54
1 Chapter 6. Local Area Networks Business Data Communications and Networking Fitzgerald and Dennis, 7th Edition Copyright © 2002 John Wiley & Sons, Inc.

Chapter6

Embed Size (px)

Citation preview

Page 1: Chapter6

1

Chapter 6. Local Area Networks

Business Data Communications and Networking Fitzgerald and Dennis,

7th EditionCopyright © 2002 John Wiley & Sons, Inc.

Page 2: Chapter6

2

Chapter 6. Learning Objectives

• Be aware of the roles of LANs in organizations

• Understand the major components of LANs• Understand traditional Ethernet LANs• Understand switched Ethernet LANs• Understand wireless Ethernet LANs• Be aware of other wireless LAN technologies • Be familiar with how to improve LAN

performance

Page 3: Chapter6

3

Chapter 6. Outline• Introduction

– Why use a LAN? Dedicated servers vs. Peer-to-peer LANs

• LAN Components– NICs, Cables, Hubs and Network Operating Systems

• Traditional Ethernet (IEEE 802.3)– Topology, Media Access Control, Ethernet Types

• Switched Ethernet– Topology, Media Access Control, Performance Benefits

• Wireless LANs (IEEE 802.11)– Topology, Media Access Control, Wireless Ethernet Types

• Other Wireless Technologies– Infrared Wireless, Bluetooth

• Improving LAN Performance– Improving Server Performance, Improving Circuit Capacity, Reducing

Network Demand

Page 4: Chapter6

4

Introduction

Page 5: Chapter6

5

Why use a LAN?

• There are two main benefits to using a local area network: information sharing and resource sharing.

• Examples of information sharing include file sharing, exchanging e-mail, and using the Internet.

• Examples of resource sharing include sharing hardware and software, such as sharing an expensive printer.

• Another important resource sharing technique is to purchase software on a per seat basis. For example, only purchasing a 10-seat license for a software program on a 20 client network instead of purchasing 20 copies of the same program.

Page 6: Chapter6

6

Dedicated Server Networks

• A basic LAN dichotomy exists between dedicated server LANs and peer-to-peer LANs which don’t have servers. Since 90% of all LANs have a dedicated server, this chapter mostly focuses on server-based LANs.

• A dedicated server is a computer that is permanently assigned a specific server task such as being a Web server, e-mail server, file server or printer server.

• Servers also run a special operating system called a server network operating system.

• When many servers are part of a network, it can be referred to as a server farm.

Page 7: Chapter6

7

Peer-to-Peer Networks• Peer-to-peer networks do not use dedicated servers. • Any computer on a peer-to-peer network can act as

both a client, accessing resources or information on other computers on the network, or as a server, allowing access to attached information or resources.

• Peer-to-peer networks tend to be small networks. • The main advantage of peer-to-peer networking is

lower cost since there is no dedicated server, generally the most expensive network component.

• The main disadvantage is that peer-to-peer networks are generally slower than dedicated server networks, since each computer is less powerful and may be in use as a client and a server at the same time.

Page 8: Chapter6

8

LAN Components

Page 9: Chapter6

9

Basic LAN Components (Figure 6-1)

• The six basic LAN components are:

1. Clients

2. Servers

3. Network Interface Cards

4. Network Cables

5. Hubs and Switches

6. Network Operating System• The first two were discussed in chapter 2, the rest will

be discussed in this chapter.

Page 10: Chapter6

10

Figure 6-1. Basic LAN Components

Page 11: Chapter6

11

Network Interface Cards

• Network interface cards, also called network cards and network adapters include a cable socket allowing computers to be connected to the network.

• NICs are part of both the physical and data link layer and include a unique data link layer address (sometimes called a MAC address), placed in them by their manufacturer.

• Before sending data onto the network, the network card also organizes data into frames and then sends them out on the network.

• Notebook computers often use NICs that are plugged into the PCMCIA port.

Page 12: Chapter6

12

Network Cables

• Each computer is physically connected to the network using a cable.

• These cables are either untwisted wire pairs (UTP, the most common choice), shielded twisted pair (STP), coaxial cable, or optical fiber.

• Wireless LANs use radio frequencies or infrared light instead of cables.

• Sometimes two different types of cabling can be linked using a special connector. A BALUN (Balanced-Unbalanced) is one such device that connects UTP and Coaxial Cable.

Page 13: Chapter6

13

Hubs

• Hubs act as junction boxes, linking cables from several computers on a network. Hubs are usually sold with 4, 8, 16 or 24 ports.

• Some hubs allow connection of more than one kind of cabling, such as UTP and coax.

• Hubs also repeat (reconstruct and strengthen) incoming signals. This is important since all signals become weaker with distance.

• The maximum LAN segment distance for a cable can therefore be extended using hubs.

Page 14: Chapter6

14

Figure 6-2. Network Hub

Page 15: Chapter6

15

Network Operating Systems

• The NOS is the software that runs the LAN. It comes in two types: Server NOSs & Client NOSs.

• Server NOSs enable server to execute and respond to the requests sent to them as web server, print servers, file servers, etc.

• Client NOS functions are typically included in most OS packages such as Windows 98 and Windows 2000.

Page 16: Chapter6

16

Network Profiles

• The network profile specifies what resources on each server are available to the network for use by other computers, including data files, printers, etc.

• Devices that are not included in the network profile can not be used over the network.

• User profiles describe what each user on a LAN has access to.

• Most LANs also use auditing software which keeps track of which user has accessed what network resource.

Page 17: Chapter6

17

Traditional Ethernet (IEEE 802.3)

Page 18: Chapter6

18

Ethernet (IEEE 802.3)

• Almost all LANs today use Ethernet

• Originally, Ethernet was jointly developed by a consortium of Digital Equipment Corp., Intel and Xerox and was standardized as IEEE 802.3.

• Ethernet LANs that use hubs are sometimes called shared Ethernet.

Page 19: Chapter6

19

Shared Ethernet Topology (Figure 6-3)• Ethernet’s logical topology is a bus topology. • This means all computers on the network receive

messages from all other computers, whether the message is intended for those computers or not.

• When a frame is received by a computer, the first task is to read the frame’s destination address to see if the message is meant for it or not.

• Although, a decade ago most Ethernet LANs used a physical bus, almost all Ethernets today use a physical star topology, with the network’s computers linked into hubs.

• It is also common to link use multiple hubs to form more complex physical topologies (Figure 6-4).

Page 20: Chapter6

20Figure 6-3 Ethernet Topology

Page 21: Chapter6

21

Figure 6-4 Multiple Hub Ethernet Design

Page 22: Chapter6

22

Media Access Control

• Ethernet’s medium access control protocol, called CSMA/CD, is contention-based

• With a contention-based protocol, frames can be sent by two computers on the same network at the same time, in which case they will collide and become garbled.

• CSMA/CD, can thus be termed “ordered chaos” because it tolerates, rather than avoids, collisions caused by two computers transmitting at the same time.

Page 23: Chapter6

23

CSMA/CD

• Stands for: Carrier Sense Multiple Access w/ Collision Detect

• Carrier Sense: computers listen to the network to see if another computer is transmitting before sending anything themselves.

• Multiple Access: all computers have access to the network medium.

• Collision Detect: if they detect a collision (CD), they then wait a random amount of time and resend the frame (It has to be random in order to avoid another collision).

Page 24: Chapter6

24

Ethernet Physical Media Standards• Ethernet Media are formatted as follows:

[Value1]Base/Broad[Value2]• Value 1: Data Rate for Medium 10 = 10Mbps• Base or Broad

– Base = Baseband Mode meaning only one (digital) channel

– Broad = Broadband (analog) cable transmissions use more than one channel (e.g., cable TV)

• Value2: (relates to maximum distance possible in hundreds of meters or cable type T= twisted pair, F =fiber)

Page 25: Chapter6

25

Types of Ethernet (Figure 6-5)

• Seven types of shared Ethernet have been in use:• 10Base5 = thick Ethernet, uses thick coax. This is the original Ethernet

specification. Now uncommon.

• 10Base2 = thin Ethernet, uses thin coax. Became popular in the early 1990s as a cheaper alternative to 10Base5. Now uncommon.

• 10BaseT = twisted pair Ethernet, most common type of Ethernet. Uses Cat 3 and Cat 5 UTP. Common but rapidly losing ground to 100BaseT.

• 100BaseT = also called Fast Ethernet, has replaced 10BaseT in sales volume. Uses Cat 5 UTP (Sometimes combined 10/100 Ethernet is found in which some segments run 10BaseT and some run 100BaseT is also used by some organizations).

• 1000BaseT = Gigabit Ethernet. Maximum cable length is only 100 meters.

• 10GbE = 10 Gbps Ethernet. Uses fiber and is typically full duplex.

• 40GbE = 40 Gbps Ethernet. Uses fiber and is typically full duplex.

Page 26: Chapter6

26

1.       

Name Maximum Data Rate

 Cables

10Base5 10 Mbps Coaxial

10Base2 10 Mbps Coaxial

10BaseT 10 Mbps UTP cat 3, UTP cat 5

100BaseT 100 Mbps UTP cat 5, fiber

1000BaseX 1 Gbps UTP cat 5, UTP cat 5e, UTP cat 6, fiber

10 GbE 10 Gbps UTP cat 5e, UTP cat 6, UTP cat 7, fiber

40 GbE 40 Gbps fiber

Figure 6-5 Types of Ethernet

Page 27: Chapter6

27

Switched Ethernet

Page 28: Chapter6

28

Switched Ethernet Topology

• Switched Ethernet uses switches instead of hubs.

• While a hub broadcasts frames to all ports, the switch reads the destination address of the frame and only sends it to the corresponding port.

• The effect is to turn the network into a group of point-to-point circuits and to change the logical topology of the network from a bus to a star.

Page 29: Chapter6

29

Basic Switch Operation• Switches make forwarding decisions based on forwarding

tables (similar to routing tables). • When a frame is received, the switch reads its [data link

layer] destination address and sends the frame out the corresponding port in its forwarding table.

• Switches making switching decisions based on data link layer addresses are called layer-2 switches.

• When a switch is first turned on, its forwarding table is empty. It then learns which ports correspond to which computers by reading the source addresses of the incoming frames along with the port number that the frame arrived on.

• If the switch’s forwarding table does not have the destination address of the frame, it broadcasts the frame to all ports.

• Thus, a switch starts by working like a hub and then works more and more as a switch as it fills its forwarding table.

Page 30: Chapter6

30

Media Access Control

• Switched Ethernet still uses CSMA/CD media access control, but collisions are less likely as each network segment operates independently.

• The network’s modified topology also allows multiple messages to be sent at one time.

• For example, computer A can send a message to computer B at the same time that computer C sends one to computer D.

• If two computers send frames to the same destination at the same time, the switch stores the second frame in memory until it has finished sending the first, then forwards the second.

Page 31: Chapter6

31

Figure 6-6 802.3 Ethernet versus switched Ethernet

Page 32: Chapter6

32

Performance Benefits

• Switched Ethernet can dramatically improve network performance.

• Shared Ethernet 10BaseT networks are only capable of using about 50% of capacity before collisions are a problem

• Switched Ethernet, however, runs at up to 95% capacity on 10BaseT.

• Another performance improvement can be made by using a 10/100 switch that uses a 100BaseT connection for the server(s) and/or routers, i.e., the network segments experiencing the highest volume of LAN traffic.

Page 33: Chapter6

33

Wireless Ethernet (IEEE 802.11)

Page 34: Chapter6

34

Wireless Ethernet (IEEE 802.11)

• Wireless LANs dispense with cables and use radio or infrared frequencies to transmit signals through the air.

• WLANs are growing in popularity because they eliminate cabling and facilitate network access from a variety of locations and for mobile workers (as in a hospital).

• The most common wireless networking standard is IEEE 802.11, often called Wireless Ethernet or Wireless LAN.

Page 35: Chapter6

35

Wireless LAN Topology

• WLAN topologies are the same as on Ethernet: physical star, logical bus (Figure 6-7).

• Wireless LAN devices use the same radio frequencies, so they must take turns using the network.

• Instead of hubs, WLANs use devices called access points (AP). Maximum transmission range is about 100-500 feet. Usually a set of APs are installed making wireless access possible in several areas in a building or corporate campus.

• Each WLAN computer uses an NIC that transmits radio signals to the AP.

• Because of the ease of access, security is a potential problem, so IEEE 802.11 uses 40-bit data encryption to prevent eavesdropping.

Page 36: Chapter6

36

Figure 6-7 A wireless Ethernet access point connected into an Ethernet Switch.

Page 37: Chapter6

37

WLAN Media Access Control

• Wireless LANs use CSMA/CA where CA = collision avoidance (CA). With CA, a station waits until another station is finished transmitting plus an additional random period of time before sending anything.

• Two different WLAN MAC techniques are now in use: the Physical Carrier Sense Method and the Virtual Carrier Sense Method.

Page 38: Chapter6

38

Physical Carrier Sense Method

• In the physical carrier sense method, a node that wants to send first listens to make sure that the transmitting node has finished, then waits a period of time longer.

• Each frame is sent using the Stop and Wait ARQ, so by waiting, the listening node can detect that the sending node has finished and can then begin sending its transmission.

• With Wireless LANs, ACK/NAK signals are sent a short time after a frame is received, while stations wishing to send a frame wait a somewhat longer time, ensuring that no collision will occur.

Page 39: Chapter6

39

Virtual Carrier Sense Method

• When a computer on a Wireless LAN is near the transmission limits of the AP at one end and another computer is near the transmission limits at the other end of the AP’s range, both computers may be able to transmit to the AP, but can not detect each other’s signals.

• This is known as the hidden node problem. When it occurs, the physical carrier sense method will not work.

• The virtual carrier sense method solves this problem by having a transmitting station first send a request to send (RTS) signal to the AP. If the AP responds with a clear to send (CTS) signal, the computer wishing to send a frame can then begin transmitting.

Page 40: Chapter6

40

Types of Wireless Ethernet

• Two forms of the IEEE 802.11b standard currently exist:• Direct Sequence Spread Spectrum (DSSS) uses the

entire frequency band to transmit information. DSSS is capable of data rates of up to 11 Mbps with fallback rates of 5.5, 2 and 1 Mbps. Lower rates are used when interference or congestion occurs.

• Frequency Hopping Spread Spectrum (FHSS) divides the frequency band into a series of channels and then changes its frequency channel about every half a second, using a pseudorandom sequence. FHSS is more secure, but is only capable of data rates of 1 or 2 Mbps.

• IEEE 802.11a is another Wireless LAN standard that is still being defined. It will operate in the 5 GHz band and be capable of data rates of up to 54 Mbps, but will probably average about 20 Mbps in practice.

Page 41: Chapter6

41

Other Wireless Technologies

Page 42: Chapter6

42

Infrared Wireless LANs

• Infrared WLANs are less flexible than IEEE 802.11 WLANs because, as with TV remote controls that are also infrared based, they require line of sight to work.

• Infrared Hubs and NICs are usually mounted in fixed positions to ensure they will hit their targets.

• The main advantage of infrared WLANs is reduced wiring.

• A new version, called diffuse infrared, operates without a direct line of sight by bouncing the infrared signal off of walls, but is only able to operate within a single room and at distances of only about 50-75 feet.

Page 43: Chapter6

43Fig. 6-9 Infrared Wireless LAN

Page 44: Chapter6

44

Bluetooth• Bluetooth is a 1 Mbps wireless standard developed

for piconets, small personal or home networks. • It may soon be standardized as IEEE 802.15.• Although Bluetooth uses the same 2.4 GHz band

as Wireless LANs it is not compatible with the IEEE 802.11 standard and so can not be used in locations that use the Wireless LANs.

• Bluetooth’s controlled MAC technique uses a master device that polls up to 8 “slave” devices.

• Examples of Bluetooth applications include; linking a wireless mouse, a telephone headset, or a Palm handheld computer to a home network.

Page 45: Chapter6

45

Improving LAN Performance

Page 46: Chapter6

46

Improving LAN Performance

• As networks become more and more intensively used, LAN performance becomes a critical issue.

• The measure of LAN Performance is throughput, i.e., the total amount of user data transmitted in a given period of time.

• LAN performance can be improved by identifying and eliminating bottlenecks, that is, points in the network where congestion is occurring because the network or device can’t handle all of the demand it is experiencing.

Page 47: Chapter6

47

Identifying Network Bottlenecks

• Two common network bottlenecks are related to server access:

• If server performance is poor when server utilization is high (>60%), then the bottleneck is the server.

• If server performance is poor during periods of low server utilization (<40%), then the bottleneck is not the server but the network circuit.

Page 48: Chapter6

48

Improving Server Performance

• Two types of server performance improvements are possible: – Software improvements such as choosing a

faster Network Operating System, fine tuning network and NOS parameters for optimal performance.

– Hardware improvements such as adding a second server, upgrading the server’s CPU, increasing its memory space, adding more hard drives or adding a second NIC to the server.

Page 49: Chapter6

49

Improving Server Performance: RAID

• Improving disk drive performance is especially important, since disk reads are the slowest task the server needs to do.

• Replacing one large drive with many small ones can improve server performance.

• RAID or Redundant Array of Inexpensive Disks, builds on this idea. RAID system can be used to both improve performance and increase reliability by building redundancy into the hard drives, so that a hard drive failure does not result in any loss of data.

Page 50: Chapter6

50

Improving Circuit Capacity

• Improving circuit capacity can be done simply by upgrading one or all segments of a network to a faster protocol (which also means upgrading the NICs), such as;– Upgrading the network from 10BaseT to 100BaseT, or – Upgrading the network segment to the server from

10BaseT to 100BaseT

• Another approach to improving circuit capacity is by increasing the number of network segments to the server. Most servers can handle several network segments simply by adding additional NIC cards, thereby increasing access to the server (see Figure 6-11).

Page 51: Chapter6

51

Fig. 6-11b Network Segmentation: a. Before b. After

Page 52: Chapter6

52

Reducing Network Demand

• Performance can also be improved by reducing network demand. This can be done by:– Moving more files, such as heavily used software

packages to client computers.– Disk caching, software on client machines can also

reduce server demand.– Moving user demands from peak times to off peak

times, by telling network users when peak usage times occur and encouraging users to not use the network as heavily during these times can also help improve performance.

– Delaying some network intensive jobs to off-peak times, such as running heavy printing jobs at night, can also improve performance.

Page 53: Chapter6

53

Figure 6-10 Improving LAN performance• Increase Server Performance

– Software: Fine-tune the NOS settings

– Hardware: • Add more servers and spread the network applications across

the servers to balance the load• Upgrade to a faster computer• Increase the server's memory• Increase the number and speed of the server's hard disk(s)• Upgrade to a faster NIC

• Increase Circuit Capacity– Upgrade to a faster circuit– Segment the network

• Reduce Network Demand– Move files from the server to the client computers– Increase the use of disk caching on client computers – Change user behavior

Page 54: Chapter6

54

End of Chapter 6