ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices

ENG224 INFORMATION TECHNOLOGY  Part I 8. Network Devices

ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices 8. Network Devices 1 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Functions of network devices Separating (connecting) networks or expanding network e.g. repeaters, hubs, bridges, routers, brouters, switches, gateways Remote access e.g. 56K Modems and ADSL modems 2

ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices A. Expanding Network Networks cannot be made larger by simply adding new computers and more cables Less efficient !! 3 Can install components to segment (divide) large LAN to form smaller LANs connect LANs Required components Repeaters, bridges, routers, brouters, switches or gateways ENG224 INFORMATION TECHNOLOGY Part I

8. Network Devices a. Repeaters and Hubs Repeaters or hubs work at the OSI physical layer to regenerate the networks signal and resend them to other segments Primitive hub can be viewed as a multiport repeater It regenerates data and broadcasts them to all ports Hub 4 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Limitations and Features Cannot link unlike segments Cannot join segments with different access methods (e.g. CSMA/CD and token passing)

Do not isolate and filter packets Can connect different types of media The most economic way of expanding networks 5 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices b. Bridges 6 Has one input and one output Used to isolate network traffic and computers Has the intelligent to examine incoming packet source and destination addresses

But cannot interpret higherlevel information Hence cannot filter packet according to its protocol ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices How Bridges Work Bridges work at the Media Access Control Sublayer of the OSI model Routing table is built to record the segment no. of address If destination address is in the same segment as the source address, stop transmit Otherwise, forward to

7 the other segment ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Creating a Switching Table Based on the addresses of the sending computers New addresses are added if they are not in the table Add02 S 02 D 01 Switching Table Seg 1 Seg 2 Add01 Stop 8

Add03 S 01 D 02 01 02 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Remote Bridges Bridges are often used in large networks that have widely dispersed segments Remote bridges can be used to connect remote segments via data-grade telephone line 9

ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Differences Between Bridges and Repeaters Repeaters OSI layer Physical layer Data link layer Data regeneration Regenerate data at the signal level Regenerate data at the packet

level Yes Reduce network No traffic 10 Bridges ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices c. Switches Switches operate at the Data Link layer (layer 2) of the OSI model Can interpret address information Switches resemble bridges and can be considered as multiport bridges By having multiports, can better use limited

bandwidth and prove more cost-effective than bridge 11 Cisco Catalyst 2900 switch ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Switches divide a network into several isolated channels Packets sending from 1 channel will not go to another if not specify Each channel has its own capacity and need not be shared with other channels Hub 3.3Mbps 10Mbps 3.3Mbps

Switch 3.3Mbps 10Mbps 10Mbps 12 10Mbps ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Advantages of Switches Switches divide a network into several isolated channels (or collision domains) Reduce the possibility of collision Collision only occurs when two devices try to get access to one channel Can be solved by buffering one of them for later access

Each channel has its own network capacity Suitable for real-time applications, e.g. video conferencing Since isolated, hence secure 13 Data will only go to the destination, but not others ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Limitations of Switches Although contains buffers to accommodate bursts of traffic, can become overwhelmed by heavy traffic Device cannot detect collision when buffer full CSMA/CD scheme will not work since the data channels are isolated, not the case as in Ethernet

Some higher level protocols do not detect error E.g. UDP Those data packets are continuously pumped to the switch and introduce more problems 14 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Method of Switching - Cut Through Mode Preamble Des. Add 7 1 2/6 Bytes Byte Bytes

Sour. Add 2/6 Bytes Length Data FCS 2 46 - 1500 Bytes 4 Bytes Bytes Read the first 14 bytes of each packet, then transmit Much faster Cannot detect corrupt packets Can propagate the corrupt packets to the network

Best suited to small workgroups 15 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Method of Switching - Store and Forward Mode Read the whole packet before transmit Slower than the cut-through mode More accurate since corrupt packets can be detected using the FCS More suit to large LAN since they will not propagate error packets Facilitate data DB 100Mbps transfer between segments of different speed 16

10Mbps ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Using Switches to Create VLANs Switches can logically group together some ports to form a virtual local area network (VLAN) SW1 SW2 SW3 17 VLAN1 VLAN2

Hub Hub Switches can be configured to communicate only within the devices in the group Hub ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices d. Routers Layer 2 Switches cannot take advantage of multiple paths Routers work at the OSI layer 3 (network layer)

They use the logical address of packets and routing tables to determine the best path for data delivery 18 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices How Routers Work As packets are passed from routers to routers, Data Link layer source and destination addresses are stripped off and then recreated Enables a router to route a packet from a TCP/IP Ethernet network to a TCP/IP token ring network Only packets with known network addresses will be passed - hence reduce traffic

Routers can listen to a network and identify its busiest part Will select the most cost effective path for 19 transmitting packets ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices How Routing Table is formed Routing table is formed based on communications between routers using Routing Protocols Routing Protocols Routable Protocol Routing Protocols collect data about current network status and contribute to selection of the best path 20

Routers communicate within themselves ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Routing Protocol Example - RIP for IP Routing RIP (Routing Information Protocol) the oldest one Use no. of hops between nodes to determine best path Does not consider the network congestion condition Broadcast every 30 sec the routing table to neighbouring routers to convey routing information RIP is limited to interpreting a maximum of 16 hops Not suitable for large network (e.g. Internet) Can create excessive network traffic due to broadcasting 21 May take a long time to reach the far reaches

ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Routing Protocol Example - OSPF for IP OSPF - Open Shortest Path First Make up the limitations of RIP - can coexist with RIP In general case, best path refers to the shortest path In case of traffic congestion, can go a longer path Each router maintains a database of other routers links If link failure notice is received, router can rapidly compute an alternate path Require more memory and CPU power 22 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices

Static and Dynamic Routers Static Routers Dynamic Routers Manual configuration Manual configuration of the first of routes route. Automatic discovery of new routes Always use the same Can select the best route route More secure Need manual configuration to improve security 23 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices

Distinguishing Between Bridges and Routers Bridges forward everything they dont recognize Routers select the best path Routers are layer 3 devices which recognize network address Bridges are layer 2 devices which look at the MAC sublayer node 24 address ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Layer-3 Switches Layer-3 switches operate in both layer 2 (data link layer) and 3 (network layer)

Can perform both MAC switching and IP routing A combination of switch and router but much faster and easier to configure than router Why Layer-3 switches? Traffic of LAN is no longer local Speed of LAN is much faster Need a much faster router, however, very expensive 25 Excerpt from www.intel.com ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Summary Repeaters are the least expensive way to expand a

network, but they are limited to connecting two segments Bridges function similar to repeaters, but can understand the node addresses Switches can be considered as multiport bridges, can divide a network into some logical channels Routers interconnect networks and provide filtering functions. They can determine the best route 26 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices B. Remote Access Devices 1. Modems Allow computers to communicate over a telephone line Enable communication between networks or

connecting to the world beyond the LAN 27 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Cannot send digital signal directly to telephone line Sending end: MODulate the computers digital signal into analog signal and transmits Receiving end: DEModulate the analog signal back into digital form 28 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices 1

Amplitude Modulation Frequency Modulation Phase Modulation Normal sine wave 29 0 1 1 1 ENG224 INFORMATION TECHNOLOGY Part I

8. Network Devices Modems typically have the following I/O interface: A serial RS-232 communication interface An RJ-11 telephone-line interface (a telephone plug) 30 RS-232 RJ-11 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Modem Standards Standard V.22bis V.32

V.32bis V.32terbo bps Introduced 2,400 1984 9,600 1984 14,400 1991 19,200 1993 V.FastClass 28,800 V.34 28,800 V.42bis 115,200 V.90 56,000

31 1993 1994 1995 1998 Remarks Communicate only with another V.32terbo (V.FC) Improved V.FC With compression Resolved competition between X2 and Flex56k ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices

Modem Performance Measures Baud rate - the number of symbol change per second on the transmission line Bit per second (bps) - number of bits transmitted per second In the past, they are identical With compression technique, a change of signal can mean more than one bits 28.8kbaud can mean 115.2kbps when using 32 V.42bis ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices How V.90 Works Modem speed is determined by channel noise level The noise level of traditional PSTN (public switch telephone network) limits data rate to ~35kbps 56K modem technology assumes only one analog link hence noise level is much lower

33 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Why V.90 cannot achieve 56kbps in practice? The actual data link is 64kbps To prevent interference and allow some overhead data in communication, ITU recommends a lower rate to 56 kbps However, 56 kbps is a theoretical number Depending on the quality and length of the analog link, the actual data rate can range from 30kbps to 53kbps 34 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices

Types of Modem - Asynchronous Modems No clocking devices Commonly used in telephone networks Data is transmitted in a serial stream. Each character is turned into a string of 8 bits Each of these characters is separated by one start bit and one or two stop bits 35 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Types of Modem - Synchronous Modems Need clocking devices Data are transmitted in blocks Used in digital networks 36

ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Comparison Asynchronous modems are relatively simple and economic Large overhead - can be up to 20 to 27% of the data traffic Error control is done by using parity bit or higher layer protocols, e.g. MNP, V.42 Synchronous modems are relatively complicated and expensive Seldom use in home market Less overhead means higher efficiency More sophisticated error control protocol is 37 required ENG224

INFORMATION TECHNOLOGY Part I 8. Network Devices 2. ADSL ADSL stands for Asymmetric Digital Subscriber Line Particularly suitable for high speed multimedia communications, general Internet applications Asymmetric - downstream 1.5 to 6.1Mbps upstream 16 to 640kbps Digital - mainly for transmitting digital data still require modulation and demodulation Subscriber line - make use of the analog connection between household and CO 38 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices ADSL Illustration

normal voice 2 to 3 miles subscriber line Splitter local loop low speed data 39 high speed Telephone Company ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices

Why Asymmetric? In general Internet applications, downstream often requires a higher data rate than upstream Downstream - file download, video playback Upstream - click a link, send a form Reducing the resource for upstream can provide more resource for downstream 40 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Why Subscriber Line? By better controlling the length and quality of the analog connection between household and CO, a

higher data rate can be achieved Data Rate Wire Gauge Distance 1.5 or 2 Mbps 24 AWG 18,000 ft 1.5 or 2 Mbps 26 AWG 15,000 ft 6.1 Mbps 24 AWG 12,000 ft 6.1 Mbps 26 AWG 9,000 ft Wire Size 0.5 mm 0.4 mm 0.5 mm 0.4 mm Distance 5.5 km 4.6 km 3.7 km

2.7 km More than 80% of the current installed subscriber lines can fulfill this requirement Hence no extra cabling is required 41 ENG224 INFORMATION TECHNOLOGY Part I 8. Network Devices Architecture of ADSL Services IS P P O P C e n tr a l O ffic e C u s to m e r P r e m is e s M odem

ADSL M odem T e le p h o n e S w itc h N I D DSLAM - Digital subscriber line access module (central 42office ADSL modem pool) Copper Loop In te r n e t DSLAM

F ir e w a ll DHCP R o u te r DNS T N I T e le p h o n y S p litte r T r a n s p o r t N e tw o rk L in k (D S x ; O C x ; fra m e ; A T M ) SNM P ENG224 INFORMATION TECHNOLOGY Part I

8. Network Devices Other DSL Technologies HDSL High speed DSL 2 twisted pair, 12,000 feet 1.5Mbps (DS1) full-duplex Symmetric VDSL Very high bit rate DSL Downstream: 52 Mbps (SONET STS-1) over 1000 feet; or 15 Mbps over 3000 feet Upstream: 1.5 to 2.3 Mbps RDSL Rate adaptive DSL Intelligent DSL to adjust data rate 43

Recently Viewed Presentations

  • God, the Bible, and the Treatment of Women

    God, the Bible, and the Treatment of Women

    #6: God's Primary Concern is Justice. We live in a social justice era. Many good things have come from this. Greater emphasis on God's justice. Justice for the sake of justice. God's primary concern is our relationship with HIM. Social...
  • PowerPoint Presentation

    PowerPoint Presentation

    The teaching materials in this PowerPoint presentation have been developed by Dr Julia Miller and are available on the English for Uni website. Funded by the Australian Government Office for Learning and Teaching.
  • St Luke's Church of England Primary School

    St Luke's Church of England Primary School

    Dear Lord, Thank you for revealing yourself to us as Father, Son and Holy Spirit even though you are still . one. Help us to learn about you and the great . love you have for each one of us....
  • PowerPoint Presentation

    PowerPoint Presentation

    Times New Roman Arial Wingdings Verdana Comic Sans MS Artsy Subject Access in the Digital Age PowerPoint Presentation Subject access issues Controlled vocabulary problems Evaluating subject catalogs Advantages of keyword Keyword assumptions Language—the biggest obstacle for searching Synonyms Synonyms What...
  • Module 1: Introduction

    Module 1: Introduction

    Advanced SQL Assertions Triggers Stored Procedures Embedded & Dynamic SQL ODBC & JDBC Assertions An assertion is a predicate expressing a condition that we wish the database always to satisfy. Similar to DDL check constraints, but they can test conditions...
  • Class Agenda 3/24/15

    Class Agenda 3/24/15

    1. ACT Prep - Passage (20 minutes) 2. Macbeth Quiz (15 minutes) 3. Lit Circle Skits (20 minutes plan with 25 minutes skits) 4. Exit ticket (10 minutes) Today you will, orally and in writing, analyze multiple interpretations by groups...
  • Applied Dentistry for the Veterinary Technician

    Applied Dentistry for the Veterinary Technician

    Objectives. Recognize a patient's dental health status. Perform techniques, as prescribed by a veterinarian, to promote and maintain dental health
  • Pharmacology - medi

    Pharmacology - medi

    Pharmacology By Prof. Dr. Amany Ibrahim El-Brairy Professor of Pharmacology H107 Idiosyncrasy (Pharmacogenetics) Abnormal response Supersensitivity (Intolerance) Dose of the drug Tolerance Dose of the drug Drug interactions Summation, Synergism, Antagonism & Reversal.