Introduction To LAN Protocols: What Is A LAN?
Introduction To LAN Protocols: What Is A LAN?
Introduction To LAN Protocols: What Is A LAN?
What Is a LAN?
A LAN is a high-speed data network that covers a relatively small geographic area. It
typically connects workstations, personal computers, printers, servers, and other
devices. LANs offer computer users many advantages, including shared access to
devices and applications, file exchange between connected users, and
communication between users via electronic mail and other applications.
LAN protocols function at the lowest two layers of the OSI reference model, as
discussed in Chapter 1, "Internetworking Basics," between the physical layer and the
data link layer. The following figure illustrates how several popular LAN protocols map
to the OSI reference model.
Media contention occurs when two or more network devices have data to send
at the same time. Because multiple devices cannot talk on the network
simultaneously, some type of method must be used to allow one device access to the
network media at a time. This is done in two main ways: carrier sense multiple
access collision detects (CSMA/CD) and token passing.
In token-passing networks such as Token Ring and FDDI, a special network packet
called a token is passed around the network from device to device. When a device
has data to send, it must wait until it has the token and then sends its data. When
the data transmission is complete, the token is released so that other devices may
use the network media. The main advantage of token-passing networks is that they
are deterministic. In other words, it is easy to calculate the maximum time that will
pass before a device has the opportunity to send data. This explains the popularity of
token-passing networks in some real-time environments such as factories, where
machinery must be capable of communicating at a determinable interval.
For CSMA/CD networks, switches segment the network into multiple collision
domains. This reduces the number of devices per network segment that must
contend for the media. By creating smaller collision domains, the performance of a
network can be increased significantly without requiring addressing changes.
Normally CSMA/CD networks are half-duplex, meaning that while a device sends
information, it cannot receive at the time. While that device is talking, it is incapable
of also listening for other traffic. This is much like a walkie-talkie. When one person
wants to talk, he presses the transmit button and begins speaking. While he is
talking, no one else on the same frequency can talk. When the sending person is
finished, he releases the transmit button and the frequency is available to others.
Token-passing networks such as Token Ring can also benefit from network switches.
In large networks, the delay between turns to transmit may be significant because
the token is passed around the network.
LAN Tr a n s m i s s i o n Methods
LAN data transmissions fall into three classifications: unicast, multicast, and
broadcast.
In each type of transmission, a single packet is sent to one or more nodes.
A broadcast transmission consists of a single data packet that is copied and sent to
all nodes on the network. In these types of transmissions, the source node addresses
the packet by using the broadcast address. The packet is then sent on to the
network, which makes copies of the packet and sends a copy to every node on the
network
NETWORK
A network is a collection of computers and other devices that allow computer users
to send and receive information to and from each other.
Introduction to Networks
Individual workstations are sometimes connected by cable to a shared computer
known as a server. The server is usually located relatively close to the individual
workstations. There is either an Ethernet card or token ring board in each computer
that allows it to be connected to the network. Both workstation and server use
software that allows the computers to speak the same language.
See Glossary of Network Terms for a list of other frequently used network terms.
The Three Components of a Network
In order to have full access to a network (local or wide) from your workstation, three
components are required.
Your workstation must have an Ethernet card or token ring board installed and a
cable running from this card to the data jack in your office.
The data jack must be wired from your office through the building to the campus
broadband. Once this hardware wiring connection is made, you have the
infrastructure in place to access the network.
2. The second component is network software that recognizes the hardware and
will use it. Different software is required depending on the network access you
want.
o For a Local Area Network (LAN), you will need network operating
system software (i.e., Novell or Windows NT). If you want to access the
Wide Area Network and the Local Area Network, you will need both
kinds of software. Contact your local support person to find out what
kind of software you have.
Pros
A network gives you the ability to:
• share and transfer files between people on the Local Area Network (platform
dependent DOS/Windows or Macintosh)
• share common printers
• connect your computers to other sites on the WAN and at other locations
• access a variety of network search facilities such as Gopher, Mosaic, and
World Wide Web
• transfer files between systems using FTP
• save disk space on your hard drive by putting software on the server
• use E-Mail
Cons
A network:
Theft or Vandalism
Theft or vandalism can involve either hardware or software/data. Hardware, whether
networked or not, can be protected by ensuring that the location is secure. Software
and/or data are much more vulnerable on a network because they may be affected
by more than one person or workstation. Shared software or data, if damaged or
stolen, may hamper the productivity of an entire department.
• All shared resources must have a detailed chain of authorization (i.e., these
people can read the file; these people can write to the file; these people can
erase the file, etc.)
• Files and computers should be password protected and passwords should
follow established security guidelines.
• Backup procedures should be in place and off-site storage of backups should
be maintained so that, in the event of a problem, software and data can be
restored.
• Only authorized persons should have access to the network and network files.
An individual should be assigned the task of network security and should keep
up-to-date on guidelines and procedures and routinely perform security
audits.
Virus Infection
The other area of network security involves virus infections. Virus protection software
is an invaluable resource in protecting hardware and software from the spread of
viruses - but it is only as good as the way in which it is used. For proper use, virus
protection software should be:
• updated regularly
• placed on every computer that is used with floppy disks that travel from
person to person, and on computers that retrieve program/applications
software from any source
• installed so that any floppy disk inserted into the drive is checked prior to
loading
• available to easily check any software that updates or changes the system
files, such as autoexec.bat, config.sys, FAT tables, etc.
Every computer station should have a bootable emergency diskette prepared and
kept up-to-date with a copy of the system setup files that are called when the system
is first booted. If a virus is detected, the infected system can be cleaned without fear
of losing the valuable start-up information on the emergency diskette.
The OSI model has seven layers. The principles that were applied to arrive at the
seven layers are as follows:
3. The function of each layer should be chosen with an eye toward defining
internationally standardized protocols.
4. The layer boundaries should be chosen to minimize the information flow across
the interfaces.
5. The number of layers should be large enough that distinct functions need not be
thrown together in the same layer out of necessity, and small enough that the
architecture does not become unwieldy.
History of Internetworking
The first networks were time-sharing networks that used mainframes and attached
terminals. Such environments were implemented by both IBM's Systems Network
Architecture (SNA) and Digital's network architecture.
Local-area networks (LANs) evolved around the PC revolution. LANs enabled multiple
users in a relatively small geographical area to exchange files and messages, as well
as access shared resources such as file servers and printers.
Today, high-speed LANs and switched internet works are becoming widely used,
largely because they operate at very high speeds and support such high-bandwidth
applications as multimedia and videoconferencing.
Internetworking Challenges
Because companies rely heavily on data communication, internet works must provide
a certain level of reliability. This is an unpredictable world; so many large internet
works include redundancy to allow for communication even when problems occur.
Early in the year 2000, many major web sites were the victims of distributed denial of
service (DDOS) attacks. These attacks were possible because a great number of
private networks currently connected with the Internet were not properly secured.
These private networks were used as tools for the attackers.
Because nothing in this world is stagnant, internet works must be flexible enough to
change with new demands
Broadcast
Subnets
A TCP/IP network can have a lot of traffic flowing across it at any given
time. In large networks the flow of information can be too much, causing
bottlenecks and congestion that essentially bogs the network down to the
point it is ineffective. To alleviate this, a network will be divided into
smaller networks called subnets.
Broadcast traffic
Broadcasting is the nature of TCP/IP traffic. When a router receives a packet with a
destination address it is do not know, the packet is broadcast everywhere on the
network.
Simply put, a broadcast will occur when a router receives a packet, looks at the
destination, realizes it does not know where to find this destination, and asks the
other routers, "Do you know this address?" One router will respond, and a route for
that address will be created.
The portion of the network that can receive the broadcast is called a broadcast
domain. In a large network the broadcast domain is the entire network. If each
computer on the network is sending packets, this can cause electronic gridlock fairly
quickly because a copy of each packet is sent to every computer on the network
even if it was not meant to receive it.
As an extension of the switch, which logically divides a network, a large network can
be manually divided into smaller networks so that broadcasting is limited to the small
sections. These smaller networks are called subnets.
Subnets are created by configuring the IP addresses for all the computers in the
subnet to be similar to each other, but different from other subnets. The different
subnets are kept separate by using a subnet mask. A subnet mask filters IP
addresses allowing computers with specific IP addresses to talk to each other directly
yet other computers will not hear their broadcast traffic. With a large network divided
into many smaller networks, how can they all be connected so they could talk to each
other?
A backbone is a high capacity, high bandwidth connection that is used to connect the
many subnets of a large network. If we connect all the subnets together how will they
communicate without broadcasting traffic again? The backbone uses routers to limit
broadcast traffic to the subnet while still connecting computers in different subnets
together. A router is an intelligent device that has the ability to find a path from a
computer in one subnet to a target computer in a different subnet and connect the
two without any broadcast traffic from the subnet leaking out into the backbone.
By using subnets, backbones, and routers it is possible for a large network to operate
efficiently without any bottlenecks or congestion.
Network topology
In telecommunication, network topology is the specific physical (i.e. real) or logical
(i.e. virtual) arrangement of the elements of a network.
The common types of network topology are illustrated and defined below.
A bus topology is a network topology in which there is a single line (the bus) to which
all nodes are connected, and the nodes connect only to this bus.
linear topology: See bus topology.
mesh topology: A network topology in which there are at least two nodes with two or
more paths between them.
ring topology: A network topology in which every node has exactly two branches
connected to it.
The failure of a transmission line linking any peripheral node to the central node will
result in the isolation of that peripheral node from all others.
If the star central node is passive, the originating node must be able to tolerate the
reception of an echo of its own transmission, delayed by the two-way transmission
time (i.e. to and from the central node) plus any delay generated in the central node.
An active star network has an active central node that usually has the means to
prevent echo-related problems.
tree topology: A network topology in which the nodes are arranged as a tree. From a
purely topologic viewpoint, this resembles an interconnection of star networks in that
individual peripheral nodes (i.e. leaves) are required to transmit to and receive from
one other node only and are not required to act as repeaters or regenerators. Unlike
the star network, the function of the central node may be distributed.
As in the conventional star network, individual nodes may thus still be isolated from
the network by a single-point failure of a transmission path to the node. If a link
connecting a leaf fails, that leaf is isolated; if a connection to a non-leaf node fails, an
entire section of the network becomes isolated from the rest.
To k e n Ring/IEEE 802.5
The Token Ring network was originally developed by IBM in the 1970s. It is still IBM's
primary local-area network (LAN) technology. The related IEEE 802.5 specification is
almost identical to and completely compatible with IBM's Token Ring network. In fact,
the IEEE 802.5 specification was modelled after IBM Token Ring, and it continues to
shadow IBM's Token Ring development. The term Token Ring generally is used to refer
to both IBM's Token Ring network and IEEE 802.5 networks. This chapter addresses
both Token Ring and IEEE 802.5.
Token Ring and IEEE 802.5 networks are basically compatible, although the
specifications differ in minor ways. IBM's Token Ring network specifies a star, with all
end stations attached to a device called a multi-station access unit (MSAU). In
contrast, IEEE 802.5 does not specify a topology, although virtually all IEEE 802.5
implementations are based on a star. Other differences exist, including media type
(IEEE 802.5 does not specify a media type, although IBM Token Ring networks use
twisted-pair wire) and routing information field size. The following figure summarizes
IBM Token Ring network and IEEE 802.5 specifications.
MSAUs Can Be Wired Together to Form One Large Ring in an IBM Token
Ring Network
To k e n Ring Operation
Token Ring and IEEE 802.5 are two principal examples of token-passing networks
(FDDI is the other). Token-passing networks move a small frame, called a token,
around the network. Possession of the token grants the right to transmit. If a node
receiving the token has no information to send, it passes the token to the next end
station. Each station can hold the token for a maximum period of time.
If a station possessing the token does have information to transmit, it seizes the
token, alters 1 bit of the token (which turns the token into a start-of-frame sequence),
appends the information that it wants to transmit, and sends this information to the
next station on the ring. While the information frame is circling the ring, no token is
on the network (unless the ring supports early token release), which means that
other stations wanting to transmit must wait. Therefore, collisions cannot occur in
Token Ring networks. If early token release is supported, a new token can be released
when frame transmission is complete.
The information frame circulates the ring until it reaches the intended destination
station, which copies the information for further processing. The information frame
continues to circle the ring and is finally removed when it reaches the sending
station. The sending station can check the returning frame to see whether the frame
was seen and subsequently copied by the destination.
Priority System
Token Ring networks use a sophisticated priority system that permits certain user-
designated, high-priority stations to use the network more frequently. Token Ring
frames have two fields that control priority: the priority field and the reservation field.
Only stations with a priority equal to or higher than the priority value contained in a
token can seize that token. After the token is seized and changed to an information
frame, only stations with a priority value higher than that of the transmitting station
can reserve the token for the next pass around the network. When the next token is
generated, it includes the higher priority of the reserving station. Stations that raise a
token's priority level must reinstate the previous priority after their transmission is
complete.
Fault-Management Mechanisms
Token Ring networks employ several mechanisms for detecting and compensating for
network faults. For example, one station in the Token Ring network is selected to be
the active monitor. This station, which potentially can be any station on the network,
acts as a centralized source of timing information for other ring stations and performs
a variety of ring-maintenance functions. One of these functions is the removal of
continuously circulating frames from the ring. When a sending device fails, its frame
may continue to circle the ring. This can prevent other stations from transmitting
their own frames and essentially can lock up the network. The active mo nitor can
detect such frames, remove them from the ring, and generate a new token.
The IBM Token Ring network's star topology also contributes to overall network
reliability. Because all information in a Token Ring network is seen by active MSAUs,
these devices can be programmed to check for problems and selectively remove
stations from the ring, if necessary.
A Token Ring algorithm called beaconing detects and tries to repair certain network
faults. Whenever a station detects a serious problem with the network (such as a
cable break), it sends a beacon frame, which defines a failure domain. This domain
includes the station reporting the failure, its nearest active upstream neighbour
(NAUN), and everything in between. Beaconing initiates a process called auto
reconfiguration, in which nodes within the failure domain automatically perform
diagnostics in an attempt to reconfigure the network around the failed areas.
Physically, the MSAU can accomplish this through electrical reconfiguration.
Frame Format
Token Ring and IEEE 802.5 support two basic frame types: tokens and data/command
frames. Tokens are 3 bytes in length and consist of a start delimiter, an access
control byte, and an end delimiter. Data/command frames vary in size, depending on
the size of the Information field. Data frames carry information for upper-layer
protocols, while command frames contain control information and have no data for
upper-layer protocols. Both formats are shown in the following figures.
IEEE 802.5 and Token Ring Specify Tokens and Data/Command Frames
To k e n Frame Fields
The three token frame fields illustrated in above figures are summarized in the
descriptions that follow:
Data/command frames have the same three fields as Token Frames, plus several
others.
The Data/command frame fields illustrated in above figures are described in the
following summaries:
Summary
Token Ring technology was developed in the 1970s by IBM. Token-passing networks
move a small frame, called a token, around the network. Possession of the token
grants the right to transmit. If a node receiving the token has no information to send,
it passes the token to the next end station. Each station can hold the token for a
maximum period of time.
If a station possessing the token does have information to transmit, it seizes the
token, alters 1 bit of the token (which turns the token into a start-of-frame sequence),
appends the information that it wants to transmit, and sends this information to the
next station on the ring.
Invention of Ethernet
“In late 1972, Metcalfe and his Xerox PARC colleagues developed the first
experimental Ethernet system to interconnect the Xerox Alto, a personal workstation
with a graphical user interface. The experimental Ethernet was used to link Altos to
one another, and to servers and laser printers. The signal clock for the experimental
Ethernet interface was derived from the Alto's system clock, which resulted in a data
transmission rate on the experimental Ethernet of 2.94 Mbps.
Metcalfe's first experimental network was called the Alto Aloha Network. In 1973
Metcalfe changed the name to "Ethernet," to make it clear that the system could
support any computer--not just Altos--and to point out that his new network
mechanisms had evolved well beyond the Aloha system. He chose to base the name
on the word "ether" as a way of describing an essential feature of the system: the
physical medium (i.e., a cable) carries bits to all stations, much the same way that
the old "aluminiferous ether" was once thought to propagate electromagnetic waves
through space. Thus, Ethernet was born.”
This chapter provides a brief tutorial on the Ethernet system. We'll begin with the
origins of Ethernet and the Ethernet standards, and then describe the essential
features of Ethernet operation.
The 10-Mbps Ethernet media varieties include the original thick coaxial system, as
well as thin coaxial, twisted-pair, and fiber optic systems. The most recent Ethernet
standard defines the new 100-Mbps Fast Ethernet system which operates over
twisted-pair and fiber optic media.
Ethernet was invented at the Xerox Palo Alto Research Centre in the 1970s by Dr.
Robert M. Metcalfe. It was designed to support research on the "office of the future,"
which included one of the world's first personal workstations, the Xerox Alto. The first
Ethernet system ran at approximately 3-Mbps and was known as "experimental
Ethernet."
Formal specifications for Ethernet were published in 1980 by a multi-vendor
consortium that created the DEC-Intel-Xerox (DIX) standard. This effort turned the
experimental Ethernet into an open, production-quality Ethernet system that
operates at 10-Mbps. Ethernet technology was then adopted for standardization by
the LAN standards committee of the Institute of Electrical and Electronics Engineers
(IEEE 802).
The IEEE standard was first published in 1985, with the formal title of "IEEE 802.3
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) Access Method and
Physical Layer Specifications." The IEEE standard has since been adopted by the
International Organization for Standardization (ISO), which makes it a worldwide
networking standard.
The IEEE standard provides an "Ethernet like" system based on the original DIX
Ethernet technology. All Ethernet equipment since 1985 is built according to the IEEE
802.3 standard, which is pronounced "eight oh two dot three." To be absolutely
accurate, then, we should refer to Ethernet equipment as "IEEE 802.3 CSMA/CD"
technology. However, most of the world still knows it by the original name of
Ethernet, and that's what we'll call it as well.
The 802.3 standard is periodically updated to include new technology. Since 1985 the
standard has grown to include new media systems for 10-Mbps Ethernet (e.g.
twisted-pair media), as well as the latest set of specifications for 100-Mbps Fast
Ethernet.
The Ethernet system consists of three basic elements: 1. the physical medium used
to carry Ethernet signals between computers, 2. a set of medium access control rules
embedded in each Ethernet interface that allow multiple computers to fairly arbitrate
access to the shared Ethernet channel, and 3. an Ethernet frame that consists of a
standardized set of bits used to carry data over the system.
The following chapters describe the configuration rules for the first element, the
physical media segments. Next we'll take a quick look at the second and third
elements; the set of medium access control rules in Ethernet, and the Ethernet
frame.
Operation of Ethernet
After each frame transmission, all stations on the network must contend equally for
the next frame transmission opportunity. This ensures that access to the network
channel is fair, and that no single station can lock out the other stations. Access to
the shared channel is determined by the medium access control (MAC) mechanism
embedded in the Ethernet interface located in each station. The medium access
control mechanism is based on a system called Carrier Sense Multiple Access with
Collision Detection (CSMA/CD).
- Collisions
E t h e r n e t F r a m e a n d E t h e r n e t A d d r e s s e s
The heart of the Ethernet system is the Ethernet frame, which is used to deliver data
between computers. The frame consists of a set of bits organized into several fields.
These fields include address fields, a variable size data field that carries from 46 to
1,500 bytes of data, and an error checking field that checks the integrity of the bits in
the frame to make sure that the frame has arrived intact.
The first two fields in the frame carry 48-bit addresses, called the destination and
source addresses. The IEEE controls the assignment of these addresses by
administering a portion of the address field. The IEEE does this by providing 24-bit
identifiers called "Organizationally Unique Identifiers" (OUIs), since a unique 24-bit
identifier is assigned to each organization that wishes to build Ethernet interfaces.
The organization, in turn, creates 48-bit addresses using the assigned OUI as the first
24 bits of the address. This 48-bit address is also known as the physical address,
hardware address, or MAC address.
As each Ethernet frame is sent onto the shared signal channel, all Ethernet interfaces
look at the first 48-bit field of the frame, which contains the destination address. The
interfaces compare the destination address of the frame with their own address. The
Ethernet interface with the same address as the destination address in the frame will
read in the entire frame and deliver it to the networking software running on that
computer. All other network interfaces will stop reading the frame when they discover
that the destination address does not match their own address