100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.

Slides:



Advertisements
Similar presentations
INTRODUCTION TO NETWORKS
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Token Ring/IEEE Risanuri Hidayat.
CHAPTER Practical Token Ring Implementation. Chapter Objectives Give an overview of the Token Ring LAN Describe the characteristics of the Token Ring.
Token Ring and Fiber Distributed Data Interface (FDDI)
Token Ring/IEEE Annida Farhana bt SuibWET Azuna Nurzahra bt KandarWET Ima Shanaz bt Wahidin WET Farah Nawwar bt BidinWET
Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI)
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Token Ring and FDDI.
1 Subnets. 2 Token Ring Access Methodology = token passing Logical topology = sequential Physical = traditionally ring, currently star –Logical ring,
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
LECTURE 13 NET BASE FP STANDARDS Pair of Fiber Optics. Star topology. 1 km for each part of network. Analog signal. Encoding the digital signal.
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
LOCAL AREA NETWORS. A local area network (LAN) is a data communication system that allows a number of independent devices to communicate directly with.
CSC 311 IEEE STANDARD ETHERNET Common Bus topology Uses CSMA/CD Named after “ether”, the imaginary substance many once believed occupied all of space.
IEEE Standards, FDDI, Collision Free Protocols
Packet Transmission (Part III) Local Area Networks (LANs)
Lecture #15: High speed LANs
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 14 Local Area Networks: Ethernet.
Local Area Networks: Ethernet. IEEE Background Institution of Electrical and Electronic Engineering (IEEE) A professional non-profit organization Project.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
Local Area Networks © Prof. Aiman Hanna Department of Computer Science Concordia University Montreal, Canada Local Area Networks Part B.
McGraw-Hill©The McGraw-Hill Companies, Inc. Chapter 9 Local Area Networks Part I: Basic Concepts and Wired Ethernet LANs.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Fiber Distributed Data Interface (FDDI)
Ethernet Overview it the IEEE standard for Ethernet.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
Network Communications Chapter 9
IEEE l IEEE has had the greatest impact on Layer 2 standards. l IEEE divided Layer 2 into two sublayers.
Rehab AlFallaj.  Standards determine:  Techniques used in the networks.  Its protocols.  Network specifications and features.
CS3502: Data and Computer Networks Loca Area Networks - 3 Adaptive Tree Walk Token Ring LAN : IEEE slotted rings FDDI.
Local Area Networks a data communication system that allows a number of independent devices to communicate directly with each other in a limited geographic.
Introduction to Computer Networks Introduction to Computer Networks.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
LECTURE 11 NET301 11/16/2015Lect IEEE LAN STANDARDS Ethernet LAN (by Xerox): Topology: Bus Transmission Media: Thick Coaxial Cable. Signal: Digital.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D.
CS4470 Computer Networking Protocols
Data link layer (LLC).
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
COSC 3213: Computer Networks I Instructor: Dr. Amir Asif
TOKEN BUS & TOKEN RING.
Ethernet and Token Ring LAN Networks
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
CT1303 LAN Rehab AlFallaj.
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
Data Link Issues Relates to Lab 2.
DATA COMMUNICATION Lecture-43.
Token Ring/IEEE Risanuri Hidayat.
Data-link Layer Computer Networks.
شبكات الحاسب 2_2.
FDDI.
Physical and Logical Topologies
Protocol layering and data
DATA COMMUNICATION Lecture-44.
Token Ring Neil Tang 9/22/2008 CS440 Computer Networks.
Business Data Communications, 4e
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Chaithra Ashwin Sanjana
Computer Interfacing and Protocols
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Ethernet and Token Ring LAN Networks
Presentation transcript:

100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used to send 4 bits  100 Mbps. 100BASE-FX: uses two strands of multimode fiber one for each direction and the distance can be up to 2 km. To solve the collision problem, 100BASE-FX cables must be connected to buffered, switched, hubs, so each is in a collision domain itself.

TOKEN BUS IEEE 802.4 Due to the unpredictable collisions and delays in sending data from a control center to computers along an assembly line, IEEE 802.3 is not suitable for real time applications. Token Ring (IEEE 802.5) is also not suitable because an assembly line resembles a bus topology and not a ring. In a token bus, stations are logically organized into a ring. It is limited to factory automation and process control. A token is passed among stations, and only a station who wants to transmit and has the token can transmit.

TOKEN RING (IEEE 802.5) Station takes turns in sending data A station may send data only when it has possession of the token. The Token is a three-byte frame that is passed from one station to another in sequence until it encountered a station with data to send. The station captures the token, sets a bit in its NIC card as a reminder, and sends its data frame. Each station copies the data frame and checks if the destination address matches its.

If the frame is intended for another station, it is regenerated and passed to the next station. If the frame is intended for the station, it marks the frame as being recognized and copied. The sender receives the frame and recognizes itself as the source and checks if the frame was recognized and copied. The sender discards the frame and releases the token back to the ring.

Token Passing

Token Passing

Token Passing

Token Passing

A station waiting to transmit may reserve the next open token by entering its priority code in the Access Control (AC) field of the token or data frame. A station with a higher priority may remove a lower priority reservation and replace it with its own. Regardless of physical location of the station in the ring, a station which sets the reservation gets the opportunity to transmit as soon as the token is free.

Each station expects to receive a token within regular time intervals. Potential problems: - A token may be destroyed by noise - A station may neglect to transmit a token - A sending station may neglect to remove its data from the ring. Solution: One station is designated as a monitor. The monitor sets a timer as each token passes. If the token did not appear before timeout, the monitor generates a new token. The monitor sets a bit in the AC field for each data frame. If it sees a frame with monitor bit set, it destroys the frame and generates a new token.

Token Ring Frame - It runs at 16 Mbps, using differential Manchester encoding,

Starting Delimiter (SD): used to alert receiving station of the arrival of a frame and to allow for synchronization (flag). To ensure data transparency, two types of violations are introduced: J (both transitions are canceled) and K (the middle transition is canceled). Access Control (AC): 3-bit priority, 3-bit reservation, 1-bit Token, 1-bit monitor. Frame Control (FC): 1-bit type of PDU (control or data). The remaining 7-bit is used by the ring logic. Frame Status (FS): 1-bit address recognized, 1-bit frame copied. It is repeated for reliability.

Data Frame Fields

Data Frame Fields

Token Ring 150  STP.

Token Ring Switch The NIC controls the switch via 5-wires to include or bypass the station

MAU