Академический Документы
Профессиональный Документы
Культура Документы
LAN TECHNOLOGIES
Introduction
Take for example a typical office scenario where a number of users require
access to some common information. As long as all user computers are
connected via a network, they can share their files, exchange mail, schedule
meetings, send faxes and print documents all from any point of the network. It
is not necessary for users to transfer files via electronic mail or floppy disk,
rather, each user can access all the information they require, thus leading to
less wastage of time and hence increased productivity.
Imagine the benefits of a user being able to directly fax the Word document
they are working on, rather than print it out, then feed it into the fax machine,
dial the number etc.
Small networks are often called Local Area Networks (LAN). A LAN is a
network allowing easy access to other computers or peripherals. The typical
characteristics of a LAN are :
♦ Topology
♦ Transmission medium
BRBRAITT : Nov-2006 2
“DATA NETWORKS” JTOs PH-II – LAN Technologies
Protocol Architecture
The Protocols defined for LAN transmission address issues relating to the
transmission of blocks of data over the network. In the context of OSI model,
higher layer protocols (layer 3 or 4 and above) are independent of network
architecture and are applicable to LAN. Therefore LAN protocols are
concerned primarily with the lower layers of the OSI model.
Figure 1 relates the LAN protocols to the OSI model. This architecture has
been developed by the IEEE 802 committee and has been adopted by all
organisations concerned with the specification of LAN standards. It is
generally referred to as the IEEE 802 reference model.
Application
Transport
~ Upper
layer
~ (LSAP)
protocols
Network
( ) ( ) Link
Logical ()
Control Scope of
Data Link IEEE 802
Medium Standards
access control
Physical Physical
Medium Medium
FIG.1 IEEE 802 Protocol Layers compared to OSI
The lowest layer of the IEEE 802 reference model corresponds to the
physical layer of the OSI model, and includes the following functions :
♦ Encoding/ decoding of signals
♦ Preamble generation/ removal (for synchronisation)
♦ Bit transmission/ reception
The physical layer of the 802 model also includes a specification for the
transmission medium and the topology. Generally, this is considered below
BRBRAITT : Nov-2006 3
“DATA NETWORKS” JTOs PH-II – LAN Technologies
the lowest layer of the OSI model. However, the choice of the transmission
medium and topology is critical in LAN design, and so a specification of the
medium is included.
Above the physical layer are the functions associated with providing service
to the LAN users. These comprise :
♦ Assembling data into a frame with address and error-detection fields
for onward transmission.
♦ Disassemble frame, perform address recognition and error detection
during reception.
♦ Supervise and control the access to the LAN transmission medium.
♦ Provide an interface to the higher layers and perform flow control and
error control.
The above functions are typically associated with OSI layer 2. The last
function noted above is grouped in to a logical link control (LLC) layer. The
functions in the first three bullet items are treated as a separate layer, called
medium access control (MAC). The separation is done for the following
reasons:
♦ The logic and mechanism required to manage access to a shared-
access medium is not found in the conventional layer-2 data link
control.
♦ For the same LLC, different MAC options may be provided.
The standards that have been issued are illustrated in Table 1. Most of the
standards were developed by a committee known as IEEE 802, sponsored by
the Institute for Electrical and Electronics Engineers. All of these standards
have subsequently been adopted as international standards by the
International Organisation for Standardization (ISO).
Logical Link Control
IEEE 802.2
Unacknowledged connectionless service
(LLC)
Connection-mode service
Acknowledged connectionless service
IEEE 802.11
IEEE 802.5
IEEE 802.6
IEEE 802.4
IEEE 802.3
FDDI
Unshielded
twisted pair; Carrierband Unshielded Unshielded Spread
10,000 Mbps
Physical
Bus/ tree/ star topologies Ring topology Dual bus topology Wireless
BRBRAITT : Nov-2006 4
Table 1 LAN/MAN standards
“DATA NETWORKS” JTOs PH-II – LAN Technologies
TCP layer
TCP
header
IP header IP layer
TCP segment
IP datagram
LLC protocol data unit
MAC frame
LAN Topologies
The common topologies for LANs are bus, tree, ring, and star. The bus is a
special case of the tree, with only one trunk and no branches.
BRBRAITT : Nov-2006 5
“DATA NETWORKS” JTOs PH-II – LAN Technologies
Tap
Flow of data
Terminating
Resistance
Station
Headend
BRBRAITT : Nov-2006 6
“DATA NETWORKS” JTOs PH-II – LAN Technologies
So the frame structure solves the first problem mentioned above: It provides a
mechanism for indicating that who is the intended recipient of data. It also
provides the basic tool for solving the second problem, i.e. regulation of
access. In particular, the station take turns sending frames in some co-
operative fashion; this involves putting additional control information into the
frame header.
Ring Topology
In the ring topology, the network consists of a set of repeaters joined by point-
to point links in a closed loop. The repeater is a comparatively simple device,
capable of receiving data on one link and transmitting them, bit by bit, on the
other link as quickly as they are received, with no buffering at the repeater.
The links are unidirectional, i.e. data is transmitted in one direction (clockwise
or counter-clockwise).
Each station is attached to the network at a repeater and can transmit data
onto the network through that repeater.
BRBRAITT : Nov-2006 7
“DATA NETWORKS” JTOs PH-II – LAN Technologies
Ring
As with the bus and tree, data is transmitted in frames. As a frame circulates past all other stations,
the destination station recognises its address and copies the frame into a local buffer as it goes by. The
frame continues to circulate until it reaches the source station, where it is ultimately removed
(Figure 5).
Because multiple stations share the ring , medium access control is needed
to determine when each station may insert frames.
C
C
A B
B A
A
A
C C
A
B
B
A
A
A
Star Topology
BRBRAITT : Nov-2006 8
“DATA NETWORKS” JTOs PH-II – LAN Technologies
In general, there are two alternatives for the operation of the central node :
One method is for the central node to operate in a broadcast fashion. The
transmission of a frame from one station to the Central Node is retransmitted
in all of the outgoing links. In this case, although the arrangement is
physically a star, it is logically a bus; a transmission from any station is
received by all other stations, and only one station at a time may transmit
(successfully).
Another method is for the central node to act as a frame switching device. An
incoming frame is buffered in the node and then retransmitted on an outgoing
link to the destination station.
Central Hub,
Switch/
Repeater
The key parameters in any medium access control technique are-where and
how. Where refers to whether control is in a centralised or distributed fashion.
In a centralised scheme, a controller is designated that has the authority to
grant access to the network. A station wishing to transmit must wait until it
receives permissions from the controller. In a decentralised network, each
station collectively performs a medium access control function to dynamically
determine the order in which stations transmit. A centralised scheme has
certain advantages, such as the following :
♦ It may afford greater control over access for providing such things as
priorities, overrides, and guarantee capacity.
♦ It enables the use of relatively simple access logic at each station.
♦ It overcomes the problems of distributed co-ordination among peer
entities.
The principal disadvantages of a centralised scheme are :
BRBRAITT : Nov-2006 9
“DATA NETWORKS” JTOs PH-II – LAN Technologies
For bursty traffic, contention techniques are more appropriate. With these
techniques, no control is required to determine whose turn it is; all stations
contend for time. These techniques are by nature distributed. Their principal
advantage is that they are simple to implement and, under light to moderate
load, quite efficient. For some of these techniques, however, performance
tends to collapse under heavy load.
BRBRAITT : Nov-2006 10
“DATA NETWORKS” JTOs PH-II – LAN Technologies
The specific access techniques are discussed further in this chapter. Table 2
lists the MAC protocols that are defined in LAN standards.
The MAC layer receives a block of data from the LLC layer and is responsible
for performing functions related to medium access and for transmitting the
data. MAC implements these functions, by making use of protocol data unit at
its layer; in this case, the PDU is referred to as a MAC frame.
The exact format of the MAC frame differs for the various MAC protocols in
use. In general, all of the MAC frames have a format similar to that of Figure
6. The fields of this frame are :
♦ MAC control : This field contains any protocol control information
needed for the functioning of the MAC protocol. For example, a
priority level could be indicated here.
1 octet 1 or 2 Variable
LLC
PDU DSAP SSAP LLC control Information
BRBRAITT : I/G
Nov-2006 DSAP value C/R SSAP value 11
“DATA NETWORKS” JTOs PH-II – LAN Technologies
• CRC : The cyclic redundancy check field ( also known as the frame
check sequence, FCS, field). This is an error-detecting code, as we
have seen in HDLC and other data link control protocols
In most of the data link control protocols, the data link protocol entity is
responsible not only for detecting errors using the CRC, but for recovering
from those errors by re-transmitting damaged frames. In the LAN protocol
architecture, these two functions are split between the MAC and LLC layers.
The MAC layer is responsible for detecting errors and discarding any frames
that are in error. The LLC layer optionally keeps track of which frames have
been successfully received and retransmits unsuccessful frames.
The LLC layer of LANs is similar in many respects to other link layers in
common use. Like all link layers, LLC is concerned with the transmission of a
link-level protocol data unit (PDU) between two stations, without the
necessity of an intermediate switching node. LLC has two characteristics not
shared by most other link control protocols :
LLC Services
LLC specifies the mechanism for addressing stations across the medium and
for controlling the exchange of data between two users. The operation and
format of this standard is based on HDLC. Three services are provided as
alternatives for devices using LLC:
BRBRAITT : Nov-2006 12
“DATA NETWORKS” JTOs PH-II – LAN Technologies
Typically, a vendor will provide these services as options that the customer
can select when purchasing the equipment. Alternatively, the customer can
purchase equipment that provides two or all three services and select a
specific service based on application.
A network adapter card plugs into the workstation, providing the connection
to the network. Adapter cards come from many different manufacturers, and
support a wide variety of cable media and bus types such as - ISA, MCA,
EISA, PCI, PCMCIA.
BRBRAITT : Nov-2006 14
“DATA NETWORKS” JTOs PH-II – LAN Technologies
Cabling
♦ coax
♦ fibre optic
The choice of cable depends upon a number of factors like :
♦ cost
♦ distance
♦ speed
REPEATERS
Repeaters extend the network segments. They amplify the incoming signal
received from one segment and send it on to all other attached segments.
This allows the distance limitations of network cabling to be extended. There
are limits on the number of repeaters which can be used. The repeater counts
as a single node in the maximum node count associated with the Ethernet
standard (30 for thin coax).
Workstation
Fig. 7 Use of Repeaters in a Network
BRBRAITT : Nov-2006 15
“DATA NETWORKS” JTOs PH-II – LAN Technologies
It should be noted that in the above diagram, the network number assigned to
the main network segment and the network number assigned to the other
side of the repeater are the same. In addition, the traffic generated on one
segment is propagated onto the other segment. This causes a rise in the total
amount of traffic, so if the network segments are already heavily loaded, it's
not a good idea to use a repeater.
A repeater works at the Physical Layer by simply repeating all data from one
segment to another.
During initialisation, the bridge learns about the network and the routes.
Packets are passed onto other network segments based on the MAC layer.
Each time the bridge is presented with a frame, the source address is stored.
The bridge builds up a table which identifies the segment to which the device
is located on. This internal table is then used to determine which segment
incoming frames should be forwarded to. The size of this table is important,
especially if the network has a large number of workstations/ servers.
BRIDGE
BRBRAITT : Nov-2006 16
“DATA NETWORKS” JTOs PH-II – LAN Technologies
The diagram above shows two separate network segments connected via a
bridge. Note that each segment must have a unique network address number
in order for the bridge to be able to forward packets from one segment to the
other.
♦ since bridges work at the MAC layer, they are transparent to higher
level protocols
♦ used for non routable protocols like NETBEUI which must be bridged
♦ help in localising the network traffic by only forwarding data onto other
segments as required (unlike repeaters)
How Bridges Work
Bridges work at the Data Link layer of the OSI model. Because they were at
this layer, all information contained in the higher levels of the OSI model is
unavailable to them, Therefore, they do not distinguish between one protocol
and another. Bridges simply pass all protocols along the network. Because all
protocols pass across bridges, it is up to individual computers to determine
which protocols they can recognise.
You may remember that the Data Link layer has two sub layers, the Logical
Link Control sub layer and the Media Access Control sub layer. Bridges work
at the Media Access Control sub layer and are sometimes referred to as
Media Access Control layer bridges.
BRBRAITT : Nov-2006 17
“DATA NETWORKS” JTOs PH-II – LAN Technologies
If the destination is listed in routing table, the bridge forwards the packets
to that segment (unless it is the same segment as the source).
A bridge works on the principle that each network node has its own address.
A bridge forwards packets based on the address of the destination node.
Bridges actually have some degree of intelligence in that they learn where to
forward data. As traffic passes through the bridge, information about the
computer addresses is stored in the bridge’s RAM. The bridge uses this RAM
to build a routing table based on source addresses.
Initially, the bridge’s routing table is empty. As nodes transmit packets, the
source address is copied to the routing table. With this address information,
the bridge learns which computers are on which segment of the network.
Bridges build their routing tables bases on the addresses of computers that
have transmitted data on the network. Specifically, bridges use source
addresses – the address of the device initiates the transmission – to create
routing table.
When the bridge receives a packet, the source address is compared to the
routing table. If the source address is not there, it is added to the table. The
bridge then compares the destination address with the routing table
database.
♦ If the destination address is in the routing table and not in the same
segment as the source address, the bridge forwards the packet out of
the appropriate port to reach the destination address.
BRBRAITT : Nov-2006 18
“DATA NETWORKS” JTOs PH-II – LAN Technologies
Therefore, bridges can use routing tables to reduce the traffic on the network
by controlling which packets get forwarded to other segments. This
controlling (or restricting) of the flow of network traffic is known as
segmenting network traffic.
A large network is not limited to one bridge. Multiple bridges can be used to
combine several small networks into one large network.
BRBRAITT : Nov-2006 19
“DATA NETWORKS” JTOs PH-II – LAN Technologies
Bridges work at a higher OSI layer than repeaters. This means that bridges
have more intelligence than repeaters and can take more data features into
account.
Bridges are like repeaters in that they can regenerate data, but bridges
regenerate data at the packet level. This means that bridges can send
packets over long distances using a variety of long distance media.
Bridge Considerations
Bridges have all of the features of a repeater, but also accommodate more
nodes. They provide better network performance than a repeater. Because
the network has been divided, there will be fewer computers competing for
available resources on each segment.
To look at it another way, if a large Ethernet network were divided into two
segments connected by a bridge, each new network would carry fewer
packets, have fewer collisions, and operate more efficiently. Although each of
the networks was separate, the bridge would pass appropriate traffic between
them.
Implementing Bridges
♦ Relatively inexpensive.
Summary
Consider the following when you are thinking about using bridges to expand
your network.
• Bridges have all of the features of a repeater.
• They connect two segments and regenerate the signal at the packet
level.
• They function at the Data Link layer of the OSI model.
• Bridges are not suited to WANs slower than 56K.
BRBRAITT : Nov-2006 20
“DATA NETWORKS” JTOs PH-II – LAN Technologies
Transparent Bridges (also known as spanning tree, IEEE 802.1 D) make all
routing decisions. The bridge is said to be transparent (invisible) to the
workstations. The bridge will automatically initialise itself and configure its
own routing information after it has been enabled.
A bridge works at the MAC Layer by looking at the destination address and
forwarding the frame to the appropriate segment upon which the destination
computer resides.
BRBRAITT : Nov-2006 21
“DATA NETWORKS” JTOs PH-II – LAN Technologies
BRBRAITT : Nov-2006 22
“DATA NETWORKS” JTOs PH-II – LAN Technologies
♦ redundant paths to other networks are not used (would be useful if the
major path being used
♦ was overloaded)
ROUTERS
Routers work at the Network layer of the OSI model. This means they can
switch and route packets across multiple networks. They do this by
exchanging protocol-specific information between separate networks.
Routers read complex network addressing information in the packet and,
because they function at a higher layer in the OSI model than bridges, they
have access to additional information.
The routing table found in routes contain network addresses. However, host
addresses may be kept depending on the protocol the network is running. A
router uses a table to determine the destination address for incoming data.
The table lists the following information :
♦ All known network addresses
♦ How to connect to other networks
♦ The possible path between those routers
♦ The cost of sending data over those paths
The router selects the best route for the data based on cost & available
paths.
Note : Remember that routing tables were also discussed with bridges. The
routing table maintained by a bridge contains Media Access Control sublayer
addresses for each node, while the routing table maintained by a router
contains network numbers. Even though manufacturers of these two different
types of equipment have chosen to use the term routing table, it has a
different meaning for bridge than it does for routers.
When router receives packets destined for a remote network, they send them
to the router that manages the destination network. In some ways this is an
advantage because it means routers can :
♦ Segment large networks into smaller ones.
♦ Act as safety barrier between segments.
♦ Prohibit broadcast storms, because broadcasts are not forwarded.
Because routers must perform complex functions on each packet, routers are
slower than most bridges. As packets are passed from router to router, Data
Link layer source and destination addresses are stripped off and then
recreated. This enables a router to route a packet from a TCP/IP Ethernet
network to a server on a TCP/IP Token Ring Network.
Because the routers only read addresses network packets, they will not allow
bad data to get passed on to the network. Because they do not pass the bad
data or broadcast data storms, router put little stress on networks.
Routers do not look at the destination node address; they only look at the
network address. Routers will only pass information if the network address is
known. This ability to control the data passing through the router reduces the
BRBRAITT : Nov-2006 24
“DATA NETWORKS” JTOs PH-II – LAN Technologies
amount of traffic between networks and allows router to use these links more
efficiently than bridges.
Using the router addressing scheme, administrators can break one large
network into many separate networks, and because routers do not pass or
even handle every packet, they act as a safety barrier between network
segments. This can greatly reduce the amount of traffic on the network and
the wait time experienced by users.
Routable Protocols
Not all protocols work with routers. The one that are routable include :
• DECnet
• IP
• IPX
• OSI
• XNS
• DDP (AppleTalk)
There are routers available which can accommodate multiple protocols such
as IP and DECnet in the same network.
Packets are only passed to the network segment they are destined for.
They work similar to bridges and switches in that they filter out unnecessary
network traffic and remove it from network segments. Routers generally work
at the protocol level.
Most routers can also perform bridging functions. A major feature of routers,
because they can filter packets at a protocol level, is to act as a firewall. This
is essentially a barrier, which prevents unwanted (unauthorised) packets
either entering or leaving designated areas of the network.
BRBRAITT : Nov-2006 25
“DATA NETWORKS” JTOs PH-II – LAN Technologies
There are many types of hubs. Passive hubs are simple splitters or
combiners that group workstations into a single segment, whereas active
hubs include a repeater function and are thus capable of supporting many
more connections.
Nowadays, with the advent of 10BaseT, hub concentrators are being very
popular. These are very sophisticated and offer significant features which
make them radically different from the older hubs which were available during
the 1980's. These 10BaseT hubs provide each client with exclusive access to
the full bandwidth, unlike bus networks where the bandwidth is shared. Each
workstation plugs into a separate port, which runs at 10 Mbps and is for the
exclusive use of that workstation, thus there is no contention to worry about
like in Ethernet.
In standard Ethernet, all stations are connected to the same network segment
in bus configuration. Traffic on the bus is controlled using CSMA (Carrier
Sense Multiple Access) protocol, and all stations share the available
bandwidth.
BACKPLANE
BRBRAITT : Nov-2006 26
“DATA NETWORKS” JTOs PH-II – LAN Technologies
Fig.
9
Ports can also be buffered, to allow packets to be held in case the hub or port
is busy. And, because each workstation has its own port, it does not contend
with other workstations for access, having the entire bandwidth available for
its exclusive use.
The ports on a hub all appear as one Ethernet segment. In addition, hubs can
be stacked or cascaded (using master/ slave configurations) together, to add
more ports per segment. As hubs do not count as repeaters, this is a better
solution for adding more workstations than the use of a repeater.
♦ Each port has exclusive access to its bandwidth (no CSMA/ CD)
The most commonly used medium access control technique for bus/ tree and
star topologies is carrier-sense multiple access with collision detection
(CSMA/CD). The original baseband version of this technique was developed
by Xerox as part of the Ethernet LAN. Ethernet is currently the most popular
BRBRAITT : Nov-2006 27
“DATA NETWORKS” JTOs PH-II – LAN Technologies
Ethernet Features
Ethernet media is passive which means it draws power from the computer
and thus will not fail unless the media is physically cut or improperly
terminated.
BRBRAITT : Nov-2006 28
“DATA NETWORKS” JTOs PH-II – LAN Technologies
Precursors
The earlier of these techniques, known as ALOHA, was developed for packet
radio networks. However it is applicable to any shared transmission medium.
ALOHA, or pure ALOHA as it is sometimes called, is a true free-for-all.
Whenever a station has a frame to send, it does so. The station then listens
for an amount of time equal to the maximum possible round-trip propagation
delay on the network (twice the time it takes to send a frame between the two
most widely separated stations) plus a small fixed time increment. If the
station hears an acknowledgment during that time, fine; otherwise, it re-sends
the frame. If the station fails to receive an acknowledgment after repeated
transmissions, it gives up. A receiving station determines the correctness of
an incoming frame by examining a frame check-sequence field, as in HDLC.
If the frame is valid and if the destination address in the frame header
matches the receiver’s address, the station immediately sends an
acknowledgment. The frame may be invalid due to noise on the channel or
because another station transmitted a frame at about the same time. In the
latter case, the two frames may interface with each other at the receiver so
that neither gets through; this is known as collision. If a received frame is
determined to be invalid, the receiving station simply ignores the frame.
Description of CSMA/ CD
CSMA, although more efficient than ALOHA or slotted ALOHA, still has one
glaring inefficiency : when two frames collide, the medium remains unusable
for the duration of transmission of both damaged frames. For long frames,
compared to propagation time, the amount of wasted capacity can be
considerable. This waste can be reduced if a station continues to listen to the
medium while transmitting.
BRBRAITT : Nov-2006 29
“DATA NETWORKS” JTOs PH-II – LAN Technologies
Figure 10 below illustrates the techniques for a baseband bus. At time t0,
station A begins transmitting a packet addressed to D. At t1, both B and C are
ready to transmit. B senses a transmission and so defers. C, however, is still
unaware of A’s transmission and begins its own transmission. When A’s
transmission reaches C, at t2, C detects the collision and cases transmission.
The effect of the collision propagates back to A, where it is detected some
time later, t3, at which time A ceases transmission.
t0
A B C D
t1
A B C D
t2
A B C D
t3
A B C D
With CSMA/CD, the amount of wasted capacity is reduced to the time it takes
to detect a collision. Question : how long does that take? Let us consider the
first case of a baseband bus and consider the two stations as far apart as
possible. For example, in the above figure, suppose that station A begins a
transmission and that just before that transmission reaches D, D is ready to
BRBRAITT : Nov-2006 30
“DATA NETWORKS” JTOs PH-II – LAN Technologies
For a broadband bus, the delay is even longer. Figure 11 shows the dual-
cable system. This time, the worst case occurs for two stations as close
together as possible as far as possible for the headend. In this case, the
maximum time to detect a collision is four times the propagation delay from
an end of the cable to the head-end.
t0
A B
A begins transmission
t1 A B
B begins transmission just before leading edge of A’s packet arrives at B’s receiver;
B almost immediately detects A’s transmission and cases its own transmission.
t2 A B
A detects collision
BRBRAITT : Nov-2006 31
“DATA NETWORKS” JTOs PH-II – LAN Technologies
detection does not occur, and CSMA/CD exhibits the same performance as
the less efficient CSMA protocol.
Collision detection also differs for the two systems. For baseband, a collision
should produce substantially higher voltage swings than those produced by a
single transmitter. Accordingly, the IEEE standard dictates that the transmitter
will detect a collision of the signal on the cable at the transmitter tap point
exceeds the maximum that could be produced by the transmitter alone.
Because a transmitted signal attenuates as it propagates, there is a potential
problem: If two stations far apart are transmitting, each station will receive a
greatly attenuated signal from the other. The signal strength could be so
small that when it is added to the transmitted signal at the transmitted tap
point, the combined signal does not exceed the CD threshold. For this
reason, among others, the IEEE standard restricts the maximum length of
coaxial cable to 500 m for 10BASE5 and 200m for 10BASE2.
A much simpler collision detection scheme is possible with the twisted pair
star-topology approach. In this case, collision detection is based on logic
rather than on sensing voltage magnitudes. For any hub, if there is activity
(signal) on more than one input, a collision is assumed. A special signal
called the collision presence signal is generated. This signal is generated
and sent out as long as activity is sensed on any of the input lines. This
signal is interpreted by every node as an occurrence of a collision.
MAC Frame
Figure 12 depicts the frame format for the 802.3 protocol; it consists of the
following fields :
• Preamble : A 7-octet pattern of alternating 0s and 1s used by the
receiver to establish bit synchronization.
BRBRAITT : Nov-2006 32
“DATA NETWORKS” JTOs PH-II – LAN Technologies
• Source address (SA) : Specifies the station that sent the frame.
• Pad : Octets added to ensure that the frame is long enough for proper
CD operation.
• Frame check sequence (FCS). A 32-bit cyclic redundancy check,
based on all fields except the preamble, the SFD, and the FCS.
Octets
Preamble SFD DA SA Length LLC Pad FCS
Data
LEGEND
Scalability: Configurations for wireless LANs are easily changed and range
from peer-to-peer networks suitable for a small number of users to full
infrastructure networks of thousands of users that enable roaming over a
broad area. Adding a user to the network is as simple as equipping a PC or
laptop with a wireless LAN adapter card or USB device.
BRBRAITT : Nov-2006 34
“DATA NETWORKS” JTOs PH-II – LAN Technologies
BRBRAITT : Nov-2006 35
“DATA NETWORKS” JTOs PH-II – LAN Technologies
Healthcare
Doctors and nurses in hospitals are more productive when utilizing
notebook computers with wireless LAN adapters to deliver patient
information instantly.
Types of Wireless LAN Technology
When evaluating wireless LAN solutions, there are a number of technologies
to choose from. Each comes with its own set of advantages and limitations:
Narrowband Technology
A narrowband radio system transmits and receives user information on
a specific radio frequency. Narrowband radio keeps the radio signal
frequency as narrow as possible just to pass the information.
Undesirable crosstalk between communications channels is avoided
by coordinating different users on different channel frequencies. The
drawback to this type of technology is that the end-user must obtain an
FCC license for each site where it is employed.
Spread Spectrum Technology
Most wireless LAN systems use spread-spectrum technology, a
wideband radio frequency technique developed by the military for use
in reliable, secure, mission-critical communications systems. Spread-
spectrum is designed to trade off bandwidth efficiency for reliability,
integrity and security. In other words, more bandwidth is consumed to
produce a louder and thus easier to detect broadcast signal. The
drawback to this technology is when the receiver is not tuned to the
right frequency, a spread-spectrum signal looks like background noise.
There are two types of spread spectrum radio: frequency hopping and
direct sequence:
Frequency-hopping Spread Spectrum Technology – (FHSS) uses a
narrowband carrier that hops among several frequencies at a specific
rate and sequence as a way of avoiding interference. Properly
synchronized, the net effect is to maintain a single logical channel. To
an unintended receiver, FHSS appears to be short-duration impulse
noise.
Direct-Sequence Spread Spectrum Technology – (DSSS) uses a
radio transmitter to spread data packets over a fixed range of the
frequency band. To an unintended receiver, DSSS appears as low-
power wideband noise and is rejected by most narrowband receivers.
The interoperability standard IEEE 802.11b is focusing on utilizing 11M
bps high rate DSSS technology as the standard for wireless networks.
Infrared Technology – little used in commercial wireless LANs,
infrared (IR) systems use very high frequencies, just below visible light
in the electromagnetic spectrum, to carry data.
BRBRAITT : Nov-2006 36
“DATA NETWORKS” JTOs PH-II – LAN Technologies
BRBRAITT : Nov-2006 37
“DATA NETWORKS” JTOs PH-II – LAN Technologies
Access points have a finite range for transmission -- around 100 meters (328
feet) indoors and 300 meters (984 feet) outdoors. In a very large facility such
as a warehouse, or on a college campus, it will probably be necessary to
install more than one access point. Access point positioning is accomplished
by means of a site survey. The goal is to blanket the coverage area with
overlapping coverage cells so that clients might range throughout the area
without ever losing network contact. The ability of clients to move seamlessly
among a cluster of access points is called roaming. Access points hand the
client off from one to another in a way that is invisible to the client, ensuring
unbroken connectivity.
BRBRAITT : Nov-2006 38
“DATA NETWORKS” JTOs PH-II – LAN Technologies