Introduction to Computer Networks Introduction to Computer Networks.

Slides:



Advertisements
Similar presentations
Data Communications and Networking
Advertisements

INTRODUCTION TO NETWORKS
Token Ring/IEEE Risanuri Hidayat.
CHAPTER Practical Token Ring Implementation. Chapter Objectives Give an overview of the Token Ring LAN Describe the characteristics of the Token Ring.
CHAPTER LAN Topology. Chapter Objectives Describe the characteristics of different LAN topologies –Bus, ring, star and mixed topologies Compare and contrast.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
Token Ring/IEEE Annida Farhana bt SuibWET Azuna Nurzahra bt KandarWET Ima Shanaz bt Wahidin WET Farah Nawwar bt BidinWET
1 Fibre Distributed Data Interface 100Mbps –1986 ANSI - X3T9.5 committee –Supports IEEE Access Methodology = Modified token-passing Logical topology.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
1 Subnets. 2 Token Ring Access Methodology = token passing Logical topology = sequential Physical = traditionally ring, currently star –Logical ring,
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
COMPUTER NETWORKS.
LECTURE 13 NET BASE FP STANDARDS Pair of Fiber Optics. Star topology. 1 km for each part of network. Analog signal. Encoding the digital signal.
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Basic Concepts of Computer Networks
Networking Components
Chapter 4.  Understand network connectivity.  Peer-to-Peer network & Client-Server network  Understand network topology  Star, Bus & Ring topology.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
Network Design Essentials. Guide to Networking Essentials, Fifth Edition2 Contents 1. Examining the Basics of a Network Layout 2. Understanding Standard.
Network Design Essentials
Chapter 5 Networks Communicating and Sharing Resources
LOCAL AREA NETWORS. A local area network (LAN) is a data communication system that allows a number of independent devices to communicate directly with.
Chapter 2 Network Design Essentials Instructor: Nhan Nguyen Phuong.
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
Basic network concepts (Part 5)
20 LAN Hardware Overview Version A.01 H3065S Module 2 Slides.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
Chapter 2 Communications Networks. Introduction Look at: –Telephony Networks (2.2) –OSI Reference Model(2.3) –The Internet (2.4) –Asynchronous Transfer.
LAN Topologies and Standards Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
CSCI 465 D ata Communications and Networks Lecture 19 Martin van Bommel CSCI 465 Data Communications & Networks 1.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
 LANs – A Definition - A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings,
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Chapter 5 Network Architecture. Physical Topologies Bus Ring Star.
Networking Topology 1.BUS Topology 2.RING Topology 3.STAR Topology
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
Understanding Network Architecture CHAPTER FOUR. The Function of Access Methods The set of rules that defines how a computer puts data onto the network.
Local Area Networks: Monil Adhikari. Primary Function of a LAN File serving – large storage disk drive acts as a central storage repository Print serving.
Local Area Networks Honolulu Community College
IEEE l IEEE has had the greatest impact on Layer 2 standards. l IEEE divided Layer 2 into two sublayers.
Ethernet Advanced Chapter 5. Release 16/7/2009 Chapter Objectives Explain 10Base-T network Explain 10Base-FL Explain the rule Identify different.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Introduction to Computer Networks Introduction to Computer Networks.
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Data and Computer Communications Eighth Edition by William Stallings Chapter 15 – Local Area Network Overview.
LAN Topolologies and Security Issues By Alex Gett.
Chapter Seven Network Topology [tə'p ɒ ləd ʒɪ ]. In networking, the term “topology” refers to the layout of connected devices on a network. This article.
SIMS-201 Computer Networks.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D.
Local Area Networks Honolulu Community College
TOKEN BUS & TOKEN RING.
Ethernet and Token Ring LAN Networks
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
Ethernet and Token Ring LAN Networks
شبكات الحاسب 2_2.
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
Protocol layering and data
SIMS-201 Computer Networks.
Protocol layering and data
Ethernet and Token Ring LAN Networks
Presentation transcript:

Introduction to Computer Networks Introduction to Computer Networks

Token Ring This lesson presents an overview of the major Token Ring components, features, and functions.

Overview of Token Ring IBM's version of Token Ring was introduced in 1984 for the entire range of IBM computers and computing environments.IBM's version of Token Ring was introduced in 1984 for the entire range of IBM computers and computing environments. The goal of IBM's version of Token Ring was to facilitate a simple wiring structure using twisted- pair cable that connects a computer to the network through a wall socket, with the main wiring located in a centralized location.The goal of IBM's version of Token Ring was to facilitate a simple wiring structure using twisted- pair cable that connects a computer to the network through a wall socket, with the main wiring located in a centralized location. In 1985, the IBM Token Ring became an American National Standards Institute (ANSI)/IEEE standard.In 1985, the IBM Token Ring became an American National Standards Institute (ANSI)/IEEE standard.

Token Ring Features A Token Ring network is an implementation of IEEE standard A Token Ring network is an implementation of IEEE standard Their token-passing ring access method, distinguishes Token Ring networks from other networks.Their token-passing ring access method, distinguishes Token Ring networks from other networks.

Architecture The architecture of a typical Token Ring network begins with a physical ring.The architecture of a typical Token Ring network begins with a physical ring. However, in its implementation, a star-wired ring, computers on the network are connected to a central hub. The logical ring represents the token's path between computers.However, in its implementation, a star-wired ring, computers on the network are connected to a central hub. The logical ring represents the token's path between computers.

Token Ring Basics A Token Ring network includes the following features:A Token Ring network includes the following features: Star-wired ring topologyStar-wired ring topology Token-passing access methodToken-passing access method Shielded and unshielded twisted-pair (IBM Types 1, 2, and 3) cablingShielded and unshielded twisted-pair (IBM Types 1, 2, and 3) cabling Transfer rates of 4 and 16 MbpsTransfer rates of 4 and 16 Mbps Baseband transmissionBaseband transmission specifications802.5 specifications

Frame Formats (1) Access control indicates the frame's priority and whether it is a token or a data frame.Access control indicates the frame's priority and whether it is a token or a data frame. Frame control contains either MAC information for all computers or "end station" information for only one computer.Frame control contains either MAC information for all computers or "end station" information for only one computer.

Frame Formats (2) Frame check sequence contains CRC error-checking information.Frame check sequence contains CRC error-checking information. Frame status tells whether the frame was recognized, copied, or whether the destination address was available.Frame status tells whether the frame was recognized, copied, or whether the destination address was available.

How Token Ring Networking Works When the first Token Ring computer comes online, the network generates a token.When the first Token Ring computer comes online, the network generates a token. The token is a predetermined formation of bits that permits a computer to put data on the cables.The token is a predetermined formation of bits that permits a computer to put data on the cables.

How Token Ring Networking Works The token travels around the ring polling each computer until one of the computers signals that it wants to transmit data and takes control of the token.The token travels around the ring polling each computer until one of the computers signals that it wants to transmit data and takes control of the token. A computer cannot transmit unless it has possession of the token.A computer cannot transmit unless it has possession of the token.

How Token Ring Networking Works After the computer captures the token, it sends a data frame out on the network.After the computer captures the token, it sends a data frame out on the network. The frame proceeds around the ring until it reaches the computer with the address that matches the destination address in the frame.The frame proceeds around the ring until it reaches the computer with the address that matches the destination address in the frame.

How Token Ring Networking Works The destination computer copies the frame into its receive buffer;The destination computer copies the frame into its receive buffer; and marks the frame in the frame status field to indicate that the information was received.and marks the frame in the frame status field to indicate that the information was received.

How Token Ring Networking Works The frame continues around the ring until it arrives at the sending computer, where the transmission is acknowledged as successful.The frame continues around the ring until it arrives at the sending computer, where the transmission is acknowledged as successful. The sending computer then removes the frame from the ring and transmits a new token back on the ring.The sending computer then removes the frame from the ring and transmits a new token back on the ring.

How Token Ring Networking Works Token passing is deterministic, which means that a computer cannot force its way on to the network as it can in a CSMA/CD environment.Token passing is deterministic, which means that a computer cannot force its way on to the network as it can in a CSMA/CD environment. If the token is available, the computer can use it to send data.If the token is available, the computer can use it to send data. Each computer acts as a unidirectional repeater, regenerates the token, and passes it along.Each computer acts as a unidirectional repeater, regenerates the token, and passes it along.

Monitoring the System The first computer to come online is assigned by the Token Ring system to monitor network activity.The first computer to come online is assigned by the Token Ring system to monitor network activity. The monitoring computer makes sure that frames are being delivered and received correctly.The monitoring computer makes sure that frames are being delivered and received correctly. It does this by checking for frames that have circulated the ring more than once and ensuring that only one token is on the network at a time.It does this by checking for frames that have circulated the ring more than once and ensuring that only one token is on the network at a time.

Beaconing The process of monitoring is called beaconing.The process of monitoring is called beaconing. The active monitor sends out a beacon announcement every seven seconds.The active monitor sends out a beacon announcement every seven seconds. If a station does not receive an expected announcement from its upstream neighbor, it attempts to notify the network of the lack of contact.If a station does not receive an expected announcement from its upstream neighbor, it attempts to notify the network of the lack of contact. It sends a message that includes its address, the address of the neighbor that did not announce, and the type of beacon. From this information, the ring attempts to diagnose the problem and make a repair.It sends a message that includes its address, the address of the neighbor that did not announce, and the type of beacon. From this information, the ring attempts to diagnose the problem and make a repair.

Recognizing a Computer When a new computer comes online on the network, the Token Ring system initializes it so that it can become part of the ring.When a new computer comes online on the network, the Token Ring system initializes it so that it can become part of the ring. This initialization includes:This initialization includes: Checking for duplicate addresses.Checking for duplicate addresses. Notifying other computers on the network of its existence.Notifying other computers on the network of its existence.

Hardware Components: The Hub Hardware for Token Ring networks is centered on the hub, which houses the actual ring.Hardware for Token Ring networks is centered on the hub, which houses the actual ring. A Token Ring network can have multiple hubs.A Token Ring network can have multiple hubs. In a Token Ring network, the hub is known by several names as:In a Token Ring network, the hub is known by several names as: MAU (Multistation Access Unit).MAU (Multistation Access Unit). MSAU (MultiStation Access Unit).MSAU (MultiStation Access Unit). SMAU (stands for Smart Multistation Access Unit).SMAU (stands for Smart Multistation Access Unit).

Hardware Components: The Hub Cables attach the individual clients and servers to the MSAU, which works like other passive hubs.Cables attach the individual clients and servers to the MSAU, which works like other passive hubs. The internal ring automatically converts to an external ring at each connection point when a computer is connected.The internal ring automatically converts to an external ring at each connection point when a computer is connected.

Hub Capacity An IBM MSAU has 10 connection ports. It can connect up to eight computers. Each ring can have up to 33 hubs.An IBM MSAU has 10 connection ports. It can connect up to eight computers. Each ring can have up to 33 hubs.

Hub Capacity Each MSAU-based network can support as many as 72 computers that use unshielded wire; or up to 260 computers that use shielded wire.Each MSAU-based network can support as many as 72 computers that use unshielded wire; or up to 260 computers that use shielded wire.

Built-in Fault Tolerance MSAUs were designed to detect when a NIC fails, and to disconnect from it.MSAUs were designed to detect when a NIC fails, and to disconnect from it. This procedure bypasses the failed computer so that the token can continue on.This procedure bypasses the failed computer so that the token can continue on. Therefore, a faulty computer or connection will not affect the rest of the Token Ring network.Therefore, a faulty computer or connection will not affect the rest of the Token Ring network.

Cabling The STP or UTP cable to a hub connects computers on a Token Ring network.The STP or UTP cable to a hub connects computers on a Token Ring network.

The Fate of Token Ring Networks Token Ring was losing market share to Ethernet.Token Ring was losing market share to Ethernet. Even though Ethernet is more popular, Token Ring is good at supporting mission-critical applications.Even though Ethernet is more popular, Token Ring is good at supporting mission-critical applications. Token Ring users today face lots of challenges:Token Ring users today face lots of challenges: Complexities, manageability, cost, space, congestion, and upgrading to high-speed technologies. Complexities, manageability, cost, space, congestion, and upgrading to high-speed technologies. The idea of switching is to provide high- performance, low-cost alternatives.The idea of switching is to provide high- performance, low-cost alternatives.