SlideShare a Scribd company logo
1 of 45
Download to read offline
Copyright revised for Zafar Ayub
    Data Communication and Network




                                                (zafar_ayub@hotmail.com)
                        Chapter - 2
                    Compile by Zafar Ayub



1
Network Protocol
    A protocol is a set of rules that governs the communications
    between computers on a network. In order for two computers to
    talk to each other, they must be speaking the same language.
    These rules include guidelines that regulate the following
    characteristics of a network; access method, allowed physical
    topologies, types of cabling, and speed of data transfer.
    Many different types of network protocols and standards are
    required to ensure that your computer (no matter which operating
    system, network card, or application you are using) can
    communicate with another computer located on the next desk or
    half-way around the world.




2                               Copyright revised for Zafar Ayub
                                    (zafar_ayub@hotmail.com)
Types of Network Protocols
¢       Network protocols also known as Network Technologies, the most
        common network protocols are;
          ¢ Ethernet (LAN protocol; architecture developed by Xerox,
            DEC, and Intel in 1976)
          ¢ Local Talk ( network protocol that was developed by Apple
            Computer, Inc. for Macintosh computers)
          ¢ Token Ring ( patented by IBM in 1981, is a network protocol
            that employs token-passing between computers arranged in a
            logical                     ring                  network)

         ¢   FDDI (set of ANSI and ISO standards for data transmission on
             fiber optic lines in a local area network (LAN) that can extend
             in range up to 200 km (124 miles).
         ¢   ATM (ATM is a high-speed networking standard designed to
             support both voice and data communications. ATM is normally
             utilized by Internet service providers on their private long-
             distance networks)
    3                                 Copyright revised for Zafar Ayub
                                          (zafar_ayub@hotmail.com)
Ethernet Protocol
¢       The Ethernet protocol is by far the most widely used. Ethernet uses
        an access method called CSMA/CD (Carrier Sense Multiple
        Access/Collision Detection).
¢       This is a system where each computer listens to the cable before
        sending anything through the network. If the network is clear, the
        computer will transmit.
¢       If some other node is already transmitting on the cable, the
        computer will wait and try again when the line is clear.
¢       Sometimes, two computers attempt to transmit at the same instant.
        When this happens a collision occurs. Each computer then backs off
        and waits a random amount of time before attempting to
        retransmit.
¢       With this access method, it is normal to have collisions. However,
        the delay caused by collisions and retransmitting is very small and
        does not normally effect the speed of transmission on the network.
        ring                                                      network)

    4                                Copyright revised for Zafar Ayub
                                         (zafar_ayub@hotmail.com)
Types of Ethernet
¢       10 Base 5
         Coaxial cable (10Base5)
         Thicknet. (Bus Topology)
¢       10 Base 2
         Thin coax cable (10Base2)
         Thinnet. (Bus Topology)
¢       10 Base T
         Twisted pair Ethernet (10BaseT)
          Star Topology on HUBs
¢       100 Base T (Fast Ethernet)
         100BASE-TX: two pairs of high-quality twisted-pair wires
         100BASE-T4: four pairs of normal-quality twisted-pair wires
         100BASE-FX: fiber optic cables
         100 Mbps speed on Star Topologies on HUBs (Twisted pair CAT-6
            cable)
    5                               Copyright revised for Zafar Ayub
                                        (zafar_ayub@hotmail.com)
¢       Giga Base T / 1000 Base X
         High speed Ethernet on layer 3 switches with twisted pair
        and fiber cable
               Name                         Medium                                 Specified distance
        1000BASE-CX     Twinaxial cabling                                25 meters
        1000BASE-SX     Multi-mode fiber                                 220 to 550 meters dependent on fiber
                                                                         diameter and bandwidth

        1000BASE-LX     Multi-mode fiber                                 550 meters
        1000BASE-LX     Single-mode fiber                                5 km
        1000BASE-LX10   Single-mode fiber using 1,310 nm wavelength      10 km


        1000BASE-ZX     Single-mode fiber at 1,550 nm wavelength         ~ 70 km


        1000BASE-BX10   Single-mode fiber, over single-strand fiber:     10 km
                        1,490 nm downstream 1,310 nm upstream

        1000BASE-T      Twisted-pair cabling (Cat-5, Cat-5e, Cat-6, or   100 meters
                        Cat-7)

        1000BASE-TX     Twisted-pair cabling (Cat-6, Cat-7)              100 meters

    6                                       Copyright revised for Zafar Ayub
                                                (zafar_ayub@hotmail.com)
¢       10G Base Ethernet
         For core network backbone and submarine cables

              Name                             Medium                             Specified distance

        10GBASE-SR       Multi-mode fiber                               100 meters

        10GBASE-LR       Single-mode fiber                              10 km



        10GBASE-LRM      Multi-mode fiber                               300 meters

        10GBASE-ER       Single-mode fiber                              40 Km

        10GBASE-ZR       Single – mode fiber                            80 km



        10GBASE-LX4      Single-mode fiber at 1,550 nm wavelength       10 km



        10GBASE-T        Twisted pair                                   100 m




    7                                          Copyright revised for Zafar Ayub
                                                   (zafar_ayub@hotmail.com)
Standard of Ethernet
¢       10 Base T
          10 Mbps (Half Duplex)
          IEEE 802.3 at Data Link Layer / Layer 2
¢       100 Base T (Fast Ethernet)
          100 Mbps (Half Duplex / Full Duplex)
         IEEE 802.3u at Data Link Layer / Layer 2
¢       Giga Ethernet
          1000 Mbps (Full Duplex )
          IEEE 802.3z at Data Link Layer / Layer 2
¢       10 Giga Ethernet
          10000 Mbps (Full Duplex)
          IEEE 802.3ae at Data Link Layer / Layer 2


    8                                 Copyright revised for Zafar Ayub
                                          (zafar_ayub@hotmail.com)
CSMA / CD
¢       Carrier Sense: wait till medium is idle before sending frame.

¢       Multiple Access: multiple computers use the same shared media.
        Each uses same access algorithm.

¢       Collision Detection: Listen to medium – detect if another station’s
        signal interferes – back off and try again later.




    9                                  Copyright revised for Zafar Ayub
                                           (zafar_ayub@hotmail.com)
CSMA / CD - Transmitting




10              Copyright revised for Zafar Ayub
                    (zafar_ayub@hotmail.com)
¢    When Ethernet network determine transmission of data, data
     broken into packet, and packed into frames.
¢    Maintain queued for transmission, usually this process occur on
     NIC.
¢    Before transmission, transceiver listen on medium is used or not, if
     free then start transmission, other wise wait for an algorithm.
¢    The listing process through out whole cable transceivers.
¢    It is possible that two or more of them sense simultaneously, and
     began transmitting, cable medium is shared medium; so possibly two
     or more transmission frames collapse with each other.
¢    Collapse known as collision.
¢    When transmission began, sender station continuously monitor the
     medium, and when collision is occur, then transmit “Jam Signal”.
¢    At this stage all station which are involved in this collision, began
     “evasive action”, is an algorithm for waiting of random period of
     time.

    11                             Copyright revised for Zafar Ayub
                                       (zafar_ayub@hotmail.com)
¢    If collision occurs: wait a random time t1 - 0< t1<d.
     D depends on transmission speed – time for frame width or 512
     bits.
¢    If second collision occurs, wait a random time t2 - 0< t2<2d.
     Double range for each successive collision.
¢    If collision occur its maximum value, transmission aboard.
¢    And if no collision, then again listen cable that is busy or not.




    12                           Copyright revised for Zafar Ayub
                                     (zafar_ayub@hotmail.com)
CSMA / CD - Receiving




13              Copyright revised for Zafar Ayub
                    (zafar_ayub@hotmail.com)
¢    Each station on the medium, listen incoming frames and check for
     fragments; fragments are partial frame (faulty or collision occur
     frames).
¢    In first step, check frame size, valid Ethernet frame has
     approximately size is 64 bytes.
¢    If frame is shooter, then assumed that collision may occur, then not
     further process, and try again.
¢    In second step, station also check MAC address of destination
     frame, if this address is not match, then start receiving again.
¢     And if address match, then check series of various elements, like
     receiving frame not too long, conditionally length is 1518 bytes, if
     exceed assumed that frame is faulty, and transmission terminate due
     to over size of frame.
¢    If over size test is clear, then check CRC formula, and comparing
     result value with receiving frame value.
¢    if comprising value checked then, and result is match then
     disassemble frame, and successful receiving.


    14                             Copyright revised for Zafar Ayub
                                       (zafar_ayub@hotmail.com)
¢    If length field is not match, then aboard receiving.
¢    And CRC not match, then check extra bit (check sum), if no extra
     bit then end of receiving due to CRC error.
¢    And If add extra value in CRC, then again aboard receiving due to
     alignment error.




    15                           Copyright revised for Zafar Ayub
                                     (zafar_ayub@hotmail.com)
Token Ring Protocol
¢  Initially used only in IBM computers in 1981, it was eventually
   standardized with protocol IEEE 802.5.
¢ Token ring technology is a local area network protocol which
    resides at the data link layer (DLL 2 layer) of the OSI model.
o It uses a special three-byte frame called a token that travels around
    the ring.
o Active monitor grants the possessor permission to transmit on the
medium.
o Token ring frames travel completely around the loop.
o Like Ethernet any computer start transmitting at every time; not
possible, either wait for special frame “token”, and when it get on
wire and if is token is empty then copy their data on it, and passing
through forward.
o This token traveling method is clockwise and called as token passing
method.


    16                           Copyright revised for Zafar Ayub
                                     (zafar_ayub@hotmail.com)
Token Ring Topology
¢    Ring topology is used for token ring protocol; but actually physically
     star topology and logically ring topology are used.




    17                              Copyright revised for Zafar Ayub
                                        (zafar_ayub@hotmail.com)
¢    In token ring protocol, ring topology used MSAU as central device,
     CAT-3 (4Mbps to16Mbps), and IBM token ring adapter.
¢    MSAU (Multi Station Access Unit) just like Ethernet hub, but every
     computer linked with two UTP / STP cables, one for received and
     second for transmit.
¢    These short cable which are attached with computer to MSAU, is
     called Lobe.
¢    There are two types of computers on token ring topology, only one
     at ring is active monitor, and all other reaming are standby monitor.
¢    Active monitor responsible for generating token and passing
     through on network in clock wise.
¢    Standby monitors just like clients which are directly connected on
     ring , waiting for token for data transmission at its own parity.
¢    Active monitor selection is done by automatically by an election
     method, and if within 10 millisecond, active monitor is out of
     response, automatically election generated and new computer
     active monitor.


    18                             Copyright revised for Zafar Ayub
                                       (zafar_ayub@hotmail.com)
Token Passing
¢    The first computer set its NIC default value.
¢    In second perform lobe test, transmit and receive cables initially
     connected with MSAU, in this test computer send single on their
     transmit cable and listening back same signal at its receiving cable.
¢     If successful communication occur then other process shall be
     start, other wise computer goes to fail for ring attachment; this test
     called loopback test.
¢    In next stage computer place current (phantom current) on cable
     ring, which cause this lobe is active on MSAU, otherwise MSAU
     assume this computer is going switch off.
¢    After this network adapter now checks to insure that its MAC
     address is unique on network; for this its send special signal
     (destination its own MAN address) if no computer set an indicator
     flag on this frame, then its assume its address is unique, otherwise
     remove from network until anyone reconfigure its MAC address.
¢    Within seven second, a ring poll occur, by this every computer get
     know its upstream neighbor address.
    19                              Copyright revised for Zafar Ayub
                                        (zafar_ayub@hotmail.com)
¢    Ring poll: ring polling occur every seven second, by this process
     every computer aware of its next upstream neighbor MAC address.
     All of this value also be save at active, and in every seven second
     every computer listen that active monitor is present or not other
     wise again election shall be occur.
¢    By clearing all test computer become full flag member of ring.
¢    Lets start a ring which have five computer A to E, where A is a
     active monitor.
¢    Computer A is automatically elected by an election, now B
     required to send data to E, then when token is pass through at B
     computer, its check if token is empty then he copy their data into
     empty token.
¢    Token is now moving forward C; again C check that this token is
     for its or not, forward it, token forward to D; again this process
     happened, and when this token at E, this computer NIC check that
     destination MAC is match, if yes then copy all data and copied
     flagged is down means off.
    20                            Copyright revised for Zafar Ayub
                                      (zafar_ayub@hotmail.com)
¢    Again token forwarding back to A, after reaching A computer check
     if copy flag is down or off then again up this flag and assume that
     data has been copied other wise again transmit in ring.
¢    When this happen means data has been copied, A also up all
     reaming flags; like token is empty, data copy, and if any error then
     remove from frame.
¢    Then A again transmit this token on ring, when its pass through by
     B, computer B check and if token empty flag is up then computer B
     able to copy their data on this token, and computer B copy their
     data on exiting pervious computer A data.
¢    Token priority / flag: There are 8 priority / flags on token ring
     transmission; from 0-7, every flag represent any one operation like
     token is empty, data has been copied or error, etc.




    21                             Copyright revised for Zafar Ayub
                                       (zafar_ayub@hotmail.com)
Active Monitor: Every station in a token ring network is either an
active monitor (AM) or standby monitor (SM) station. However, there
can be only one active monitor on a ring at a time. The active monitor
is chosen through an election or monitor contention process.
The monitor contention process is initiated when
     •a loss of signal on the ring is detected.
     •an active monitor station is not detected by other stations on
     the ring.
     •a particular timer on an end station expires such as the case
     when a station hasn't seen a token frame in the past 7 seconds.
When any of the above conditions take place and a station decides
that a new monitor is needed, it will transmit a "claim token" frame,
announcing that it wants to become the new monitor. If that token
returns back to the sender, it is OK for it to become the monitor. If
some other station tries to become the monitor at the same time
then the station with the highest MAC address will win the election
process. Every other station becomes a standby monitor. All stations
must be capable of becoming an active monitor station if necessary.
 22                             Copyright revised for Zafar Ayub
                                    (zafar_ayub@hotmail.com)
The active monitor performs a number of ring
administration functions.
   •The first function is to operate as the master clock
   for the ring in order to provide synchronization of the
   signal for stations on the wire.
   •Another function of the AM is to insert a 24-bit delay
   into the ring, to ensure that there is always sufficient
   buffering in the ring for the token to circulate.
   •A third function for the AM is to ensure that exactly
   one token circulates whenever there is no frame being
   transmitted, and to detect a broken ring.
   •Lastly, the AM is responsible for removing circulating
   frames from the ring.

 23                        Copyright revised for Zafar Ayub
                               (zafar_ayub@hotmail.com)
24   Copyright revised for Zafar Ayub
         (zafar_ayub@hotmail.com)
FDDI Protocol
¢    Fiber Distributed Data Interface (FDDI) provides a 100 Mbps
     optical standard for data transmission in a local area network that
     can extend in range up to 200 kilometers (120 mi).
¢    Although FDDI logical topology is a ring-based token network, it
     does not use the IEEE 802.5 token ring protocol as its basis; instead,
     its protocol is derived from the IEEE 802.4 token bus timed token
     protocol.
¢    In addition to covering large geographical areas, FDDI local area
     networks can support thousands of users. As a standard underlying
     medium it uses optical fiber, although it can use copper cable, in
     which case it may be referred to as CDDI (Copper Distributed
     Data Interface). FDDI offers both a Dual-Attached Station (DAS),
     counter-rotating token ring topology and a Single-Attached Station
     (SAS), token bus passing ring topology



    25                              Copyright revised for Zafar Ayub
                                        (zafar_ayub@hotmail.com)
Network Topologies
 A Network Topology is the layout pattern of interconnections of the
 various elements (links, cables, devices, etc) of a computer system.
 In network arrangement of computers or flow of network traffic,
 known as Network Topology.
 Means arrangement of device on network with structural (physical)
 or virtual (logical) is Network Topology.




26                             Copyright revised for Zafar Ayub
                                   (zafar_ayub@hotmail.com)
Types of Network Topologies
¢    Network topologies may be physical or logical with respect to their
     functionality.
¢    Physical topology refers to the physical design of a network
     including the devices, location and cable installation.
     The shape of the cabling layout used to link devices is called the
     physical topology of the network.This refers to
            the layout of cabling
             the locations of nodes
             the interconnections between the nodes and the cabling
     The physical topology of a network is determined by;
            the capabilities of the network access devices and media
            the level of control
            fault tolerance desired
            the cost associated with cabling or telecommunications
     circuits.

    27                            Copyright revised for Zafar Ayub
                                      (zafar_ayub@hotmail.com)
¢    Logical topology refers to how data is actually transferred in a
     network as opposed to its physical design.
     The logical topology is define;
             is the way that the signals act on the network media
             the way that the data passes through the network from one
     device to the next without regard to the physical interconnection of
     the devices.
     A network's logical topology is not necessarily the same as its
     physical topology. For example;
             the original UTP Ethernet using hubs / switches, but logically
     connected bus topology layout.
            Token Ring is a logical ring topology, but is wired a physical
     star from the MSAU (Media Station Access Unit).
¢    In general physical topology relates to a core network whereas
     logical topology relates to basic network.


    28                              Copyright revised for Zafar Ayub
                                        (zafar_ayub@hotmail.com)
BUS Topology
¢  A bus network topology is a network architecture in which a set of
   clients are connected via a shared communications line / medium,
   called a BUS topology.
¢ The bus topology is often referred to as a linear bus because the
   computers are connected in a straight line. This is the simplest and
   most common method of networking computers.
Advantages :
  Easy to connect a computer or peripheral to a linear bus.
  Easy to implement and extend
  Well suited for temporary networks (quick setup)
  Typically the cheapest topology to implement
  Faster than a ring network.
  If any node on the bus network fails, the bus its self is not effected.
  Requires less cable length than a star topology.



    29                           Copyright revised for Zafar Ayub
                                     (zafar_ayub@hotmail.com)
Disadvantages :
  Difficult to administer/troubleshoot
  Limited cable length and number of stations
  A cable break can disable the entire network
  Maintenance costs may be higher in the long run
  Performance degrades as additional computers are added or on
heavy traffic
  Low security (all computers on the bus can see all data
transmissions)
  One virus in the network will affect all of them (but not as badly as a
star or ring network)
  Proper termination is required.(loop must be in closed path)
  Significant Capacitive Load (each bus transaction must be able to
stretch to most distant link).



 30                              Copyright revised for Zafar Ayub
                                     (zafar_ayub@hotmail.com)
How it’s work?
¢    A Bus networks are the simplest way to connect multiple clients,
     but may have problems when two clients want to transmit at the
     same time on the same bus.
¢    The Ethernet is common protocol for bus topology.
¢    Thus systems which use bus network architectures normally have
     some scheme of collision handling or collision avoidance for
     communication on the bus, quite often using CSMA / CD(Carrier
     Sense Multiple Access / Collision Detection).
¢    In Bus topology computers are connected with each other via cable,
     called coax cable (thick net / thin net) with their NIC.
¢    NIC connect with cable via passive device called BNC -T(British
     Naval Connector) / Transverse (DB-15) and at last of both cables
     ends T-Connector or open loop must be closed.
¢    Bus topology has two basic types 10Base-2 and 10Base-5.


    31                            Copyright revised for Zafar Ayub
                                      (zafar_ayub@hotmail.com)
10Base-2
¢    In 10Base-2 coax cable used Thinnet cable (RG-58) 50 ohm.
¢    It is capable of covering up to 590 feet (180 meters) and is not
     highly susceptible to noise interference.
¢    It transmits at 10Mbps megabits per second and can support up to
     30 nodes per segment.
¢    This is a type of coax cable you can use for networks it’s a thinner
     cable, like the one you find on your cable television.




    32                             Copyright revised for Zafar Ayub
                                       (zafar_ayub@hotmail.com)
¢    Thinnet cabling components include;
      ¢ BNC barrel connectors




         ¢   BNC T connectors




         ¢   BNC terminator



    33                             Copyright revised for Zafar Ayub
                                       (zafar_ayub@hotmail.com)
¢    10Base-2 specification;

                       Category                                              Notes

     Maximum segment length                          185 meters (607 feet)

     Connection to network interface card            BNC T connector

     Trunk segments and repeaters                    Five segments can be joined using four repeaters



     Computers per segment                           30 computers per segment by specification

     Segments that can have computers                Three of the five segments can be populated

     Total number of computers                       90 computers

     Maximum total network length                    925 meters (3035 feet)


    34                                      Copyright revised for Zafar Ayub
                                                (zafar_ayub@hotmail.com)
5-4-3 Rule:
   A thinnet network can combine as many as five cable segments
   connected by four repeaters; but only three segments can have
   stations attached.
  Thus, two segments are untapped and are often referred to as
   "inter-repeater links." This is known as the 5-4-3 rule.




 35                          Copyright revised for Zafar Ayub
                                 (zafar_ayub@hotmail.com)
¢  There are five segments, four repeaters, and trunk segments 1, 2,
   and 5 are populated (have computers attached to them).
¢ Trunk segments 3 and 4 exist only to increase the total length of
   the network and to allow the computers on trunk segments 1 and
   5 to be on the same network.
¢ Because normal Ethernet limits are too confining for a large
   business, repeaters can be used to join Ethernet segments and
   extend the network to a total length of 925 meters (3035 feet).
Note:
The 5-4-3-2-1 rule limits the range of a collision domain by limiting the
propagation delay to a "reasonable" amount of time. The rule breaks
down as follows:
5       -      The       number        of        network       segments
4 - the number of repeaters needed to join the segments into one
collision                                                        domain
3 - the number of network segments that have active (transmitting)
devices                                                         attached
2 - the number of segments that do not have active devices attached
1 - the number of collision domains

    36                           Copyright revised for Zafar Ayub
                                     (zafar_ayub@hotmail.com)
Advantages:
  Relatively inexpensive
  Easy to install
  Easy to configure

Disadvantages:
  Limitation of computer till max 90 computers




 37                        Copyright revised for Zafar Ayub
                               (zafar_ayub@hotmail.com)
10Base-5
¢    In 10Base-5 coax cable used Thicknet cable (RG-59) 50 ohm.
¢    Thick-net cable is often used as backbone in local area network
     environment.
¢    It transmit data speed of 10Mbps covers distances of up to 1640
     feet / 500 meters and accommodates up to 100 nodes per
     segments.




    38                           Copyright revised for Zafar Ayub
                                     (zafar_ayub@hotmail.com)
¢    Thicknet cabling components include;
      ¢ Transceivers These are devices that can both transmit and receive,
         provide communications between the computer and the main LAN
         cable, and are located in the vampire taps attached to the cable




         ¢   Transceiver cables The transceiver cable (drop cable) connects the
             transceiver to the NIC.



    39                                 Copyright revised for Zafar Ayub
                                           (zafar_ayub@hotmail.com)
¢   DIX (or AUI) connectors These are the connectors on the
         transceiver cable.




40                             Copyright revised for Zafar Ayub
                                   (zafar_ayub@hotmail.com)
¢   N-series connectors, including N-series              barrel
         connectors, and N-series terminators




41                         Copyright revised for Zafar Ayub
                               (zafar_ayub@hotmail.com)
¢     10Base-5 specification;
                           Category                                                    Notes
    Maximum segment length                                500 meters (1640 feet).

    Transceivers                                          Connected to the segment (in the tap).

    Maximum computer-to-transceiver distance              50 meters (164 feet).


    Minimum distance between transceivers                 2.5 meters (8 feet).

    Trunk segments and repeaters                          Five segments can be joined using four repeaters.


    Segments that can have computers                      Three of the five segments can be populated.

    Maximum total length of joined segments               2500 meters (8200 feet).

    Maximum number of computers per segment               100 by specification.


    Total number of computers                             300 computers




    42                                         Copyright revised for Zafar Ayub
                                                   (zafar_ayub@hotmail.com)
5-4-3 Rule:
   One thicknet Ethernet network can have a maximum of five
   backbone segments connected using repeaters , of which up to
   three can accommodate computers.
   Figure shows how the 5-4-3 rules are applied to thicknet.




 43                          Copyright revised for Zafar Ayub
                                 (zafar_ayub@hotmail.com)
¢  The length of the transceiver cables is not used to measure the
   distance supported on the thicknet cable; only the end-to-end
   length of the thicknet cable segment itself is used.
¢ Between connections, the minimum thicknet cable segment is 2.5
   meters (about 8 feet).
¢ This measurement excludes transceiver cables. Thicknet was
   designed to support a backbone for a large department or an entire
   building.
Note:
The 5-4-3-2-1 rule limits the range of a collision domain by limiting the
propagation delay to a "reasonable" amount of time. The rule breaks
down as follows:
5       -      The        number       of         network      segments
4 - the number of repeaters needed to join the segments into one
collision                                                        domain
3 - the number of network segments that have active (transmitting)
devices                                                         attached
2 - the number of segments that do not have active devices attached
1 - the number of collision domains

    44                           Copyright revised for Zafar Ayub
                                     (zafar_ayub@hotmail.com)
Advantages:
  Backbone cable
  Covers distances of up to 1640 feet or 500 meters
  Accommodates up to 100 nodes per segment


Disadvantages:
  it’s very difficult to work
  it transmits data at speeds of 10Mbps
  A loose connection or missing terminator could cause erratic
network performance.
  This will lead to reduced speed, error counts in high-frame
transmission or even a lack of network connectivity.
  When using thin-net, a malfunction transceiver could also
cause excessive packet transmission or frame transmission
errors.

 45                         Copyright revised for Zafar Ayub
                                (zafar_ayub@hotmail.com)

More Related Content

What's hot

Analog and Digital Transmission
Analog and Digital TransmissionAnalog and Digital Transmission
Analog and Digital TransmissionAnushiya Ram
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer NetworkHitesh Mohapatra
 
Data communications
Data communicationsData communications
Data communicationsAshwini
 
iso osi model
 iso osi model iso osi model
iso osi modelvishnu1204
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer networkmiteshppt
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basicsRomeo Alonzo
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer servicesMelvin Cabatuan
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switchinghoanv
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocaltes31
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switchingDr Rajiv Srivastava
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1Zafar Ayub
 
Integrated services digital network (isdn)
Integrated services digital network (isdn)Integrated services digital network (isdn)
Integrated services digital network (isdn)Gulu University
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteAtharaw Deshmukh
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP modelRubal Sagwal
 
Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)Dr Rajiv Srivastava
 

What's hot (20)

Analog and Digital Transmission
Analog and Digital TransmissionAnalog and Digital Transmission
Analog and Digital Transmission
 
Multiple Access in Computer Network
Multiple Access in Computer NetworkMultiple Access in Computer Network
Multiple Access in Computer Network
 
Data communications
Data communicationsData communications
Data communications
 
Application Layer
Application Layer Application Layer
Application Layer
 
iso osi model
 iso osi model iso osi model
iso osi model
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
Multiplexing
MultiplexingMultiplexing
Multiplexing
 
Ethernet Computer network
Ethernet Computer networkEthernet Computer network
Ethernet Computer network
 
Internetworking basics
Internetworking basicsInternetworking basics
Internetworking basics
 
Transport layer services
Transport layer servicesTransport layer services
Transport layer services
 
Media Access Control
Media Access ControlMedia Access Control
Media Access Control
 
Circuit and packet_switching
Circuit and packet_switchingCircuit and packet_switching
Circuit and packet_switching
 
Multiple Access Protocal
Multiple Access ProtocalMultiple Access Protocal
Multiple Access Protocal
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
Introduction to switching & circuit switching
Introduction to switching & circuit switchingIntroduction to switching & circuit switching
Introduction to switching & circuit switching
 
Data communication and network Chapter -1
Data communication and network Chapter -1Data communication and network Chapter -1
Data communication and network Chapter -1
 
Integrated services digital network (isdn)
Integrated services digital network (isdn)Integrated services digital network (isdn)
Integrated services digital network (isdn)
 
Protocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol SuiteProtocols and the TCP/IP Protocol Suite
Protocols and the TCP/IP Protocol Suite
 
OSI model and TCP/IP model
OSI model and TCP/IP modelOSI model and TCP/IP model
OSI model and TCP/IP model
 
Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)Topic: ISDN (Integrated Services Digital Network)
Topic: ISDN (Integrated Services Digital Network)
 

Viewers also liked (20)

Digital & analog transmission
Digital & analog transmissionDigital & analog transmission
Digital & analog transmission
 
Ch25
Ch25Ch25
Ch25
 
Chap 5 analog transmission
Chap 5 analog transmissionChap 5 analog transmission
Chap 5 analog transmission
 
Ch21
Ch21Ch21
Ch21
 
Ch15
Ch15Ch15
Ch15
 
Ch31
Ch31Ch31
Ch31
 
Ch08
Ch08Ch08
Ch08
 
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File TransferChapter 26 - Remote Logging, Electronic Mail & File Transfer
Chapter 26 - Remote Logging, Electronic Mail & File Transfer
 
Ch09
Ch09Ch09
Ch09
 
2[1].1 data transmission
2[1].1 data transmission2[1].1 data transmission
2[1].1 data transmission
 
Serial transmission
Serial transmissionSerial transmission
Serial transmission
 
Analog Transmission
Analog TransmissionAnalog Transmission
Analog Transmission
 
Chap5 analog transmission
Chap5 analog transmissionChap5 analog transmission
Chap5 analog transmission
 
Analog transmission
Analog transmissionAnalog transmission
Analog transmission
 
Analog Transmission
Analog TransmissionAnalog Transmission
Analog Transmission
 
Digital data transmission,line coding and pulse shaping
Digital data transmission,line coding and pulse shapingDigital data transmission,line coding and pulse shaping
Digital data transmission,line coding and pulse shaping
 
Ch18
Ch18Ch18
Ch18
 
Data communications
Data communicationsData communications
Data communications
 
Ch06
Ch06Ch06
Ch06
 
Ch10
Ch10Ch10
Ch10
 

Similar to Network Protocols Explained

Similar to Network Protocols Explained (20)

Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
 
Network engg
Network enggNetwork engg
Network engg
 
LAN TECHNOLOGIES
LAN TECHNOLOGIESLAN TECHNOLOGIES
LAN TECHNOLOGIES
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Fast ethernet
Fast ethernetFast ethernet
Fast ethernet
 
Week 5 lan topology
Week 5 lan topologyWeek 5 lan topology
Week 5 lan topology
 
LAN TECHNOLOGLES
 LAN TECHNOLOGLES LAN TECHNOLOGLES
LAN TECHNOLOGLES
 
Netwok techonologies
Netwok techonologiesNetwok techonologies
Netwok techonologies
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
Ethernet
EthernetEthernet
Ethernet
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Mod9
Mod9Mod9
Mod9
 
04 - Networking Technologies.ppt
04 - Networking Technologies.ppt04 - Networking Technologies.ppt
04 - Networking Technologies.ppt
 
Ethernet
EthernetEthernet
Ethernet
 
Fast_Ethernet.ppt
Fast_Ethernet.pptFast_Ethernet.ppt
Fast_Ethernet.ppt
 
Sem 1 Ch 7
Sem 1 Ch 7Sem 1 Ch 7
Sem 1 Ch 7
 
Lecture5
Lecture5Lecture5
Lecture5
 
Unit 1 ethernet vsd
Unit 1 ethernet vsdUnit 1 ethernet vsd
Unit 1 ethernet vsd
 
Fddi & Gigabit Ethernet
Fddi & Gigabit EthernetFddi & Gigabit Ethernet
Fddi & Gigabit Ethernet
 
networking
networkingnetworking
networking
 

More from Zafar Ayub

Customer App Flow
Customer App FlowCustomer App Flow
Customer App FlowZafar Ayub
 
Software Prototyping
Software PrototypingSoftware Prototyping
Software PrototypingZafar Ayub
 
Binary Search Tree
Binary Search TreeBinary Search Tree
Binary Search TreeZafar Ayub
 
Software Engineering – Course Outline
Software Engineering – Course OutlineSoftware Engineering – Course Outline
Software Engineering – Course OutlineZafar Ayub
 
Introduction of Software Engineering
Introduction of Software EngineeringIntroduction of Software Engineering
Introduction of Software EngineeringZafar Ayub
 
MIS business approach
MIS business approachMIS business approach
MIS business approachZafar Ayub
 
MIS understanding
MIS understandingMIS understanding
MIS understandingZafar Ayub
 
Inside the computer
Inside the computerInside the computer
Inside the computerZafar Ayub
 
What is computer?
What is computer?What is computer?
What is computer?Zafar Ayub
 
Generations of computers
Generations of computersGenerations of computers
Generations of computersZafar Ayub
 

More from Zafar Ayub (12)

Use case
Use caseUse case
Use case
 
Customer App Flow
Customer App FlowCustomer App Flow
Customer App Flow
 
UML Review
UML ReviewUML Review
UML Review
 
Software Prototyping
Software PrototypingSoftware Prototyping
Software Prototyping
 
Binary Search Tree
Binary Search TreeBinary Search Tree
Binary Search Tree
 
Software Engineering – Course Outline
Software Engineering – Course OutlineSoftware Engineering – Course Outline
Software Engineering – Course Outline
 
Introduction of Software Engineering
Introduction of Software EngineeringIntroduction of Software Engineering
Introduction of Software Engineering
 
MIS business approach
MIS business approachMIS business approach
MIS business approach
 
MIS understanding
MIS understandingMIS understanding
MIS understanding
 
Inside the computer
Inside the computerInside the computer
Inside the computer
 
What is computer?
What is computer?What is computer?
What is computer?
 
Generations of computers
Generations of computersGenerations of computers
Generations of computers
 

Recently uploaded

Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Celine George
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxAnupkumar Sharma
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
Incoming and Outgoing Shipments in 3 STEPS Using Odoo 17
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptxMULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
MULTIDISCIPLINRY NATURE OF THE ENVIRONMENTAL STUDIES.pptx
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 

Network Protocols Explained

  • 1. Copyright revised for Zafar Ayub Data Communication and Network (zafar_ayub@hotmail.com) Chapter - 2 Compile by Zafar Ayub 1
  • 2. Network Protocol A protocol is a set of rules that governs the communications between computers on a network. In order for two computers to talk to each other, they must be speaking the same language. These rules include guidelines that regulate the following characteristics of a network; access method, allowed physical topologies, types of cabling, and speed of data transfer. Many different types of network protocols and standards are required to ensure that your computer (no matter which operating system, network card, or application you are using) can communicate with another computer located on the next desk or half-way around the world. 2 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 3. Types of Network Protocols ¢ Network protocols also known as Network Technologies, the most common network protocols are; ¢ Ethernet (LAN protocol; architecture developed by Xerox, DEC, and Intel in 1976) ¢ Local Talk ( network protocol that was developed by Apple Computer, Inc. for Macintosh computers) ¢ Token Ring ( patented by IBM in 1981, is a network protocol that employs token-passing between computers arranged in a logical ring network) ¢ FDDI (set of ANSI and ISO standards for data transmission on fiber optic lines in a local area network (LAN) that can extend in range up to 200 km (124 miles). ¢ ATM (ATM is a high-speed networking standard designed to support both voice and data communications. ATM is normally utilized by Internet service providers on their private long- distance networks) 3 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 4. Ethernet Protocol ¢ The Ethernet protocol is by far the most widely used. Ethernet uses an access method called CSMA/CD (Carrier Sense Multiple Access/Collision Detection). ¢ This is a system where each computer listens to the cable before sending anything through the network. If the network is clear, the computer will transmit. ¢ If some other node is already transmitting on the cable, the computer will wait and try again when the line is clear. ¢ Sometimes, two computers attempt to transmit at the same instant. When this happens a collision occurs. Each computer then backs off and waits a random amount of time before attempting to retransmit. ¢ With this access method, it is normal to have collisions. However, the delay caused by collisions and retransmitting is very small and does not normally effect the speed of transmission on the network. ring network) 4 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 5. Types of Ethernet ¢ 10 Base 5 Coaxial cable (10Base5) Thicknet. (Bus Topology) ¢ 10 Base 2 Thin coax cable (10Base2) Thinnet. (Bus Topology) ¢ 10 Base T Twisted pair Ethernet (10BaseT) Star Topology on HUBs ¢ 100 Base T (Fast Ethernet) 100BASE-TX: two pairs of high-quality twisted-pair wires 100BASE-T4: four pairs of normal-quality twisted-pair wires 100BASE-FX: fiber optic cables 100 Mbps speed on Star Topologies on HUBs (Twisted pair CAT-6 cable) 5 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 6. ¢ Giga Base T / 1000 Base X High speed Ethernet on layer 3 switches with twisted pair and fiber cable Name Medium Specified distance 1000BASE-CX Twinaxial cabling 25 meters 1000BASE-SX Multi-mode fiber 220 to 550 meters dependent on fiber diameter and bandwidth 1000BASE-LX Multi-mode fiber 550 meters 1000BASE-LX Single-mode fiber 5 km 1000BASE-LX10 Single-mode fiber using 1,310 nm wavelength 10 km 1000BASE-ZX Single-mode fiber at 1,550 nm wavelength ~ 70 km 1000BASE-BX10 Single-mode fiber, over single-strand fiber: 10 km 1,490 nm downstream 1,310 nm upstream 1000BASE-T Twisted-pair cabling (Cat-5, Cat-5e, Cat-6, or 100 meters Cat-7) 1000BASE-TX Twisted-pair cabling (Cat-6, Cat-7) 100 meters 6 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 7. ¢ 10G Base Ethernet For core network backbone and submarine cables Name Medium Specified distance 10GBASE-SR Multi-mode fiber 100 meters 10GBASE-LR Single-mode fiber 10 km 10GBASE-LRM Multi-mode fiber 300 meters 10GBASE-ER Single-mode fiber 40 Km 10GBASE-ZR Single – mode fiber 80 km 10GBASE-LX4 Single-mode fiber at 1,550 nm wavelength 10 km 10GBASE-T Twisted pair 100 m 7 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 8. Standard of Ethernet ¢ 10 Base T 10 Mbps (Half Duplex) IEEE 802.3 at Data Link Layer / Layer 2 ¢ 100 Base T (Fast Ethernet) 100 Mbps (Half Duplex / Full Duplex) IEEE 802.3u at Data Link Layer / Layer 2 ¢ Giga Ethernet 1000 Mbps (Full Duplex ) IEEE 802.3z at Data Link Layer / Layer 2 ¢ 10 Giga Ethernet 10000 Mbps (Full Duplex) IEEE 802.3ae at Data Link Layer / Layer 2 8 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 9. CSMA / CD ¢ Carrier Sense: wait till medium is idle before sending frame. ¢ Multiple Access: multiple computers use the same shared media. Each uses same access algorithm. ¢ Collision Detection: Listen to medium – detect if another station’s signal interferes – back off and try again later. 9 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 10. CSMA / CD - Transmitting 10 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 11. ¢ When Ethernet network determine transmission of data, data broken into packet, and packed into frames. ¢ Maintain queued for transmission, usually this process occur on NIC. ¢ Before transmission, transceiver listen on medium is used or not, if free then start transmission, other wise wait for an algorithm. ¢ The listing process through out whole cable transceivers. ¢ It is possible that two or more of them sense simultaneously, and began transmitting, cable medium is shared medium; so possibly two or more transmission frames collapse with each other. ¢ Collapse known as collision. ¢ When transmission began, sender station continuously monitor the medium, and when collision is occur, then transmit “Jam Signal”. ¢ At this stage all station which are involved in this collision, began “evasive action”, is an algorithm for waiting of random period of time. 11 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 12. ¢ If collision occurs: wait a random time t1 - 0< t1<d. D depends on transmission speed – time for frame width or 512 bits. ¢ If second collision occurs, wait a random time t2 - 0< t2<2d. Double range for each successive collision. ¢ If collision occur its maximum value, transmission aboard. ¢ And if no collision, then again listen cable that is busy or not. 12 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 13. CSMA / CD - Receiving 13 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 14. ¢ Each station on the medium, listen incoming frames and check for fragments; fragments are partial frame (faulty or collision occur frames). ¢ In first step, check frame size, valid Ethernet frame has approximately size is 64 bytes. ¢ If frame is shooter, then assumed that collision may occur, then not further process, and try again. ¢ In second step, station also check MAC address of destination frame, if this address is not match, then start receiving again. ¢ And if address match, then check series of various elements, like receiving frame not too long, conditionally length is 1518 bytes, if exceed assumed that frame is faulty, and transmission terminate due to over size of frame. ¢ If over size test is clear, then check CRC formula, and comparing result value with receiving frame value. ¢ if comprising value checked then, and result is match then disassemble frame, and successful receiving. 14 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 15. ¢ If length field is not match, then aboard receiving. ¢ And CRC not match, then check extra bit (check sum), if no extra bit then end of receiving due to CRC error. ¢ And If add extra value in CRC, then again aboard receiving due to alignment error. 15 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 16. Token Ring Protocol ¢ Initially used only in IBM computers in 1981, it was eventually standardized with protocol IEEE 802.5. ¢ Token ring technology is a local area network protocol which resides at the data link layer (DLL 2 layer) of the OSI model. o It uses a special three-byte frame called a token that travels around the ring. o Active monitor grants the possessor permission to transmit on the medium. o Token ring frames travel completely around the loop. o Like Ethernet any computer start transmitting at every time; not possible, either wait for special frame “token”, and when it get on wire and if is token is empty then copy their data on it, and passing through forward. o This token traveling method is clockwise and called as token passing method. 16 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 17. Token Ring Topology ¢ Ring topology is used for token ring protocol; but actually physically star topology and logically ring topology are used. 17 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 18. ¢ In token ring protocol, ring topology used MSAU as central device, CAT-3 (4Mbps to16Mbps), and IBM token ring adapter. ¢ MSAU (Multi Station Access Unit) just like Ethernet hub, but every computer linked with two UTP / STP cables, one for received and second for transmit. ¢ These short cable which are attached with computer to MSAU, is called Lobe. ¢ There are two types of computers on token ring topology, only one at ring is active monitor, and all other reaming are standby monitor. ¢ Active monitor responsible for generating token and passing through on network in clock wise. ¢ Standby monitors just like clients which are directly connected on ring , waiting for token for data transmission at its own parity. ¢ Active monitor selection is done by automatically by an election method, and if within 10 millisecond, active monitor is out of response, automatically election generated and new computer active monitor. 18 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 19. Token Passing ¢ The first computer set its NIC default value. ¢ In second perform lobe test, transmit and receive cables initially connected with MSAU, in this test computer send single on their transmit cable and listening back same signal at its receiving cable. ¢ If successful communication occur then other process shall be start, other wise computer goes to fail for ring attachment; this test called loopback test. ¢ In next stage computer place current (phantom current) on cable ring, which cause this lobe is active on MSAU, otherwise MSAU assume this computer is going switch off. ¢ After this network adapter now checks to insure that its MAC address is unique on network; for this its send special signal (destination its own MAN address) if no computer set an indicator flag on this frame, then its assume its address is unique, otherwise remove from network until anyone reconfigure its MAC address. ¢ Within seven second, a ring poll occur, by this every computer get know its upstream neighbor address. 19 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 20. ¢ Ring poll: ring polling occur every seven second, by this process every computer aware of its next upstream neighbor MAC address. All of this value also be save at active, and in every seven second every computer listen that active monitor is present or not other wise again election shall be occur. ¢ By clearing all test computer become full flag member of ring. ¢ Lets start a ring which have five computer A to E, where A is a active monitor. ¢ Computer A is automatically elected by an election, now B required to send data to E, then when token is pass through at B computer, its check if token is empty then he copy their data into empty token. ¢ Token is now moving forward C; again C check that this token is for its or not, forward it, token forward to D; again this process happened, and when this token at E, this computer NIC check that destination MAC is match, if yes then copy all data and copied flagged is down means off. 20 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 21. ¢ Again token forwarding back to A, after reaching A computer check if copy flag is down or off then again up this flag and assume that data has been copied other wise again transmit in ring. ¢ When this happen means data has been copied, A also up all reaming flags; like token is empty, data copy, and if any error then remove from frame. ¢ Then A again transmit this token on ring, when its pass through by B, computer B check and if token empty flag is up then computer B able to copy their data on this token, and computer B copy their data on exiting pervious computer A data. ¢ Token priority / flag: There are 8 priority / flags on token ring transmission; from 0-7, every flag represent any one operation like token is empty, data has been copied or error, etc. 21 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 22. Active Monitor: Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station. However, there can be only one active monitor on a ring at a time. The active monitor is chosen through an election or monitor contention process. The monitor contention process is initiated when •a loss of signal on the ring is detected. •an active monitor station is not detected by other stations on the ring. •a particular timer on an end station expires such as the case when a station hasn't seen a token frame in the past 7 seconds. When any of the above conditions take place and a station decides that a new monitor is needed, it will transmit a "claim token" frame, announcing that it wants to become the new monitor. If that token returns back to the sender, it is OK for it to become the monitor. If some other station tries to become the monitor at the same time then the station with the highest MAC address will win the election process. Every other station becomes a standby monitor. All stations must be capable of becoming an active monitor station if necessary. 22 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 23. The active monitor performs a number of ring administration functions. •The first function is to operate as the master clock for the ring in order to provide synchronization of the signal for stations on the wire. •Another function of the AM is to insert a 24-bit delay into the ring, to ensure that there is always sufficient buffering in the ring for the token to circulate. •A third function for the AM is to ensure that exactly one token circulates whenever there is no frame being transmitted, and to detect a broken ring. •Lastly, the AM is responsible for removing circulating frames from the ring. 23 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 24. 24 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 25. FDDI Protocol ¢ Fiber Distributed Data Interface (FDDI) provides a 100 Mbps optical standard for data transmission in a local area network that can extend in range up to 200 kilometers (120 mi). ¢ Although FDDI logical topology is a ring-based token network, it does not use the IEEE 802.5 token ring protocol as its basis; instead, its protocol is derived from the IEEE 802.4 token bus timed token protocol. ¢ In addition to covering large geographical areas, FDDI local area networks can support thousands of users. As a standard underlying medium it uses optical fiber, although it can use copper cable, in which case it may be referred to as CDDI (Copper Distributed Data Interface). FDDI offers both a Dual-Attached Station (DAS), counter-rotating token ring topology and a Single-Attached Station (SAS), token bus passing ring topology 25 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 26. Network Topologies A Network Topology is the layout pattern of interconnections of the various elements (links, cables, devices, etc) of a computer system. In network arrangement of computers or flow of network traffic, known as Network Topology. Means arrangement of device on network with structural (physical) or virtual (logical) is Network Topology. 26 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 27. Types of Network Topologies ¢ Network topologies may be physical or logical with respect to their functionality. ¢ Physical topology refers to the physical design of a network including the devices, location and cable installation. The shape of the cabling layout used to link devices is called the physical topology of the network.This refers to the layout of cabling the locations of nodes the interconnections between the nodes and the cabling The physical topology of a network is determined by; the capabilities of the network access devices and media the level of control fault tolerance desired the cost associated with cabling or telecommunications circuits. 27 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 28. ¢ Logical topology refers to how data is actually transferred in a network as opposed to its physical design. The logical topology is define; is the way that the signals act on the network media the way that the data passes through the network from one device to the next without regard to the physical interconnection of the devices. A network's logical topology is not necessarily the same as its physical topology. For example; the original UTP Ethernet using hubs / switches, but logically connected bus topology layout. Token Ring is a logical ring topology, but is wired a physical star from the MSAU (Media Station Access Unit). ¢ In general physical topology relates to a core network whereas logical topology relates to basic network. 28 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 29. BUS Topology ¢ A bus network topology is a network architecture in which a set of clients are connected via a shared communications line / medium, called a BUS topology. ¢ The bus topology is often referred to as a linear bus because the computers are connected in a straight line. This is the simplest and most common method of networking computers. Advantages : Easy to connect a computer or peripheral to a linear bus. Easy to implement and extend Well suited for temporary networks (quick setup) Typically the cheapest topology to implement Faster than a ring network. If any node on the bus network fails, the bus its self is not effected. Requires less cable length than a star topology. 29 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 30. Disadvantages : Difficult to administer/troubleshoot Limited cable length and number of stations A cable break can disable the entire network Maintenance costs may be higher in the long run Performance degrades as additional computers are added or on heavy traffic Low security (all computers on the bus can see all data transmissions) One virus in the network will affect all of them (but not as badly as a star or ring network) Proper termination is required.(loop must be in closed path) Significant Capacitive Load (each bus transaction must be able to stretch to most distant link). 30 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 31. How it’s work? ¢ A Bus networks are the simplest way to connect multiple clients, but may have problems when two clients want to transmit at the same time on the same bus. ¢ The Ethernet is common protocol for bus topology. ¢ Thus systems which use bus network architectures normally have some scheme of collision handling or collision avoidance for communication on the bus, quite often using CSMA / CD(Carrier Sense Multiple Access / Collision Detection). ¢ In Bus topology computers are connected with each other via cable, called coax cable (thick net / thin net) with their NIC. ¢ NIC connect with cable via passive device called BNC -T(British Naval Connector) / Transverse (DB-15) and at last of both cables ends T-Connector or open loop must be closed. ¢ Bus topology has two basic types 10Base-2 and 10Base-5. 31 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 32. 10Base-2 ¢ In 10Base-2 coax cable used Thinnet cable (RG-58) 50 ohm. ¢ It is capable of covering up to 590 feet (180 meters) and is not highly susceptible to noise interference. ¢ It transmits at 10Mbps megabits per second and can support up to 30 nodes per segment. ¢ This is a type of coax cable you can use for networks it’s a thinner cable, like the one you find on your cable television. 32 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 33. ¢ Thinnet cabling components include; ¢ BNC barrel connectors ¢ BNC T connectors ¢ BNC terminator 33 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 34. ¢ 10Base-2 specification; Category Notes Maximum segment length 185 meters (607 feet) Connection to network interface card BNC T connector Trunk segments and repeaters Five segments can be joined using four repeaters Computers per segment 30 computers per segment by specification Segments that can have computers Three of the five segments can be populated Total number of computers 90 computers Maximum total network length 925 meters (3035 feet) 34 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 35. 5-4-3 Rule: A thinnet network can combine as many as five cable segments connected by four repeaters; but only three segments can have stations attached. Thus, two segments are untapped and are often referred to as "inter-repeater links." This is known as the 5-4-3 rule. 35 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 36. ¢ There are five segments, four repeaters, and trunk segments 1, 2, and 5 are populated (have computers attached to them). ¢ Trunk segments 3 and 4 exist only to increase the total length of the network and to allow the computers on trunk segments 1 and 5 to be on the same network. ¢ Because normal Ethernet limits are too confining for a large business, repeaters can be used to join Ethernet segments and extend the network to a total length of 925 meters (3035 feet). Note: The 5-4-3-2-1 rule limits the range of a collision domain by limiting the propagation delay to a "reasonable" amount of time. The rule breaks down as follows: 5 - The number of network segments 4 - the number of repeaters needed to join the segments into one collision domain 3 - the number of network segments that have active (transmitting) devices attached 2 - the number of segments that do not have active devices attached 1 - the number of collision domains 36 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 37. Advantages: Relatively inexpensive Easy to install Easy to configure Disadvantages: Limitation of computer till max 90 computers 37 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 38. 10Base-5 ¢ In 10Base-5 coax cable used Thicknet cable (RG-59) 50 ohm. ¢ Thick-net cable is often used as backbone in local area network environment. ¢ It transmit data speed of 10Mbps covers distances of up to 1640 feet / 500 meters and accommodates up to 100 nodes per segments. 38 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 39. ¢ Thicknet cabling components include; ¢ Transceivers These are devices that can both transmit and receive, provide communications between the computer and the main LAN cable, and are located in the vampire taps attached to the cable ¢ Transceiver cables The transceiver cable (drop cable) connects the transceiver to the NIC. 39 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 40. ¢ DIX (or AUI) connectors These are the connectors on the transceiver cable. 40 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 41. ¢ N-series connectors, including N-series barrel connectors, and N-series terminators 41 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 42. ¢ 10Base-5 specification; Category Notes Maximum segment length 500 meters (1640 feet). Transceivers Connected to the segment (in the tap). Maximum computer-to-transceiver distance 50 meters (164 feet). Minimum distance between transceivers 2.5 meters (8 feet). Trunk segments and repeaters Five segments can be joined using four repeaters. Segments that can have computers Three of the five segments can be populated. Maximum total length of joined segments 2500 meters (8200 feet). Maximum number of computers per segment 100 by specification. Total number of computers 300 computers 42 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 43. 5-4-3 Rule: One thicknet Ethernet network can have a maximum of five backbone segments connected using repeaters , of which up to three can accommodate computers. Figure shows how the 5-4-3 rules are applied to thicknet. 43 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 44. ¢ The length of the transceiver cables is not used to measure the distance supported on the thicknet cable; only the end-to-end length of the thicknet cable segment itself is used. ¢ Between connections, the minimum thicknet cable segment is 2.5 meters (about 8 feet). ¢ This measurement excludes transceiver cables. Thicknet was designed to support a backbone for a large department or an entire building. Note: The 5-4-3-2-1 rule limits the range of a collision domain by limiting the propagation delay to a "reasonable" amount of time. The rule breaks down as follows: 5 - The number of network segments 4 - the number of repeaters needed to join the segments into one collision domain 3 - the number of network segments that have active (transmitting) devices attached 2 - the number of segments that do not have active devices attached 1 - the number of collision domains 44 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)
  • 45. Advantages: Backbone cable Covers distances of up to 1640 feet or 500 meters Accommodates up to 100 nodes per segment Disadvantages: it’s very difficult to work it transmits data at speeds of 10Mbps A loose connection or missing terminator could cause erratic network performance. This will lead to reduced speed, error counts in high-frame transmission or even a lack of network connectivity. When using thin-net, a malfunction transceiver could also cause excessive packet transmission or frame transmission errors. 45 Copyright revised for Zafar Ayub (zafar_ayub@hotmail.com)