Saturday, May 9, 2009

Lesson 4: LAN Basics

In this lesson, we will cover the fundamentals of LAN technologies. We’ll look at Ethernet, Token Ring, and FDDI. For each one, we’ll look at the technology as well as its operations.

The Agenda

- Ethernet

- Token Ring

- FDDI

Common LAN Technologies

The three LAN technologies shown here account for virtually all deployed LANs:

The most popular local area networking protocol today is Ethernet. Most network administrators building a network from scratch use Ethernet as a fundamental technology.


Token Ring technology is widely used in IBM networks.


FDDI networks are popular for campus LANs – and are usually built to support high bandwidth needs for backbone connectivity.

Let’s take a look at Ethernet in detail.

Ethernet

Ethernet and IEEE 802.3

Ethernet was initially developed by Xerox. They were later joined by Digital Equipment Corporation (DEC) and Intel to define the Ethernet 1 specification in 1980. There have been further revisions including the Ethernet standard (IEEE Standard 802.3) which defines rules for configuring Ethernet as well as specifying how elements in an Ethernet network interact with one another.
Ethernet is the most popular physical layer LAN technology because it strikes a good balance between speed, cost, and ease of installation. These strong points, combined with wide acceptance in the computer marketplace and the ability to support virtually all popular network protocols, make Ethernet an ideal networking technology for most computer users today.
The Fast Ethernet standard (IEEE 802.3u) has been established for networks that need higher transmission speeds. It raises the Ethernet speed limit from 10 Mbps to 100 Mbps with only minimal changes to the existing cable structure. Incorporating Fast Ethernet into an existing configuration presents a host of decisions for the network manager. Each site in the network must determine the number of users that really need the higher throughput, decide which segments of the backbone need to be reconfigured specifically for 100BaseT and then choose the necessary hardware to connect the 100BaseT segments with existing 10BaseT segments.
Gigabit Ethernet is an extension of the IEEE 802.3 Ethernet standard. It increases speed tenfold over Fast Ethernet, to 1000 Mbps, or 1 Gbps.

Benefits and background

- Ethernet is the most popular physical layer LAN technology because it strikes a good balance between speed, cost, and ease of installation
- Supports virtually all network protocols
- Xerox initiated, then joined by DEC & Intel in 1980

Revisions of Ethernet specification

- Fast Ethernet (IEEE 802.3u) raises speed from 10 Mbps to 100 Mbps
- Gigabit Ethernet is an extension of IEEE 802.3 which increases speeds to 1000 Mbps, or 1 Gbps

One thing to keep in mind in Ethernet is that there are several framing variations that exist for this common LAN technology.
These differences do not prohibit manufacturers from developing network interface cards that support the common physical layer, and software that recognizes the differences between the two data links

Ethernet Protocol Names

Ethernet protocol names follow a fixed scheme. The number at the beginning of the name indicates the wire speed. If the word “base” appears next, the protocol is for baseband applications. If the word “broad” appears, the protocol is for broadband applications. The alphanumeric code at the end of the name indicates the type of cable and, in some cases, the cable length. If a number appears alone, you can determine the maximum segment length by multiplying that number by 100 meters. For example 10Base2 is a protocol with a maximum segment length of approximately 200 meters (2 x 100 meters).

Wednesday, April 1, 2009

Ethernet and Fast Ethernet

This chart give you an idea of the range of Ethernet protocols including their data rate, maximum segment length, and medium.
Ethernet has survived as an essential media technology because of its tremendous flexibility and its relative simplicity to implement and understand. Although other technologies have been touted as likely replacements, network managers have turned to Ethernet and its derivatives as effective solutions for a range of campus implementation requirements. To resolve Ethernet’s limitations, innovators (and standards bodies) have created progressively larger Ethernet pipes. Critics might dismiss Ethernet as a technology that cannot scale, but its underlying transmission scheme continues to be one of the principal means of transporting data for contemporary campus applications.
The most popular today is 10BaseT and 100BaseT… 10Mbps and 100Mbps respectively using UTP wiring.

Let’s take a look at how Ethernet works.

Ethernet Operation

Example:-

Let’s say in our example here that station A is going to send information to station D. Station A will listen through its NIC card to the network. If no other users are using the network, station A will go ahead and send its message out on to the network. Stations B and C and D will all receive the communication.

At the data link layer it will inspect the MAC address. Upon inspection station D will see that the MAC address matches its own and then will process the information up through the rest of the layers of the seven layer model.

As for stations B & C, they too will pull this packet up to their data link layers and inspect the MAC addresses. Upon inspection they will see that there is no match between the data link layer MAC address for which it is intended and their own MAC address and will proceed to dump the packet.

Ethernet Broadcast

Broadcasting is a powerful tool that sends a single frame to many stations at the same time. Broadcasting uses a data link destination address of all 1s. In this example, station A transmits a frame with a destination address of all 1s, stations B, C, and D all receive and pass the frame to their respective upper layers for further processing.
When improperly used, however, broadcasting can seriously impact the performance of stations by interrupting them unnecessarily. For this reason, broadcasts should be used only when the MAC address of the destination is unknown or when the destination is all stations.

Ethernet Reliability

Ethernet is known as being a very reliable local area networking protocol. In this example, A is transmitting information and B also has information to transmit. Let’s say that A & B listen to the network, hear no traffic and broadcast at the same time. A collision occurs when these two packets crash into one another on the network. Both transmissions are corrupted and unusable.

When a collision occurs on the network, the NIC card sensing the collision, in this case, station C sends out a jam signal that jams the entire network for a designated amount of time.

Once the jam signal has been received and recognized by all of the stations on the network, stations A and D will both back off for different amounts of time before they try to retransmit. This type of technology is known as Carrier Sense Multiple Access With Collision Detection – CSMA/CD.

High-Speed Ethernet Options

- Fast Ethernet
- Fast EtherChannel®
- Gigabit Ethernet
- Gigabit EtherChannel

We’ve mentioned that Ethernet also has high speed options that are currently available. Fast Ethernet is used widely at this point and provides customers with 100 Mbps performance, a ten-fold increase. Fast EtherChannel is a Cisco value-added feature that provides bandwidth up to 800 Mbps. There is now a standard for Gigabit Ethernet as well and Cisco provides Gigabit Ethernet solutions with 1000 Mbps performance.

Let’s look more closely at Fast EtherChannel and Gigabit Ethernet.

What Is Fast EtherChannel?

Grouping of multiple Fast Ethernet interfaces into one logical transmission path

- Scalable bandwidth up to 800+ Mbps
- Using industry-standard Fast Ethernet
- Load balancing across parallel links
- Extendable to Gigabit Ethernet

Fast EtherChannel provides a solution for network managers who require higher bandwidth between servers, routers, and switches than Fast Ethernet technology can currently provide.
Fast EtherChannel is the grouping of multiple Fast Ethernet interfaces into one logical transmission path providing parallel bandwidth between switches, servers, and Cisco routers. Fast EtherChannel provides bandwidth aggregation by combining parallel 100-Mbps Ethernet links (200-Mbps full-duplex) to provide flexible, incremental bandwidth between network devices.
For example, network managers can deploy Fast EtherChannel consisting of pairs of full-duplex Fast Ethernet to provide 400+ Mbps between the wiring closet and the data center, while in the data center bandwidths of up to 800 Mbps can be provided between servers and the network backbone to provide large amounts of scalable incremental bandwidth.
Cisco’s Fast EtherChannel technology builds upon standards-based 802.3 full-duplex Fast Ethernet. It is supported by industry leaders such as Adaptec, Compaq, Hewlett-Packard, Intel, Micron, Silicon Graphics, Sun Microsystems, and Xircom and is scalable to Gigabit Ethernet in the future.

What Is Gigabit Ethernet?

In some cases, Fast EtherChannel technology may not be enough.
The old 80/20 rule of network traffic (80 percent of traffic was local, 20 percent was over the backbone) has been inverted by intranets and the World Wide Web. The rule of thumb today is to plan for 80 percent of the traffic going over the backbone.



Gigabit networking is important to accommodate these evolving needs.
Gigabit Ethernet builds on the Ethernet protocol but increases speed tenfold over Fast Ethernet, to 1000 Mbps, or 1 Gbps. It promises to be a dominant player in high-speed LAN backbones and server connectivity. Because Gigabit Ethernet significantly leverages on Ethernet, network managers will be able to leverage their existing knowledge base to manage and maintain Gigabit networks.

The Gigabit Ethernet spec addresses three forms of transmission media though not all are available yet:

- 1000BaseLX: Long-wave (LW) laser over single-mode and multimode fiber
- 1000BaseSX: Short-wave (SW) laser over multimode fiber
- 1000BaseCX: Transmission over balanced shielded 150-ohm 2-pair STP copper cable
- 1000BaseT: Category 5 UTP copper wiring Gigabit Ethernet allows Ethernet to scale from 10 Mbps at the desktop, to 100 Mbps to the workgroup, to 1000 Mbps in the data center. By leveraging the current Ethernet standards as well as the installed base of Ethernet and Fast Ethernet switches and routers, network managers do not need to retrain and relearn a new technology to provide support for Gigabit Ethernet.

Token Ring (IEEE 802.5)

The Token Ring network was originally developed by IBM in the 1970s. It is still IBM’s primary LAN technology and is second only to Ethernet in general LAN popularity. The related IEEE 802.5 specification is almost identical to and completely compatible with IBM’s Token Ring network.
Collisions cannot occur in Token Ring networks. Possession of the token grants the right to transmit. If a node receiving the token has no information to send, it passes the token to the next end station. Each station can hold the token for a maximum period of time.
Token-passing networks are deterministic, which means that it is possible to calculate the maximum time that will pass before any end station will be able to transmit. This feature and several reliability features make Token Ring networks ideal for applications where delay must be predictable and robust network operation is important. Factory automation environments are examples of such applications.
Token Ring is more difficult and costly to implement. However, as the number of users in a network rises, Token Ring’s performance drops very little. In contrast, Ethernet’s performance drops significantly as more users are added to the network.

Token Ring Bandwidth

Here are some of the speeds associated with Token Ring. Note that Token Ring runs at 4 Mbps or 16 Mbps. Today, most networks operate at 16 Mbps. If a network contains even one component with a maximum speed of 4 Mbps, the whole network must operate at that speed.
When Ethernet first came out, networking professionals believed that Token Ring would die, but this has not happened. Token Ring is primarily used with IBM networks running Systems Network Architecture (SNA) networking operating systems. Token Ring has not yet left the market because of the huge installed base of IBM mainframes being used in industries such as banking.
The practical difference between Ethernet and Token Ring is that Ethernet is much cheaper and simpler. However, Token Ring is more elegant and robust.

Token Ring Topology

The logical topology of an 802.5 network is a ring in which each station receives signals from its nearest active upstream neighbor (NAUN) and repeats those signals to its downstream neighbor. Physically, however, 802.5 networks are laid out as stars, with each station connecting to a central hub called a multistation access unit or MAU. The stations connect to the central hub through shielded or unshielded twisted-pair wire.
Typically, a MAU connects up to eight Token Ring stations. If a Token Ring network consists of more stations than a MAU can handle, or if stations are located in different parts of a building–for example on different floors–MAUs can be chained together to create an extended ring. When installing an extended ring, you must ensure that the MAUs themselves are oriented in a ring. Otherwise, the Token Ring will have a break in it and will not operate.

Token Ring Operation

Station access to a Token Ring is deterministic; a station can transmit only when it receives a special frame called a token. One station on a token ring network is designated as the active monitor. The active monitor will prepare a token. A token is usually a few bits with significance to each one of the network interface cards on the network. The active monitor will pass the token into the multistation access unit. The multistation access unit then will pass the token to the first downstream neighbor. Let’s say in this example that station A has something to transmit. Station A will seize the token and append its data to the token. Station A will then send its token back to the multistation access unit. The MAU will then grab the token and push it to the next downstream neighbor. This process is followed until the token reaches the destination for which it is intended.

If a station receiving the token has no information to send, it simply passes the token to the next station. If a station possessing the token has information to transmit, it claims the token by altering one bit of the frame, the T bit. The station then appends the information it wishes to transmit and sends the information frame to the next station on the Token Ring.

The information frame circulates the ring until it reaches the destination station, where the frame is copied by the station and tagged as having been copied. The information frame continues around the ring until it returns to the station that originated it, and is removed.
Because frames proceed serially around the ring, and because a station must claim the token before transmitting, collisions are not expected in a Token Ring network.
Broadcasting is supported in the form of a special mechanism known as explorer packets. These are used to locate a route to a destination through one or more source route bridges.

- Token Ring Summary -

- Reliable transport, minimized collisions

- Token passing/token seizing

- 4- or 16-Mbps transport

- Little performance impact with increased number of users

- Popular at IBM-oriented sites such as banks and automated factories

FDDI - Fiber Distributed Data Interface

FDDI is an American National Standards Institute (ANSI) standard that defines a dual Token Ring LAN operating at 100 Mbps over an optical fiber medium. It is used primarily for corporate and carrier backbones.
Token Ring and FDDI share several characteristics including token passing and a ring architecture which were explored in the previous section on Token Ring.
Copper Distributed Data Interface (CDDI) is the implementation of FDDI protocols over STP and UTP cabling. CDDI transmits over relatively short distances (about 100 meters), providing data rates of 100 Mbps using a dual-ring architecture to provide redundancy.
While FDDI is fast, reliable, and handles a lot of data well, its major problem is the use of expensive fiber-optic cable. CDDI addresses this problem by using UTP or STP. However, notice that the maximum segment length drops significantly.
FDDI was developed in the mid-1980s to fill the needs of growing high-speed engineering workstation capacity and network reliability. Today, FDDI is frequently used as a high-speed backbone technology because of its support for high bandwidth and greater distances than copper.

FDDI Network Architecture

FDDI uses a dual-ring architecture. Traffic on each ring flows in opposite directions (called counter-rotating). The dual-rings consist of a primary and a secondary ring. During normal operation, the primary ring is used for data transmissions, and the secondary ring remains idle. The primary purpose of the dual rings is to provide superior reliability and robustness.
One of the unique characteristics of FDDI is that multiple ways exist to connect devices to the ring. FDDI defines three types of devices: single-attachment station (SAS) such as PCs, dual attachment station (DAS) such as routers and servers, and a concentrator.

- Dual-ring architecture

- Primary ring for data transmissions
- Secondary ring for reliability and robustness

- Components

- Single attachment station (SAS)—PCs
- Dual attachment station (DAS)—Servers
- Concentrator

- FDDI concentrator

- Also called a dual-attached concentrator (DAC)
- Building block of an FDDI network
- Attaches directly to both rings and ensures that any SAS failure or power-down does not bring down the ring

Example:-



An FDDI concentrator (also called a dual-attachment concentrator [DAC]) is the building block of an FDDI network. It attaches directly to both the primary and secondary rings and ensures that the failure or power-down of any single attachment station (SAS) does not bring down the ring. This is particularly useful when PCs, or similar devices that are frequently powered on and off, connect to the ring.

- FDDI Summary -

- Features

- 100-Mbps token-passing network
- Single-mode (100 km), double-mode (2 km)
- CDDI transmits at 100 Mbps over about 100 m
- Dual-ring architecture for reliability

- Optical fiber advantages versus copper

- Security, reliability, and performance are enhanced because it does not emit electrical signals
- Much higher bandwidth than copper

- Used for corporate and carrier backbones


- Summary -

- LAN technologies include Ethernet, Token Ring, and FDDI

- Ethernet

- Most widely used
- Good balance between speed, cost, and ease of installation
- 10 Mbps to 1000 Mbps

- Token Ring

- Primarily used with IBM networks
- 4 Mbps to 16 Mbps

- FDDI

- Primarily used for corporate backbones
- Supports longer distances
- 100 Mbps