Sunteți pe pagina 1din 15

CHAPTER 4B LAN

In chapter of MEDIUM ACCESS CONTROL SUBLAYER we looked how we can get access to a single channel available between many users. Now in this chapter we will closely look at different networks in wired and wireless technology. We will look at protocol stack of that networks and their services also. To start with we will first look at Ethernet. ETHERNET Ether means cable so the network made with cable is called Ethernet. Now when Ethernet was found at that time three companies founded it combinely. DEC, INTEL AND XEROX. So this network was called DIX Ethernet but then it was submitted to IEEE for standardization and it standardize it as IEEE 802.3 standard. Now as per the standard the maximum cable length that can be supported is 2500 mtrs and speed of the transmission is 10Mbps. Such sort of network is mainly used for small lans. The main topology used here is BUS topology. Now the main part of Ethernet is the type of cable used for it. We will look at it one by one. Name of cable 10base2 10base5 10baseT 10baseF Type of cable Category 2 coax (thin coax) Category 5 coax (thick coax) Twisted pair Fiber optics Maximum segment 185 500 100 2000 Node/segment 30 100 1024 1024 Coding type Manchester Manchester Manchester Manchester

Starting from the first we have 10base2 cable where 10 indicates speed of 10 Mbps. Base stands for base band signal and 2 indicates the nearer value of 185 meter that is the maximum distance supported by the cable without using any amplifier. And in this much distance we can connect maximum of 30 computers or hosts. The cable is used in Bus topology so every computer is connected with a common bus available. The computers are connected with the main bus with use of BNC connectors as shown. Next cable is 10base5 where 10 is speed of 10Mbps and 5 is distance of 500 mtrs upto which the cable can be used without using any repeater or amplifier. We can connect maximum of 100 computers in this much length. This is category 5 coaxial cable. The cable is used in bus topology so every computer is connected with a common bus available. The computers are connected with the main bus with use of vampire T type connectors. Now as we are using bus topology if the cable cut occurs in the bus the whole network will fail as shown.

COMMON BUS

CABLE BREAK

Now in this case the computer at right side cannot contact with that of the left side. As we have seen earlier that the total cable distance in case of Ethernet is 2500 mtrs. And it is very difficult to detect the break and for this purpose we use one method called Time Domain Refelctrometlry. In this we send a pulse from one end of network and the pulse will return form the place of shot or cut of wire. By measuring the time taken by the pulse to return, we can calculate the distance of break. One electronic instrument called transceiver plays an important part in the communication. It checks the incoming frame and computes the checksum and if the frame is not received perfectly then it will break the whole frame in small part of less than 64 byte. And then generates 48 bit noise signal that is received by all other computers so they can know that the error has occurred in the received frame. This instrument is mounted on the cable for category 5 cable where we joint the computer with the main bus. Five cables are connected to it from the computer. Two of them are for transmission and two are for receiving process, and one of them is used to provide power from computer to Transreceiver. In category 2 cable the instrument is mounted on computer itself. The third category is 10baset that is category 3 twisted pair. That can support upto 100mtrs. This distance in not the distance between two repeaters but in this scheme we dont use the bus topology rather we use hub for connecting the computers to the main network. So maximum distance from hub to computer cannot exceed 100mtrs. The last category for Ethernet is 10baseF that is fiber optics and can support upto 2000 mtrs. As we know the fiber optics can support very high bandwidth so data rate is not a problem for fiber optics. The major problem for the fiber is the end points, which are very costly and complex. Now we will look at the coding for this method. In Ethernet we can use different methods for the coding. We can go for simple coding that we employ high voltage for 1 and low voltage of 0. But in this case the terminal not transmitting any thing is as good as terminal transmitting 0. So we cannot differentiate between two terminals that are transmitting 0 and not transmitting anything. We can have other method also in which positive voltage indicates 1 and negative indicates 0. In this case if successive 1s and 0s occur then receiver cannot differentiate the boundaries of pulses and may run out of the synchronism. Now to overcome above two problems we have new scheme called Manchester coding. In this scheme 1 is represented by leading edge in the start of bit and transition to trailing edge in the middle of the bit. While 0 is represented with trailing edge in start of bit and transition to leading edge in middle of the bit. Another

method similar to this is called differential Manchester coding in which 0 is represented by a transition when bit starts and 1 is represented by carrying the previous state of the pulse. This method gives good noise immunity and widely used for encryption systems. For Ethernet we use simple Manchester coding. The major disadvantage for it is that it requires double the frequency than that of bits. 1 Simple binary coding 0 1 1 1

Alternate coding

Simple Manchester coding

Differential Manchester Now we will look at the frame format of the Ethernet. Now three companies founded Ethernet. DEC, Intel and Xerox. So we call it DIX Ethernet. Afterwards the protocol is submitted to the IEEE for standardization and they name it as IEEE 802.3. There is no basic difference in these two methods only difference is two fields in the frame format. First we will look at the DIX Ethernet. Bytes 1 2 6 6 0-1500 0 46 4 Destination Source Preamble Type Payload Padding Checksum Address Address DIX Ethernet
Preamble
S O F
Length

Destination Address

Source Address

Payload

Padding

Checksum

IEEE 802.3 Each Frame starts with a Preamble of 8 bytes, each containing the bit pattern 10101010. The Manchester encoding of this pattern produces a 10- MHz square wave for 6.4 us to allow the receivers clock to synchronize with the senders. They are required to say synchronized fro the rest of the frame, sung the Manchester encoding to keep track of the bit boundaries. The frame contains two addresses, one for the destination ad one for the defined for the 10-Mbps baseband standards use only the 6-bytes addresses. The high order bit of the destination address is a 0 for ordinary addresses and 1 for group addresses. Group addresses allow multiple stations to listen to a single address. When a frame is sent to a group address, all the stations in the group receive it. Sending to a group of stations is called multicast. The address consisting of all 1 bits

is reserved for broadcast. A frame containing all 1s in the destination field is sent to a selected group of stations on the Ethernet: broadcast frame is sent to all stations on the Ethernet. Multicast is more selective, but involves group management. Broadcasting is coarser but does not require much group management. Next interesting feature of the addressing is the use of bit 46th bit to distinguish local from global addresses. Local addresses are assigned by each network administrator and have no significance outside the local network while global address is address of the terminal when we see it globally. That means the address for the world. Now we have more 46 bit to use for the address by which we can have 7*10e13 addresses. Next field is type field, which tells the receiver what to do with the frame. Means it is information frame or supervisory frame or control frame. Next data field can be of maximum1500 byte it was chosen after the limitation of available resources at the time of it was founded. Now most interesting part of the frame format is padding. This can be of 0-46 bytes. Now lets see how it can be used. In addition to there being a maximum frame length, there is also a minimum frame length. While a data field of 0 bytes is sometimes useful, it causes a problem. When a transceiver detects a collision, it truncates the current frame, which means that stray bits and pieces of frames appear on the cable all the time. To make it easier to distinguish valid frames from garbage, Ethernet requires that valid frames must be at least 64 bytes long, from destination address to checksum, including both. If the data portion of a frame is less than 46 bytes, the Pad field is used to fill out the frame to the minimum size. Another reason for having a minimum length frame is to prevent a station from completing the transmission of a short frame before the first bit has even reached the far end of the cable, where it may collide with another frame. Lets say at time 0, A is transmitting a frame and propagation delay for the frame is T sec. Now before it reaches to station B, station B starts transmitting its frame at T- so frame will get collide and get damaged. Now our aim is that the station A should not completes the transmissions until the frame reach station B (farthest station) and A can know that there is no collision from other stations. For this the minimum frame length should be such that it should not get completed for double the propagation time. Now for Ethernet we have maximum cable distance is 2500 mtrs. And worst-case propagation delay is 50 us. Now we are using 10 Mbps speed so 1 bit will require 100nsec to get transmitted now in 50 us delay we can have 500 bits. We take 12 precautionary bit and total comes out to be 512 bits and that is 64 bytes. So the minimum frame length require is 64 bytes for Ethernet. So when data bytes are less than this number then padding will provide the extra bits to set it to 64 bytes. So if data is 0 byte then padding is 46 bytes. If data is 10 bytes padding is 36 bytes and so on. The last checksum is the CRC for detecting the error. BINARY BACK OFF EXPONENTIAL THEORM: As we have seen that when a terminal wants to transmit the data it first checks the channel that it is in use or not. This is done by three methods, as we know. (CSMA/ 1,P AND NONPERSISTENCE). Now we wait for some random amount of time if the channel is in use. Now how to decide this random time. So for that we use this theorm. In CSMA/CD we show that the

contention period is divided in time slots of 2 time period. So in binary back off exponential theorm we use this slots as measure of random time. If the terminal is first time checking the channel and if it senses it busy then it will wait for 0th slots means one time slot or we can say 2 time period. Now again it senses the channel and if still it is in use then it will wait for 0th and 1st slot time or we can say it may wait for 2 time or 4 time. For second try it will wait for 2 , 4 or 8 time and it increase exponentially with each successive try. This is done till 10 tries. After ten time sensing a channel we have to wait for 0 to (210 1)th slot randomly. Now for 11,12,13 and up to 16 time we will use this many time slots only. And once the terminal tries for 16 times then the terminals data link layer gives up the communication and inform to the upper layer. Now how to start it again is duty of upper layer. This is the theorm used in all communicating devices. SWITCHED ETHERNET: As we have seen that simple Ethernet dont provide the speed more than 10 mbps and it is not sufficient for high data files. So now if more than one computer are communicating in the lan in this case even this data rate is not possible because maximum time will go in sensing and achieving the channel. So the new method called switched Ethernet came in to picture. Switch is a device used at data link layer. It consists of 4 32 cards and each of them can connect 8 computers. Each card has its own micro controller, which controls the communication of the terminals connected. If we want to connected one switch with the other switch in this case we use a backbone cable with data rate much more than that of simple Ethernet. Now cards used in the switch are of two types. One with buffer and other without buffer. In first case when more than one computer connected with the card want to transmit then the micro controller will decides the priority among them and allow only one two transmit. If more than one transmits to the card then collision occurs and we have to retransmit the frame. So data of only one terminal can be supplied outside the switch at a time. In second case the card stores the data coming from different terminals in the buffer available and one by one as per the priority it puts them out on the back bone cable. In both the cases if data has to be transmitted to the terminal of the same card then card it self will transmit it. If it has to be transmitted to the terminal of the other card then as all cards are connected the card will transmit it to the second card and that card will transmit it to the terminal. And if the data is belonging to the other switch in this case data is put on the backbone and then given to the next switch. Thus by using the same cable and same standard we can increase the speed of communication by use of switch.

WIRELESS LANS The first step in wire less lan is 802.11 standard of IEEE. It is wireless version of IEEE 802.3 and uses all theories as used in that network. It works on the frequency of 2.4 GHz. This band is ISM band and that is why no license required for this band. Now lets look at the protocol stack of this network. Protocol stack: The network has all the layer of OSI model. We will look at only physical and data link layer. The physical layer uses different type of method for making the network wireless. INFRARED RAYS: The infrared option uses diffused transmission at 0.85 or 0.95 microns. Two speeds are permitted: 1 Mbps and 2 Mbps. These rays cannot penetrate the wall and so can be used for transmission within the room. FHSS (Frequency Hopping Spread Spectrum): it uses 79 channels, each 1 MHz wide, starting at the low end of the 2.4 GHz band. One by one different frequency is hopped and transmission is done on that frequency. The amount of time spent at each frequency, the dwell time, is and adjustable parameter, it must be less than 400 msec. DSSS (direct sequence spread spectrum): it is also restricted to 1 or 2 Mbps speed. The scheme used has some similarities to the CDMA system. A code is generated and the data is mixed with the code and at receiver side we apply the same code to the received data and data is back. OFDM (orthogonal frequency division multiplexing): to deliver up to 5 Mbps in the wider 5 GHz ISM band it is used. As the term FDM suggests, different frequencies are used 52 of them, 48 for data and 4 for synchronization. HR DSSS (high rate direct sequence spread spectrum) : it si another spread spectrum technique. This uses 11 million chips/sec to achieve 11 Mbps in the 2.4 GHz hand. It is called 802.11b but is to a follow up to first one. 1,2,5.5, and 11 Mbps data rate are possible in this method. The data link layer is consists of two sub layer one is Mac sub layer and second is LLC sub layer. The MAC sub layer is quite different from that of Ethernet due to the inherent complexity of the wireless environment compared to that of a wired system. With Ethernet, a station just waits until the ether goes silent and starts transmitting. It does not receive a noise burst back within the first 64 bytes; the frame has almost assuredly been delivered correctly. With wireless, this situation does not hold. In this case we have hidden and exposed station problem that we have already seen. To deal with this problem this network supports two modes of operation. The fist, called DCF (distributed coordination function), does not use any kind of central control. The other, called PC (point coordination function), uses the base station to control all activity in its cell. When DCF is employed, the network uses a protocol called CSMA/CA In this protocol, both physical channel sensing and virtual channel sensing are used.. Two methods of operation are supported by CSMA/CA. In the first method, when a station wants to transmit, it senses the channel. If it is idle, it just starts transmitting. It does not sense the channel while transmitting but emits its entire frame, which may well be destroyed at the receiver due to interference there. If the channel is busy, the sender defers until it goes idle and then starts transmitting. If a collision occurs, the colliding stations wait a random time, assuring he Ethernet binary exponential back off algorithm, and then try again later. Or in the second case sender sends RTS and responders send CTS if both agrees on the communication the transmission takes place and other station

who have got RTS or CTS knew that which tow station are communicating and will take who much time so they dont interfere them between the communication.(this theory is given in chapter 4 as csma/ca). Now in case of 802.11 network we can use both DCF and PCF together also. This technique is shown in the figure.

(SIFS, PIFS, DIFS AND EIFS STARTING FROM THE LEFT BOTTOM SIDE.)

Lets us say first any one of the terminal has completed its communication. Now all the terminals have chance to transmit. After the transmission a short time interval is provided called short inter frame spacing (SIFS).in this interval if any frame is on the way to its destination can complete the communication. After this interval the communication is done by PCF mode for some short time interval and that is called PCF inter frame spacing (PIFS). In this interval the base station generates a frame and asks to all the computers whether they want to transmit or not. If in this definite time interval base station does not supply any polling frame then after this interval elapse we have another time interval called DCF inter frame spacing (DIFS). In this interval any terminal can communicate with use of RTS and CTS frame. In this much time interval if nobody transmits any frame then the time elapses and other time interval called EIFS- extended inter frame spacing starts. In this interval we can retransmit the frames if any. FRAME FORMAT: BYTES 2 Frame control 2 Version BITS The first field is control field. It itself has 11 subfields. The first of them is version by which the version of the protocol can be indicated. This network supports two consecutive version of 6 6 6 2 6 Address Address Address Address Duration Sequence 1 2 3 4 2 Type 4 Subtype 1 To DS 1 From DS 1 MF 1 Retry 1 Pwr 1 More 2 0-2321 Data 4 CRC

1 W

1 O

protocol. Next field is type that indicates the type of the frame like it is management frame or control or data frame. The next field is subtype and that indicates the subtype mainly RTS ,CTS, ack etc. Next two is TO DS and FROM DS they indicate whether the data is coming from or going to the distributed system. MF field indicates that still more fragments of the same previous frame are following the frame. RETRY field indicates that retransmission of the frame is required because the frame is not received perfectly at receiver. PWR field is used for putting the mobile in sleep mode or to take it out from the sleep mode. More means still more frame are there to transmit. W is WEP- wired equivalent privacy. If this bit is set, that means the data has provided encryption. When O field is set that means this particular frame has to be sent to the upper layer strictly in order. After control field we have duration field that shows the duration of communication so for this much time other station will not disturb the communicating stations. Here we have four address fields one is for source mobile, second is for destination mobile, third is for source base station and last is for destination base station. Seq. field is sequence of the frame. Then we have data and related CRC in the frame. SERVICES: The network has some special services to provide to the mobile station by the base station. Out of them five are inter cell and four are intra cell services. First we will look at inter cell services. Association: This service is used by mobile stations to connect themselves to base stations. It is used just after a station moves within the radio range of the base station. Upon arrival, it announces its identity and capabilities. The capabilities include the data rates supported, need for PCf services, and power management requirements. The base station may accept or reject the mobile station. Disassociation: This service is use to break the connection between the base station and the mobile station. If mobile is going down for maintenance reasons or goes in sleep mode to save the power in this case this services is used. Reassociation: When mobile is going from one base stations range to other base stations range it breaks connection to one base station and makes it to other base station and this service is used for the same reason. Distribution : this service is used for making connection between two mobiles belonging to different base station. The base station has to decide that the call has to be routed in the same cell with wireless techniques or to the other cell by wired line. Integration: this service is given to translate the protocol of one standard to other if we are communicating with a non 802.11 terminal. Now next four services are intra cell services that every base station provides to mobile station.

Authentication: When mobile enters the area of a base station it first announce itself now base station will not give it services immediately it first checks whether the mobile belongs to the same base station or not. So the base station give a challenge frame to the mobile if the mobile can decode it and can reply to the base station then only it will be given permission to communicate. This process is called authentication. Deauthentication: If the mobile will not able to decode the challenge frame then will not be allowed to communicate and this is called deauthentication. Privacy: all the mobile station should be avail adequate privacy so that any unauthorized person can not access data of two communicating mobiles. Data delivery: The data should reach the destination reliably and the communication should be efficient. BROAD BAND WIRELESS: The broad band wireless is also called IEEE 802.16 standard. First we have comparison of the same with the previous network. comparison between 802.11 and 802.16
1 2 3 4 5 6 7 8 9 This c is used for moving objects like mobile phones In this network omni directional antenna are used. The frequency range for the network is 2.4 GHz For this band no license is required This network uses two modes of communication DCF and PCF in this network error probability is less so only error detection is provided at data link layer it covers small area so it is called LAN It is half duplex system. Example of the network is wireless LAN 1 2 3 4 5 6 7 8 9 This network is used for stationary objects like buildings. in this network due to very high frequency only line of sight propagation is used the frequency range for the network is 10 to 66 GHz. this is not a free band so license is required for this network this network uses only PCF communication in this network error probability is very high so error connection is provided at physical layer it covers very wide area so it is called WAN/MAN It is full duplex system and also work in half duplex mode. Example of the network is wireless cable television system.

So these were basic difference between two networks. And now we will look at the protocol stack for this network. In this network we have all the layers of OSI model but we will look at only at two lower most layers. The first layer is physical layer and divided in two sub layers named physical medium depended sub layer and transmission convergence sub layer. In PMD layer we have three main types of communication techniques. As we know we are dealing with high frequency and large distance so as distance increases the data rate should decreases as two lower the errors. So for the small distance communication the network uses QAM 64 that is quadrature amplitude modulation and

uses 6 bits per cycle. For distance larger than this it uses QAM 16 that is with 4 bits per cycle. And for the largest possible distances it uses QPSK with 2 bits per cycle. Second major issue to discuss is that when we are communicating with the server then the uploading is of very small data size while downloading is of very large data size. So if we provide same time for uploading and downloading then in case of uploading we are simply wasting the available bandwidth. Toa avoid such effects this network provides more time to downloading and less to uploading with use of TDD and FDD(time and frequency division duplexing.) The second sub layer deals with translation of protocols with the upper layers and also used for correction the error with hamming codes. The second layer of the network is data link layer and is divided in three sub layers. Security sub layer provides security to the communication so any unauthorized use of data can be avoided. The MAC sub layer deals in providing the priority to the communicating terminals it decides who goes next and also deals with band width requirements of the terminals. For this it provides four services. Constant bit rate services: in this method the bit rate is decided in advance before communication starts and then will not be change throughout the communication. Real time bit rate services: in this case the base station asks to every terminal for advancement of data rate after a definite time interval and if any station wants more bit rate then base station will provide it as per available bandwidth condition. Non real time services: in this case the base station asks to every terminal for advancement of data rate but the time of this is not decided when more stations are not communicating for long time and bandwidth is available in extra amount then only base station asks the terminal for the advancement of data rate. Best efforts services: in this case all the terminal will sense the channel and then transmit the data as per availability of the channel. The next sub layer is service specific convergence sub layer and it translates the protocols between two

layers. FRAME FORMAT:

6 Type

0 EC

1 C I

2 EK

11 Length

16 Connection ID

8 Header CRC

4 Data CRC

A generic Frame

1 1 1 0

6 Type

16 Bytes neede

16 Connection ID

8 Header CRC

A bandwidth request frame.

EC: it is indication that the data is encrypted or not Type: it indicates type of frame, control, management, data. CI: it indicates presence of final check sum. EK: it is information of encryption key used. Connection ID is address of the destination. Header CRC is check sum of the header. CRC is check sum for the whole frame Bytes needed shows no. of extra bits needed to increase the bit rate. BLUETOOTH: The Bluetooth technology was founded by two many people for different application. IEEE had tried to standardize it and given the name IEEE 802.15 and it is known as PAN personal area network. But many other important applications are also there and we will look Bluetooth as whole. Architecture: The basic unit of the network is Pico net. This consists of a master node and up to seven ative slave nodes within a distance of 10 meters. Multiple Pico nets can exist in the same room and can even be connected via a bridge node. An interconnected collection of piconets is called a scatter net.

In addition to the seven active slave nodes in a Pico net, there can be up to 255 parked nodes in the net. These are devices that the master has switched to a low power state to reduce the drain on their batteries. In parked state, a device cannot do anything except respond to activation or signal from the master. SERVICES: As already stated many people worked on the Bluetooth and many different applications of the same is possible here we have such 13 applications to mention. NAME GENERIC ACCESS SERVICE DISCOVERY SERIAL PORT GENERIC OBJECT EXCHANGE LAN ACCESS DIAL UP NETWORKING FAX CORDLESS TELEPHONY INTERCOM DESCRIPTION This is to make link between the nodes and the master node. Different types of instruments can be connected to the network and each of them have different services so it is necessary to discover the available services from the devices in the network and this is provide by service discovery. This is to communicate with use of serial ports. This is to establish a client server model. This is to make your personal mobile or PDA or other device a part of fixed network. It is to provide you internet facility with in built wireless modem in the mobile phone. It is to provide wireless fax services. It is to connect your cordless phone with the base station.

If we want to make walkie talkie with this technique then it is also supported by Bluetooth. HEADSET It is used to do hand free communication. OBJECT PUSH It is for data and file transfer first is for low data rate and second is for high data rate. FILE TRANSFER SYNCHRONIZATION It is to synchronize your device with that of other Bluetooth device. PROTOCOL STACK: Blue tooth has complicated protocol stack. It has different layers as shown.
Application layer Other Audio LLC RF comm. Telephony Service discovery

Control

Logical link adaptation layer Link manager Base band layer Physical layer

The first layer is physical radio layer. It moves the bits from master to slave, or vice versa. It is a low power system with a range of 10 mtrs. The network uses 2.4 GHz ISM band and it is divided in 79 different channels of 1 MHz wide. To allocated the channel frequency hopping spread spectrum is used with 1600 hops/sec and a dwell time of 625 usec. It can interfere with IEEE 802.11 due to same frequency use but in this case the hopping is so fast so it does not interfere it. The second layer is the base band layer and is liked an MAC sub layer. It turns the raw bit stream into frame sand defines some key formats. In simplest form the master in each Pico net defines a series of 625 usec time slots. With the masters transmission starting in the even slots and the slaves transmission starting in the odd one. This is traditional time division multiplexing, with the mater getting half the slots and the slaves sharing the other half. Frames can be 1, 3, 5 slots long. The maximum speed we take is 1 Mbps so in 625 usec (dwell time) we can have 625 bits in a frame out of which 126 are for an access code and header. And 259 bits are to get set at a frequency after hopping. So only 240 bits are available as data bits. If five slots are strung together, only one settling period is needed and a slightly shorter settling period is used, so of the 3125 bits in five time slots, 2781 are for the data, thus longer frames are much more efficient than single slot frames. Now this layer provides two type of services. ACL: that is asynchronous connection less. So no global clock is provided and no connection is made before or released after the communication. SCO: synchronous connection oriented. In this case the communication is synchronize and a connection is made before and released after the communication. The link manager layer is associated with making the link the same work is supported by logical link control adaptation protocol. It is associated in management of client server links. Above that we have four sub layers. LLC is used in translating the interlayer protocols. RF communication is used to make wireless connection between different part of PC like keyboard, mouse etc with CPU. Cellular telephony is used for intercom, headset and cordless communication. Service discovery is used to identify different services of available instruments. Two parallel layers are also there. Audio layer deals with point to point voice communication and control deals with point to point control information. Above all application layer provides all the facility of security, privacy and other OSI traditional services. FRAME FORMAT: first field is access code that indicates address of the master to which the destination belongs to. Next 54 bits are header and divided in sub fields. Address in address of the destination machine. Type is type of frame whether data or control or management. F stands for flow control so if one of the stations can not stand to the speed of other then with this command we can generate flow control. A is piggybacking acknowledgement to indicated the perfect recovery of the frame. S is sequence of the frame, as we are using stop wait protocol, only one bit is sufficient to indicate the sequence of the frame.

Last 8 bits are CRC as check sum. These 18 bits are repeated thrice to make it 54 bit header. At receiver side we compare all three combinations and majority of them is taken as header. Last field is data and it data for five slots. For different frame length we have different data length also. 72 Access code 54 Header 0-2744 Data

3 Addr

4 Type

1 F

1 A

1 S

8 CRC

VIRTUAL LAN: We have seen different types of networks all are combination of different hardware and protocols. Now lets talk about a lan that is based on software. Lets say we have some different lans in a big network. We want that we transmit data from one terminal then it should be available to only some of the terminal of different lan. Now all the terminal in lan are connected then how will this possible to give data to only some of the computers not to all. This can be done by multicasting also but in this case the hardware is setup once has to be changed if want new computers to be added or old one to be removed. So without changing the existing network how to change the network in independent lan of terminals belong to different classical lan. This can be done by concept of virtual lan. In this technique we use devices what are virtual lan aware. As per the fig given below first we do paper and pen work and decides which terminal will belong to which lan. And we give different color to every lan. Now we program the device in such a way that we make a table in the device, which identifies each terminal as individual also and also as a part of virtual lan. The main punch of the technique is that we can use this lan in our classical lan G B G B G
BRIDGE

W G W

also and can communicate between virtual and classical lan also. When one terminal sends data to other terminal then the connecting device first checks the destination and source address and

decides that data is coming from virtual lan or from a simple lan. If it belongs to the virtual lan then device will forward it on to the virtual lan. And data will be available to all the terminals of the virtual lan. Now the main difference between the data of virtual lan and simple lan is frame of it. When data of simple lan has to be delivered to the virtual lan then the virtual lan aware device add a small portion in the frame of the simple lan called tagged frame. Same device will remove the tagged portion form the frame when a data of simple lan has to be delivered to the virtual lan. As we have seen that the only difference is the frame so the frame for this network is same as frame of IEEE 802.3 frame. Only small tagged portion of four bytes is added after the address field in the original frame. 16 0x8100 3 pri 1 CFI 12 Vlan ID

(tagged frame portion)

the first field is Vlan identifier it is of 16 bits or 2 bytes. The constant value 8100 hex is stored in that which indicates that the data is coming from the Vlan. Second field is 3 bit priority field which indicates the priority level of the data. Next we have CFI it is canonical format indicator. When the simple lan connected to the vlan uses the technique of token ring topology(IEEE 802.5) then CFI is set to 1.

The last 12 bits are for identifying the virtual lan address.

S-ar putea să vă placă și