100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Token Ring/IEEE Risanuri Hidayat.
CS Direct Link Networks (Continued) Slide Set 6.
CS4550: Computer Networks II high speed networks, part 1 : FDDI & 100baseTX.
Token Ring and Fiber Distributed Data Interface (FDDI)
Token Ring/IEEE Annida Farhana bt SuibWET Azuna Nurzahra bt KandarWET Ima Shanaz bt Wahidin WET Farah Nawwar bt BidinWET
Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI)
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Token Ring and FDDI.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
LECTURE 13 NET BASE FP STANDARDS Pair of Fiber Optics. Star topology. 1 km for each part of network. Analog signal. Encoding the digital signal.
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
LOCAL AREA NETWORS. A local area network (LAN) is a data communication system that allows a number of independent devices to communicate directly with.
IEEE Standards, FDDI, Collision Free Protocols
Packet Transmission (Part III) Local Area Networks (LANs)
Layer 2: Technologies Chapter 7
Lecture #15: High speed LANs
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
McGraw-Hill©The McGraw-Hill Companies, Inc. Chapter 9 Local Area Networks Part I: Basic Concepts and Wired Ethernet LANs.
FDDI (Fiber Distributed Data Interface) Standardized by ASI and ITU-T (ITU-T X.3.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
The Saigon CTT Semester 1 CHAPTER 7 Le Chi Trung.
802.5 and FDDI TC Token Ring Reference Stallings 6.3 4/16Mbps over STP 4Mbps over CAT3 UTP.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
IEEE l IEEE has had the greatest impact on Layer 2 standards. l IEEE divided Layer 2 into two sublayers.
FDDI Network Security.
Rehab AlFallaj.  Standards determine:  Techniques used in the networks.  Its protocols.  Network specifications and features.
CS3502: Data and Computer Networks Loca Area Networks - 3 Adaptive Tree Walk Token Ring LAN : IEEE slotted rings FDDI.
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
Local Area Networks a data communication system that allows a number of independent devices to communicate directly with each other in a limited geographic.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
SEMINAR ON FDDI NAME REG. NO BRANCH. CONTENTS INTRODUCTION INTRODUCTION STANDARDS STANDARDS FDDI TRANSMISSION MEDIA FDDI TRANSMISSION MEDIA FDDI SPECIFICATIONS.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
LECTURE 11 NET301 11/16/2015Lect IEEE LAN STANDARDS Ethernet LAN (by Xerox): Topology: Bus Transmission Media: Thick Coaxial Cable. Signal: Digital.
SIMS-201 Computer Networks.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D.
Data link layer (LLC).
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
TOKEN BUS & TOKEN RING.
Ethernet and Token Ring LAN Networks
Medium Access Control (MAC) Sub-layer
CSC 336 Data Communications and Networking
CT1303 LAN Rehab AlFallaj.
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
Ethernet LAN 1 1.
Data Link Issues Relates to Lab 2.
Token Ring/IEEE Risanuri Hidayat.
Data-link Layer Computer Networks.
FDDI.
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
Physical and Logical Topologies
Protocol layering and data
DATA COMMUNICATION Lecture-44.
Token Ring Neil Tang 9/22/2008 CS440 Computer Networks.
Chapter 14. LAN Systems Ethernet and Fast Ethernet (CSMA/CD)
7- chapter Seven Local Area Networks (LAN)
SIMS-201 Computer Networks.
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Computer Interfacing and Protocols
Dr. John P. Abraham Professor UTPA
Ethernet and Token Ring LAN Networks
Presentation transcript:

100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used to send 4 bits  100 Mbps. 100BASE-FX: uses two strands of multimode fiber one for each direction and the distance can be up to 2 km. To solve the collision problem, 100BASE-FX cables must be connected to buffered, switched, hubs, so each is in a collision domain itself.

TOKEN BUS IEEE 802.4 Due to the unpredictable collisions and delays in sending data from a control center to computers along an assembly line, IEEE 802.3 is not suitable for real time applications. Token Ring (IEEE 802.5) is also not suitable because an assembly line resembles a bus topology and not a ring. In a token bus, stations are logically organized into a ring. It is limited to factory automation and process control. A token is passed among stations, and only a station who wants to transmit and has the token can transmit.

TOKEN RING (IEEE 802.5) Station takes turns in sending data A station may send data only when it has possession of the token. The Token is a three-byte frame that is passed from one station to another in sequence until it encountered a station with data to send. The station captures the token, sets a bit in its NIC card as a reminder, and sends its data frame. Each station copies the data frame and checks if the destination address matches its.

If the frame is intended for another station, it is regenerated and passed to the next station. If the frame is intended for the station, it marks the frame as being recognized and copied. The sender receives the frame and recognizes itself as the source and checks if the frame was recognized and copied. The sender discards the frame and releases the token back to the ring.

Token Passing

Token Passing

Token Passing

Token Passing

A station waiting to transmit may reserve the next open token by entering its priority code in the Access Control (AC) field of the token or data frame. A station with a higher priority may remove a lower priority reservation and replace it with its own. Regardless of physical location of the station in the ring, a station which sets the reservation gets the opportunity to transmit as soon as the token is free.

Each station expects to receive a token within regular time intervals. Potential problems: - A token may be destroyed by noise - A station may neglect to transmit a token - A sending station may neglect to remove its data from the ring. Solution: One station is designated as a monitor. The monitor sets a timer as each token passes. If the token did not appear before timeout, the monitor generates a new token. The monitor sets a bit in the AC field for each data frame. If it sees a frame with monitor bit set, it destroys the frame and generates a new token.

Token Ring Frame - It runs at 16 Mbps, using differential Manchester encoding,

Starting Delimiter (SD): used to alert receiving station of the arrival of a frame and to allow for synchronization (flag). To ensure data transparency, two types of violations are introduced: J (both transitions are canceled) and K (the middle transition is canceled). Access Control (AC): 3-bit priority, 3-bit reservation, 1-bit Token, 1-bit monitor. Frame Control (FC): 1-bit type of PDU (control or data). The remaining 7-bit is used by the ring logic. Frame Status (FS): 1-bit address recognized, 1-bit frame copied. It is repeated for reliability.

Data Frame Fields

Data Frame Fields

Token Ring 150  STP.

Token Ring Switch The NIC controls the switch via 5-wires to include or bypass the station

MAU

Fiber Distributed Data Interface (FDDI) A LAN protocol developed by ANSI and ITU-U. 100 Mbps using dual ring fiber optic or copper (CDDI). Access is based on token passing and is limited by time. A station may transmit within its allotted time. Two types of frames: Synchronous (time sensitive) and Asynchronous (time insensitive). S-frames and A-frames. A station must send out its S-frames first whether or not its time allotment has run out.

FDDI defines three time registers: - Synchronous Allocation (SA) register indicates the amount of time allowed for each station for sending synchronous data. - Target Token Rotation Time (TTRT) register indicates the average time required for a token to circulate around the ring exactly once. - Absolute Maximum Time (AMT) register holds a value equal to twice the TTRT. A token may not take longer than the allotted time to traverse the ring. If it does, the ring must be reinitialized.

Each station contains a set of timers of which FDDI utilizes two: - Token Rotation Timer (TRT): When a token is received, the TRT is transferred to THT and it resets based on the TTRT value and starts counting down. When the token completes a rotation, the TRT indicates the amount of time remaining for the station to send data. - Token Holding Timer (THT) indicates the amount of time remaining for A-frames once the S-frames have been sent. It starts counting down as soon as a token arrives and the value of the TRT is copied. If negative, the station must release the token.

FDDI

FDDI Example SA = 2, TTRT=30assume many A-frames, frame =1 time unit AT= 0 TRT =0 AT=1 TRT=0 AT=2 AT=3 1 AT=4,TRT=4 THT=26,TRT=0 S=2,A=24 AT=31,TRT=30 THT=0,TRT= 0 S=2,A=0 AT=34,TRT=32 THT=-2,TRT= 0 S=2.A=0 AT=37,TRT=34 THT=-4,TRT=0 2 AT=40,TRT=36 THT=-6,TRT=0 AT=43,TRT=12 THT=18,TRT= 0 S=2,A=16 AT=62,TRT=28 AT=65,TRT=28 THT=2,TRT=0 3 AT=68,TRT=28 AT=71,TRT=28 THT=2,TRT= 0 AT=74,TRT=12 S=2.A=16 AT=93,TRT=28 4 AT=96,TRT=28 AT=99,TRT=28 AT=102,TRT=28 AT=105,TRT=12 THT=18,TRT=0

FDDI Encoding - Encoding 5-bit/4-bit 5B/4B (each 4-bit is replaced by 5-bit) NRZ-I

FDDI Layers Logical link control LLC Media access control MAC Data Link Physical PHY Physical medium dependent PMD Physical

FDDI Frames

FDDI Rings

FDDI Ring Failure

Nodes Three Types: -Dual Attachment Station (DAS) has two Media Interface Connector (MIC) to allow connection to both rings. -Single Attachment Station (SAS) has only one MIC. It connects to intermediate node (DAC). -Dual Attachment Concentrator (DAC) connects SAS to the dual ring.

FDDI Nodes