FMUSER Wirless Transmit Video And Audio More Easier !
es.fmuser.org
it.fmuser.org
fr.fmuser.org
de.fmuser.org
af.fmuser.org ->Afrikaans
sq.fmuser.org ->Albanian
ar.fmuser.org ->Arabic
hy.fmuser.org ->Armenian
az.fmuser.org ->Azerbaijani
eu.fmuser.org ->Basque
be.fmuser.org ->Belarusian
bg.fmuser.org ->Bulgarian
ca.fmuser.org ->Catalan
zh-CN.fmuser.org ->Chinese (Simplified)
zh-TW.fmuser.org ->Chinese (Traditional)
hr.fmuser.org ->Croatian
cs.fmuser.org ->Czech
da.fmuser.org ->Danish
nl.fmuser.org ->Dutch
et.fmuser.org ->Estonian
tl.fmuser.org ->Filipino
fi.fmuser.org ->Finnish
fr.fmuser.org ->French
gl.fmuser.org ->Galician
ka.fmuser.org ->Georgian
de.fmuser.org ->German
el.fmuser.org ->Greek
ht.fmuser.org ->Haitian Creole
iw.fmuser.org ->Hebrew
hi.fmuser.org ->Hindi
hu.fmuser.org ->Hungarian
is.fmuser.org ->Icelandic
id.fmuser.org ->Indonesian
ga.fmuser.org ->Irish
it.fmuser.org ->Italian
ja.fmuser.org ->Japanese
ko.fmuser.org ->Korean
lv.fmuser.org ->Latvian
lt.fmuser.org ->Lithuanian
mk.fmuser.org ->Macedonian
ms.fmuser.org ->Malay
mt.fmuser.org ->Maltese
no.fmuser.org ->Norwegian
fa.fmuser.org ->Persian
pl.fmuser.org ->Polish
pt.fmuser.org ->Portuguese
ro.fmuser.org ->Romanian
ru.fmuser.org ->Russian
sr.fmuser.org ->Serbian
sk.fmuser.org ->Slovak
sl.fmuser.org ->Slovenian
es.fmuser.org ->Spanish
sw.fmuser.org ->Swahili
sv.fmuser.org ->Swedish
th.fmuser.org ->Thai
tr.fmuser.org ->Turkish
uk.fmuser.org ->Ukrainian
ur.fmuser.org ->Urdu
vi.fmuser.org ->Vietnamese
cy.fmuser.org ->Welsh
yi.fmuser.org ->Yiddish
Local Area Network (LAN) refers to a computer network that covers a local area and is usually used within an organization.
Compared with a wide area network, a local area network usually has a small physical span and a small number of devices but has high bandwidth requirements.
Compared with the OSI reference model, the local area network technology mainly defines the realization of the physical layer and the data link layer. That is, it defines the physical characteristics of the medium, realizes point-to-point physical addressing and line control functions, and may also include error control, flow control and other functions.
Ring and star are the most common local area network topologies, in addition to bus type and tree type.
Ethernet is currently the most widely used local area network technology. It uses switches for network connection and organization, and uses a star or bus topology.
IEEE802 Reference Model#
Early LAN technologies were developed by various manufacturers and were incompatible with each other. IEEE proposed the 802 series of standards, which promoted the standardization of LAN technologies.
The IEEE802 physical layer defines the transmission media and topology, making it compatible with multiple transmission media such as twisted pair, coaxial cable, optical fiber, and wireless.
Compared with the OSI reference model, IEEE802 divides the functions of the data link layer into two sublayers: Media Access Control (MAC) and Logic Link Control (LLC).
Media Access Control#
The MAC sublayer directly controls the transmission of frames on the channel, providing physical addressing and line control functions. The MAC sublayer accepts data blocks from the LLC layer, and adds a MAC header and tailer to encapsulate them into frames.
The MAC header generally contains the control field, destination MAC address, source MAC address, etc., and the MAC tail generally contains the verification information of the frame.
The core task of the MAC sublayer is to solve the problem of conflicts when different devices in the local area network compete for shared channels.According to the different deployment positions of resource allocation strategies, it is divided into two types: centralized and distributed.
Centralized control uses a controller to allocate channel resources, and any device using the channel must be authorized by the controller.
In a distributed control network, all devices cooperate to perform resource allocation. For example, in a token ring network, a special frame called a token is transmitted on the channel, and only the device that receives the frame can use the channel.
Carrier Sense Multiple Access (CSMA) is a distributed media access control protocol.
CSMA is divided into 3 categories according to the monitoring and sending strategy:
Discontinuous CSMA: When the device monitors that the channel is busy or conflicts, it will wait for a random period of time and then monitor again, and the channel will be sent immediately if the channel is idle. This strategy has a higher delay and a lower channel utilization.
Continuous CSMA: When the device detects that the channel is busy or conflicts, it will always monitor, and if the channel is free, it will send immediately. The channel utilization is high, but more conflicts will occur.
p-Continuous CSMA: The device will always monitor when the channel is busy or conflict. If the channel is free, it will decide whether to send according to the probability p. Continuous CSMA can be regarded as a special case of p-Continuous CSMA: 1-Continuous CSMA
These methods can reduce the occurrence of conflicts, but they cannot completely solve the collision problem. We need to improve the program.
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) requires the device to monitor while sending the frame. If a conflict is detected during the sending process, the conflict processing will be executed:
Suspend data transmission and send an all-one signal as a blocking message, so that other devices can detect the conflict as soon as possible.
Wait for a random period of time within a certain range and then send again
If the conflict occurs again, the truncated binary exponential backoff algorithm is used to send, that is, the waiting time for each time is twice that of the previous time. After 16 attempts, the sending is still failed.
Carrier Sense Multiple Access with Collision Avoidance (CSMA/CA) uses active monitoring to avoid conflicts. There are two main methods to avoid conflicts:
When the channel is idle and the device is ready to send, the device always waits for a random period of time, and then sends data when it finds that the channel is still idle after the waiting. Since the waiting time of each device is randomly generated, the possibility of conflict again is greatly reduced.
The device first sends a small RTS (Request to Send) frame to the nearest access point (Access Point) before sending the frame, and waits for the target to reply with a CTS (Clear to Send) frame before starting to send.
The CSMA/CA scheme was adopted by IEEE802.11. In addition, there are methods such as bit arbitration (BA) and carrier priority (CP).
Logical Link Control#
The logical link control (LLC) sublayer works above the MAC sublayer and provides an interface for network layer access.
The following figure shows the relationship between the layers within a frame:
The LLC layer provides functions such as frame error control and flow control, and LLC provides 3 working modes:
Unconfirmed connectionless service
Connection service
Connectionless service with confirmation
Unacknowledged connectionless service is a service in the form of datagrams, which does not include error control and flow control functions. Because upper-layer software such as TCP provides reliability assurance and flow control functions, unacknowledged connectionless services reduce repetition and increase For efficiency, it is the best choice most of the time.
The connection service is suitable for simple devices without upper-layer network protocol support. It requires the devices to establish a logical connection through handshake and then communicate. It provides reliability assurance and flow control functions.
The connection method requires logical link control software to maintain a large amount of connection data, and it takes time to establish a logical link before communication. In automation control and other occasions, the control host needs to communicate with a large number of embedded controllers, and the communication timeliness and timeliness High reliability requirements.
The connectionless service with confirmation does not establish a logical connection, but requires the receiver to send a confirmation message after receiving the data.
The data transmitted by the LLC protocol is called the Protocol Data Unit (PDU).
Corresponding to the 3 working modes, LLC is divided into three operations:
Type 1 operation: Use unnumbered PDUs to implement connectionless services without confirmation
Type 2 operation: use asynchronous balance mode to support LLC services in connection mode
Type 3 operation: use two unnumbered PDUs to realize connectionless service with confirmation
The three operations all use the same PDU format, and they all consist of 4 fields:
Destination Service Access Point (DSAP), 7bit
Source Service Access Point (SSAP), 7bit
DSAP type, single address or group address, 1bit
PDU type, command PDU or response PDU, 1bit
Type 1 operations use unnumbered (UI) PDUs for communication, without error control and flow control functions.
In the second type of operation, a device first sends a SABME PDU request to establish a logical link. If the target device accepts the request, it sends an unnumbered acknowledgment (AC) PDU, otherwise it sends a DM PDU to refuse the connection.
After the connection is established, all PDUs between the two parties will have a number for sorting, retransmission and flow control. Both parties can send a Disconnect (DISC) PDU at any time to terminate the logical connection.
Compared with the first type of operation, the type 3 operation adds an unnumbered (UC) PDU for reception confirmation.
Internet equipment#
Hubs and bridges#
A hub (HUB) is a common network device in a star topology. It is connected to multiple devices through a twisted pair cable. Frames from one device are sent to all other devices.
The obvious problem with hubs is that every frame is broadcast, occupying a large number of channels.
Bridge is an early attempt to solve this problem.There are two ports on the bridge, which are connected to two subnets that use the same MAC protocol.
There are two tables inside the bridge that store the MAC addresses of all devices in subnets A and B. When the system starts running, these two tables are empty.
At this time, the bridge receives the frame from A and forwards it to B, and adds the source MAC address of the frame to the table of subnet A.
Similar processing is performed on frames from subnet B. After a period of time, the bridge will obtain almost all MAC addresses in subnets A and B.
When a frame is sent from a device in subnet A to the hub, the frame is broadcast to other devices and bridges in A.
When the bridge finds that the destination MAC belongs to subnet A, it directly discards the frame. If the destination address belongs to subnet B, it will be sent to the hub of B for broadcast.
switch#
Now people use Layer 2 switches (Switch) instead of hubs. Switches also use twisted-pair cables to connect to multiple devices.
The switch maintains a MAC port mapping table internally. This table saves the MAC addresses of all devices connected to it and the ports connected to it.The switch reads the destination MAC address of the frame header and sends it to the corresponding port.
Switches are divided into cut-through and store-and-forward switches. The cut-through switches directly send the frame to the target port, and the store-and-forward switch saves the frame and completes the CRC check and error correction before forwarding it.
When the frame comes from an unknown source MAC address, the switch will add the correspondence between the frame port and MAC to the mapping table. If the mapping table is full, the oldest data will be overwritten.
When a frame is sent to an unknown MAC address, the switch will broadcast the frame. If the target of the frame is indeed a device in the network, the frame sent by the device in response will let the switch know its MAC address.
VLAN is another important function of the switch. It divides the devices under a switch into multiple broadcast domains. When broadcasting, it is only sent to the devices in the same broadcast domain.
Router and Layer 3 Switch#
Broadcasting consumes a lot of network traffic, and routers can isolate local areas to form multiple broadcast domains.
The router is the third layer of the working OSI, that is, the device at the network layer. The core function of the router is to send the IP data packet to the next hop routing device according to the destination IP address.
In addition, routers also have strong network layer control functions, such as NAT and DHCP. However, routers rely on software to decide to use CPU forwarding, and the forwarding rate is much lower than that of switches.
If device A wants to send data to B, then A will use the subnet mask to obtain the network address to determine whether the destination IP is in the same network segment as itself. If it is in the same network segment, but does not know the MAC address required to forward the data, A Just send a broadcast ARP request, and B returns its MAC address.
A large number of ARP broadcasts may occur in the above process, so a device is needed to divide the LAN into multiple broadcast domains according to network segments to reduce the channels occupied by broadcasts.
The router can complete this function, but the router forwarding speed is too slow, we need to combine the high speed of the switch hardware exchange.
The three-layer switch is a switch that can read IP packets and perform some routing functions. It has some network layer control functions and hardware-based high-speed forwarding capabilities.
However, the cost of a three-layer switch is relatively high, and it is usually used in a large local area network.
Conflict domain and broadcast domain#
When multiple devices are connected to the same medium, they may conflict due to media grabbing. The range of media conflicts that may occur in the network is called a conflict domain.
It can be seen that the collision domain is a physical layer concept. The two ports of the bridge divide the network into two collision domains. For the switch, each port of it is a collision domain.
The broadcast domain is the reach of the broadcast frame and belongs to the concept of the data link layer. The devices connected to the bridge are generally in a broadcast domain.
The devices on the switch are generally in a broadcast domain, but the VLAN technology of the switch can be divided into multiple broadcast domains.
|
Enter email to get a surprise
es.fmuser.org
it.fmuser.org
fr.fmuser.org
de.fmuser.org
af.fmuser.org ->Afrikaans
sq.fmuser.org ->Albanian
ar.fmuser.org ->Arabic
hy.fmuser.org ->Armenian
az.fmuser.org ->Azerbaijani
eu.fmuser.org ->Basque
be.fmuser.org ->Belarusian
bg.fmuser.org ->Bulgarian
ca.fmuser.org ->Catalan
zh-CN.fmuser.org ->Chinese (Simplified)
zh-TW.fmuser.org ->Chinese (Traditional)
hr.fmuser.org ->Croatian
cs.fmuser.org ->Czech
da.fmuser.org ->Danish
nl.fmuser.org ->Dutch
et.fmuser.org ->Estonian
tl.fmuser.org ->Filipino
fi.fmuser.org ->Finnish
fr.fmuser.org ->French
gl.fmuser.org ->Galician
ka.fmuser.org ->Georgian
de.fmuser.org ->German
el.fmuser.org ->Greek
ht.fmuser.org ->Haitian Creole
iw.fmuser.org ->Hebrew
hi.fmuser.org ->Hindi
hu.fmuser.org ->Hungarian
is.fmuser.org ->Icelandic
id.fmuser.org ->Indonesian
ga.fmuser.org ->Irish
it.fmuser.org ->Italian
ja.fmuser.org ->Japanese
ko.fmuser.org ->Korean
lv.fmuser.org ->Latvian
lt.fmuser.org ->Lithuanian
mk.fmuser.org ->Macedonian
ms.fmuser.org ->Malay
mt.fmuser.org ->Maltese
no.fmuser.org ->Norwegian
fa.fmuser.org ->Persian
pl.fmuser.org ->Polish
pt.fmuser.org ->Portuguese
ro.fmuser.org ->Romanian
ru.fmuser.org ->Russian
sr.fmuser.org ->Serbian
sk.fmuser.org ->Slovak
sl.fmuser.org ->Slovenian
es.fmuser.org ->Spanish
sw.fmuser.org ->Swahili
sv.fmuser.org ->Swedish
th.fmuser.org ->Thai
tr.fmuser.org ->Turkish
uk.fmuser.org ->Ukrainian
ur.fmuser.org ->Urdu
vi.fmuser.org ->Vietnamese
cy.fmuser.org ->Welsh
yi.fmuser.org ->Yiddish
FMUSER Wirless Transmit Video And Audio More Easier !
Contact
Address:
No.305 Room HuiLan Building No.273 Huanpu Road Guangzhou China 510620
Categories
Newsletter