Translate

Sunday, October 2, 2016

LAN TECHNOLOGY



LAN TECHNOLOGY
We examine local area networks (LANs) and metropolitan area net-
Work (MANs). These networks share the characteristic of being packet broad
Casting networks. With a broadcast communications network, each station is
attached to a transmission medium shared by other stations. In its simplest form, a
transmission from any one station is broadcast to and received by all other stations.
As with packet-switched networks, transmission on a packet broadcasting network
is in the form of packets. Table 12.1 provides useful definitions of LANs and MANs,
taken from one of the IEEE 802 standards documents.
This lesson begins our discussion of LAN? with a description of the protocol
architecture that is in common use for implementing LANs. This architecture is
also the basis of standardization efforts. Our overview covers the physical, medium
access control (MAC), and logical link control (LLC) levels.
Following this overview, the lesson focuses on aspects of LAN technology.
The key technology ingredients that determine the nature of a LAN or MAN are
*Topology
*Transmission medium
* Medium access control technique

LAN ARCHITECTURE
The architecture of a LAN is best described in terms of a layering of protocols that
organize the basic functions of a LAN. This lesson opens with a descriptioi of the
standardized protocol architecture for LANs, which encompasses physical, medium
access control, and logical link control layers. Each of these layers is then examined
in turn.
Protocol Architecture
Protocols defined specifically for LAN and MAN transmission address issues relating
to the transmission of blocks of data over the network. In OSI terms, higherlayer
protocols (layer 3 or 4 and above) are independent of network architecture
and are applicable to LANs, MANs, and WANs. Thus, a discussion of LAN protocols
is concerned principally with lower layers of the OSI model.
Figure 12.1 relates the LAN protocols to the OSI architecture (first introduced
in Figure 1.10). This architecture was developed by the IEEE 802 committee
and has been adopted by all organizations working on the specification of LAN
standards. It is generally referred to as the IEEE 802 reference model.

The LANs described herein are distinguished from other types of data networks in that they are
optimized for a moderate size geographic area such as a single office building, a warehouse, or a campus.
The IEEE 802 LAN is a shared medium peer-to-peer communications network that broadcasts information
for all stations to receive. As a consequence, it does not inherently provide privacy. The LAN
enables stations to communicate directly using a common physical medium on a point-to-point basis
without any intermediate switching node being required. There is always need for an access sublayer in
order to arbitrate the access to the shared medium. The network is generally owned, used, and operated
by a single organization. This is in contrast to Wide Area Networks (WANs) that interconnect communication
facilities in different parts of a country or are used as a public utility. These LANs are also different
from networks, such as backplane buses, that are optimized for the interconnection of devices on
a desk top or components within a single piece of equipment.
A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks of
buildings to entire cities. As with local networks, MANs can also depend on communications channels
of moderate-to-high data rates. Error rates and delay may be slightly higher than might be obtained on
a LAN. A MAN might be owned and operated by a single organization, but usually will be used by many
individuals and organizations. MANs might also be owned and operated as public utilities. They will
often provide means for internetworking of local networks. Although not a requirement for all LANs,
the capability to perform local networking of integrated voice and data (IVD) devices is considered an
optional function for a LAN. Likewise, such capabilities in a network covering a metropolitan area are
optional functions of a MAN.
* From IEEE 802 Standard, Local and Metropolitan Area Networks: Overview and Architecture, 1990.
Working from the bottom up, the lowest layer of the IEEE 802 reference
model corresponds to the physical layer of the OSI model, and includes such functions
as
Encodingldecoding of signals
Preamble generationlremoval (for synchronization)
Bit transmissionlreception
In addition, the physical layer of the 802 model includes a specification of the transmission
medium and the topology. Generally, this is considered below the lowest
layer of the OSI model. However, the choice of transmission medium and topology
is critical in LAN design, and so a specification of the medium is included.
Above the physical layer are the functions associated with providing service to
LAN users. These include
On transmission, assemble data into a frame with address and error-detection
fields.
On reception, disassemble frame, perform address recognition and error
detection.
Govern access to the LAN transmission medium.
Provide an interface to higher layers and perform flow and error control.
These are functions typically associated with OSI layer 2. The set of functions
in the last bulleted item are grouped into a logical link control (LLC) layer. The
functions in the first three bullet items are treated as a separate layer, called
medium access control (MAC). The separation is done for the following reasons:
The logic required to manage access to a shared-access medium is not found
in traditional layer-2 data link control.
For the same LLC, several MAC options may be provided.
The standards that have been issued are illustrated in Figure 12.2. Most of the
standards were developed by a committee known as IEEE 802, sponsored by the
Institute for Electrical and Electronics Engineers. All of these standards have subsequently
been adopted as international standards by the International Organization
for Standardization (ISO).
Figure 12.3 illustrates the relationship between the levels of the architecture
(compare Figure 9.17). User data are passed down to LLC, which appends control
information as a header, creating an LLC protocol data unit (PDU). This control
information is used in the operation of the LLC protocol. The entire LLC PDU is
then passed down to the MAC layer, which appends control information at the
front and back of the packet, forming a MAC frame. Again, the control information
in the frame is needed for the operation of the MAC protocol. For context, the figure
also shows the use of TCPIIP and afi application layer above the LAN protocols.
Topologies
For the physical layer, we confine our discussion for now to an introduction of the
basic LAN topologies. The common topologies for LANs are bus, tree, ring, and
star (Figure 12.4). The bus is a special case of the tree, with only one trunk and no
branches; we shall use the term busltree when the distinction is unimportant.
Bus and Tree Topologies
Both bus and tree topologies are characterized by the use of a multipoint medium.
For the bus, all stations attach, through appropriate hardware interfacing known as
a tap, directly to a linear transmission medium, or bus. Full-duplex operation
between the station and the tap allows data to be transmitted onto the bus and
received from the bus. A transmission from any station propagates the length of the
medium in both directions and can be received by all other stations. At each end of
the bus is a terminator, which absorbs any signal, removing it from the bus.
The tree topology is a generalization of the bus topology. The transmission
medium is a branching cable with no closed loops. The tree layout begins at a point
known as the headend, where one or more cables start, and each of these may have
branches. The branches in turn may have additional branches to allow quite complex
layouts. Again, a transmission from any station propagates throughout the
medium and can be received by all other stations.
Two problems present themselves in this arrangement. First, because a transmission
from any one station can be received by all other stations, there needs to be
some way of indicating for whom the transmission is intended. Second, a mechanism
is needed to regulate transmission. To see the reason for this, consider that if
two stations on the bus attempt to transmit at the same time, their signals will overlap
and become garbled. Or, consider that one station decides to transmit continuously
for a long period of time.
To solve these problems, stations transmit data in small blocks, known as
frames. Each frame consists of a portion of the data that a station wishes to transmit,
plus a frame header that contains control information. Each station on the bus
is assigned a unique address, or identifier, and the destination address for a frame
is included in its header.
Figure 12.5 illustrates the scheme. In this example, station C wishes to transmit
a frame of data to A. The frame header includes A's address. As the frame
propagates along the bus, it passes B, which observes the address and ignores the
frame. A, on the other hand, sees that the frame is addressed to itself and therefore
copies the data from the frame as it goes by.
So the frame structure solves the first problem mentioned above: It provides
a mechanism for indicating the intended recipient of data. It also provides the basic
tool for solving the second problem, the regulation of access. In particular, the stations
take turns sending frames in some cooperative fashion; this involves putting
additional control information into the frame header.
With the bus or tree, no special action needs to be taken to remove frames
from the medium. When a signal reaches the end of the medium, it is absorbed by
the terminator.
Ring Topology
In the ring topology, the network consists of a set of repeaters joined by point-topoint
links in a closed loop. The repeater is a comparatively simple device, capable
of receiving data on one link and transmitting them, bit by bit, on the other link as
fast as they are received, with no buffering at the repeater. The links are unidirectional;
that is, data are transmitted in one direction only and all are oriented in
the same way. Thus, data circulate around the ring in one direction (clockwise or
counterclockwise).
Each station attaches to the network at a repeater and can transmit data onto
the network through that repeater.
As with the bus and tree, data are transmitted in frames. As a frame circulates
past all the other stations, the destination station recognizes its address and copies
the frame into a local buffer as it goes by. The frame continues to circulate until it
returns to the source station, where it is removed (Figure 12.6).
Because multiple stations share the ring, medium access control is needed to
determine at what time each station may insert frames.
Star Topology
In the star LAN topology, each station is directly connected to a common central
node. Typically, each station attaches to a central node, referred to as the star coupler,
via two point-to-point links, one for transmission and one for reception.
In general, there are two alternatives for the operation of the central node.
One approach is for the central node to operate in a broadcast fashion. A transmission
of a frame from one station to the node is retransmitted on all of the outgoing
links. In this case, although the arrangement is physically a star, it is logically a bus;
a transmission from any station is received by all other stations, and only one station
at a time may successfully transmit.
Another approach is for the central node to act as a frame switching device.
An incoming frame is buffered in the node and then retransmitted on an outgoing
link to the destination station.
Medium Access Control
All LANs and MANS consist of collections of devices that must share the network's
transmission capacity. Some means of controlling access to the transmission
medium is needed to provide for an orderly and efficient use of that capacity. This
is the function of a medium access control (MAC) protocol.
The key parameters in any medium access control technique are where and
how. Where refers to whether control is exercised in a centralized or distributed
fashion. In a centralized scheme, a controller is designated that has the authority to
grant access to the network. A station wishing to transmit must wait until it receives
permission from the controller. In a decentralized network, the stations collectively
perform a medium access control function to dynamically determine the order in
which stations transmit. A centralized scheme has certain advantages, such as the
following:
It may afford greater control over access for providing such things as priorities,
overrides, and guaranteed capacity.
It enables the use of relatively simple access logic at each station.
It avoids problems of distributed coordination among peer entities.
The principal disadvantages of centralized schemes are
It creates a single point of failure; that is, there is a point in the network that,
if it fails, causes the entire network to fail.
It may act as a bottleneck, reducing performance.
The pros and cons of distributed schemes are mirror images of the points
made above.
The second parameter, how, is constrained by the topology and is a trade-off
among competing factors, including cost, performance, and complexity. In general,
we can categorize access control techniques as being either synchronous or asynchronous.
With synchronous techniques, a specific capacity is dedicated to a connection;
this is the same approach used in circuit switching, frequency-division mul
tiplexing (FDM), and synchronous time-division multiplexing (TDM). Such techniques
are generally not optimal in LANs and MANS because the needs of the stations
are unpredictable. It is preferable to be able to allocate capacity in an asynchronous
(dynamic) fashion, more or less in response to immediate demand. The
asynchronous approach can be further subdivided into three categories: round
robin, reservation, and contention.
Round Robin
With round robin, each station in turn is given the opportunity to transmit. During
that opportunity, the station may decline to transmit or may transmit subject to a
specified upper bound, usually expressed as a maximum amount of data transmitted
or time for this opportunity. In any case, the station, when it is finished, relinquishes
its turn, and the right to transmit passes to the next station in logical
sequence. Control of sequence may be centralized or distributed. Polling is an
example of a centralized technique.
When many stations have data to transmit over an extended period of time,
round robin techniques can be very efficient. If only a few stations have data to
transmit over an extended period of time, then there is a considerable overhead in
passing the turn from station to station, as most of the stations will not transmit but
simply pass their turns. Under such circumstances, other techniques may be preferable,
largely depending on whether the data traffic has a stream or bursty characteristic.
Stream traffic is characterized by lengthy and fairly continuous transmissions;
examples are voice communication, telemetry, and bulk file transfer. Bursty
traffic is characterized by short, sporadic transmissions; interactive terminal-host
traffic fits this description.
Reservation
For stream traffic, reservation techniques are well suited. In general, for these techniques,
time on the medium is divided into slots, much as with synchronous TDM.
A station wishing to transmit reserves future slots for an extended or even an indefinite
period. Again, reservations may be made in a centralized or distributed
fashion.
Contention
For bursty traffic, contention techniques are usually appropriate. With these techniques,
no control is exercised to determine whose turn it is; all stations contend for
time in a way that can be, as we shall see, rather rough and tumble. These techniques
are, of necessity, distributed by nature. Their principal advantage is that they
are simple to implement and, under light to moderate load, efficient. For some of
these techniques, however, performance tends to collapse under heavy load.
Although both centralized and distributed reservation techniques have been
implemented in some LAN products, round robin and contention techniques are
the most common.
The discussion above has been somewhat abstract and should become clearer
as specific techniques are discussed in Lesson 13. For future reference, Table 12.2
lists the MAC protocols that are defined in LAN and MAN standards.

No comments:

Post a Comment

silahkan membaca dan berkomentar