connect two or more computers together in a daisy-chain (chui cnh hoa) 38 fashion.
The Institute of Electrical and Electronics Engineers (IEEE) 802.3 standard has set the length of a cable segment and the number of device on an Ethernet bus network For a Thinnet network, also referred to as 10BASE2 and Thin Ethernet, the maximum segment length is about 200 meters (185m) connecting a maximum of 30 devices. Another kind of Bus Ethernet is Thicknet, which is also known as Thick Ethernet and 10BASE5. Thicknet uses a thicker-gauge coaxial cable than Thinnet. The cable segment limitation is 500 39 meters with a maximum of 100 nodes.
A ring topology is connected in the form of a ring or circle. It has no beginning or end that needs to be terminated. This allows every device to have an equal advantage accessing 40 the media.
When the first ring networks were installed, they used a singlering topology. In a single-ring network, a single cable is shared by all the devices, and the data travels in one direction. Each device waits its turn and transmits. When the data reaches41 its destination, another device can transmit.
As technology evolved, a dual-ring topology was developed. This topology allows two rings to send data, each in a different direction. Not only does this let more packets travel over the network; it also creates redundancy.
42
FDDI
Fiber Distributed Data Interface (FDDI) is a technology similar to Token Ring.(FDDI l mt cng ngh ging nh Token Ring nhng n dng light) But it uses light instead of electricity to transmit data. FDDI networks use two rings for redundancy.
43
A star topology connects all cables to a central point of concentration. This central point can be a hub or a switch. Each device in a star network is connected to the central hub with its suitable cable. (Mi thit b trong mng Star ni vi Hub trung tm vi cable thch hp)
44
An extended star topology links individual stars together by connecting the hubs and/or switches. This topology can extend 45 the scope of the network.
In Mesh topology, each host has its own connections to all other hosts. This allows all the devices to continue to communicate if one 46 connection goes down.
Now that youve learned all of the options for physically connecting the media and devices in your LAN, You need to understand the different ways in which the devices in a LAN communicate and transmit data. These are the logical topologies. There are only two types: Logical Bus and Logical Ring
47
When a network is physically cabled in a bus, it is easy to understand that it is sending data in a logical bus throughout the network. That is the data moves from device to other device in a linear fashion. 48
When a network uses a physical star topology, media can be accessed and data sent in either a logical bus or a logical ring. It is what happens inside that hub will defines the logical topology. And that will depend on the network connection devices used, such as a NIC and a hub or MAU(Multistation Access Unit), and 50 the layer 2 protocol implemented.
Ethernet Hub
An Ethernet hub uses a logical bus topology inside to transmit data to all the segments of its star. The advantages of a logical bus topology are
If a node is down, it does not bring down the entire network. Its the most widely implemented of the logical topologies. Additions and changes can be made easily without affecting other workstations Collisions can occur easily. Only one device may access the media at a time
MAU
It is also possible for a network with a physical star topology to transmit data in a logical ring. A device called a MAU ( short for Multistation Access Unit) is the central device in this type of Token Ring network. The MAU may look just like a regular hub. But the way it works is 52 different from Ethernet Hub.
Inside the MAU, the data is passed from device to device using a logical ring.
The advantage of a logical ring topology are: The amount of data that can be carried in one message is much greater than on a logical bus. A broken ring will stop all transmissions. A device must wait for an empty token to be able to transmit.
53
Router
Y 4.3 X A 1.1 Network 1
FDDI
Network 2
Network 3
Token Ring
Network 4
Just as a data link may directly connect two devices, a router also creates a connection between two devices. The difference is that, as Figure above shows, whereas the communication path between two devices sharing a common data link is a physical path, the communication path provided by routers between two devices on different networks is a higher54 level, logical path.
Router (packet)
Y 4.3 X A 1.1 Network 1
FDDI Network 2
Network 3
Token Ring
Network 4
Notice that the logical path, or route, between the devices in Figure above traverses several types of data links: an Ethernet, an FDDI ring, a serial link, and a Token Ring. As noted earlier, to be delivered on the physical path of a data link, data must be encapsulated within a frame, as a sort of digital envelope. (Data phi c encapulate trong 1 frame)
55
Router (packet)
Y 4.3 X A 1.1 Network 1 FDDI Network 2
Token Ring
Network 3
Network 4
Likewise, to be delivered across the logical path of a routed internetwork, data must also be encapsulated; the digital envelope used by routers is a packet.
56
Router (packet)
(2) FDDI (1) Ethernet Data from X to Y Token Ring (3) Data from X to Y (4)
Data from X to Y
Serial
Data from X to Y
Y 4.3
X A
FDDI Network 2
1.1 Network 1
Network 3
Token Ring
Network 4
As noted earlier, each type of data link has its own unique frame format. So the frame changes from data link to data link The internetwork route depicted in Figure above crosses several data links, but the packet remains the same from end to end.
(internetwork route m t trong hnh trn i qua vi data link, nhng packet vn gi nguyn t end to end)
57
Router (packet)
(2) FDDI (1) Ethernet Data from X to Y Serial Data from X to Y Token Ring (3) Data from X to Y Y Data from X to Y (4)
4.3
X FDDI
Token Ring
A
1.1 Network 1
Network 2
Network 3
Network 4
1)
The originating host encapsulates the data to be delivered within a packet. The packet must then be delivered across the host's data link to the local routerthat host's default gatewayso then host encapsulates the packet within a frame.
58
Router (packet)
(2) FDDI (1) Ethernet Data from X to Y Serial Data from X to Y Token Ring (3) Data from X to Y Y Data from X to Y (4)
4.3
X FDDI
Token Ring
A
1.1 Network 1
Network 2
Network 3
Network 4
This operation is the same as placing an envelope inside of a larger envelope, for example, inserting an envelope containing a letter into a Federal Express envelope. The destination data link identifier of the frame is the identifier of the interface of the local router, and the source data link identifier 59 is the host's.
Router (packet)
(2) FDDI (1) Ethernet Data from X to Y Serial
Data from X to Y
Data from X to Y
(4)
Data from X to Y
Y 4.3
X
A 1.1 Network 1
FDDI Network 2
Network 3
Token Ring
Network 4
2)
That router (router A in Figure below) removes the packet from the Ethernet frame; router A knows that the next-hop router on the path is router B, out its FDDI interface, so router A encapsulates the packet in an FDDI frame. Now the destination identifier in the frame is the FDDI interface of router B, and the source identifier is the FDDI interface of 60 router A.
Router (packet)
(2) FDDI
(1) Ethernet Data from X to Y Serial Data from X to Y Token Ring (3) Data from X to Y Y 4.3 X FDDI Network 2
Token Ring
A
1.1 Network 1
Network 3
Network 4
3)
Router B removes the packet from the FDDI frame, knows that the next-hop router on the path is router C across the serial link. Router B then sends the packet to C encapsulated in the 61 proper frame for the serial link.
Router (packet)
(2) FDDI (1) Ethernet Data from X to Y Serial Data from X to Y Token Ring (3) Data from X to Y Y Data from X to Y (4)
4.3
X A 1.1 Network 1 FDDI
Token Ring
Network 2
Network 3
Network 4
4)
Router C removes the packet and recognizes that the station for which the packet is destined is on its directly connected Token Ring network. Router C encapsulates the packet in a Token Ring frame with the destination identifier of the destination station and the 62 source identifier of its Token Ring interface.
Router (packet)
(2) FDDI (1) Ethernet Data from X to Y Serial Data from X to Y Token Ring (3) Data from X to Y Y Data from X to Y (4)
4.3
X A 1.1 Network 1 FDDI
Token Ring
Network 2
Network 3
Network 4
Router (packet)
(2) FDDI Data from X to Y Token Ring Data from X to Y (4)
(1)
Ethernet Data from X to Y Serial
(3)
Data from X to Y Y 4.3
X A 1.1 Network 1
FDDI
Network 2
Network 3
Token Ring
Network 4
When station Y receive the packet, there are two questions: How does station Y knows that packet is from station X. How does router A know that station Y is on network 64 attached to FDDI interface (the same with router B).
172.16.1.1 X
11.1.1.1
11.1.1.2
FDDI Network 2
Network 4
For devices to correctly communicate on a LAN, they must be uniquely identified by means of a data link identifier. If a routed internetworka network of networksis to be created, then each member network must likewise be uniquely identifiable. And that network identifier is network address (IP address) 65
172.16.1.1 X
11.1.1.1
11.1.1.2
FDDI Network 2
Network 4
Ethernet
152.1.4.3 172.16.1.1
Data
Now that the two questions can be answered: The router A and B can route packet to the destination because station X has put the network address (IP address) of station Y to the packet. Station Y know the packet is from station X because it read the source network address (station Xs IP address) in the packet. 66
ARP
Network devices in the same local network communicate using MAC addresses. So there is a question: Why network devices in the same local network still using IP address to communicate ? The answer is that the applications such as ping, telnet, http, ftp are designed for IP address. So in the same local network, network devices still have to use IP address to communicate. That is why there is a mechanism to map IP address to MAC address. It is called ARP.
67
ARP
PC A 192.168.1.1 PC B 192.168.1.2 MAC B
MAC A
PC C
192.168.1.3 MAC C
For example, on PC A we enter the command ping 192.168.1.2. ARP running on PC A will find MAC address of PC that has IP address of 192.168.1.2 to communicate. ARP will create a ARP request message and broadcast to the data link. PC B after receive the message will create a ARP reply message in response to the ARP request message. ARP reply message then is sent to PC A using unicast.
68
ARP
ARP Request
192.168.1.1 MAC A 192.168.1.2 FF-FF-FF-FF-FF-FF
ARP Reply
192.168.1.2 MAC B 192.168.1.1 MAC A
PC A
192.168.1.1
MAC A
ARP
When PC A receives ARP reply message from PC B, it will using that MAC address to send data to PC B.
PC A 192.168.1.1
ARP request reply data ARP ARP request data ARP reply
PC B 192.168.1.2 MAC B
MAC A
ARP request
PC C
192.168.1.3 MAC C
70
71