Lecture 9: Ethernet and Token Ring Networks

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Review r Error Detection: CRC r Multiple access protocols m Slotted ALOHA m CSMA/CD r Homework 3 out r Project 3 out, link state only. Some slides are.
5: DataLink Layer5-1 Mac Addressing, Ethernet, and Interconnections.
CS Direct Link Networks (Continued) Slide Set 6.
Token Ring and Fiber Distributed Data Interface (FDDI)
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
Networks Types. Spring 2002Computer Network Applications Data Transfer During the ’70s: Minicomputers became affordable; Need to communicate information;
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI)
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Distributed systems Module 1 -Basic networking Teaching unit 1 – LAN standards Ernesto Damiani University of Bozen-Bolzano Lesson 4 – Ethernet frame.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Token Ring and FDDI.
MAC Addresses and ARP 32-bit IP address: –network-layer address –used to get datagram to destination IP subnet MAC (or LAN or physical or Ethernet) address:
Ethernet By far, the dominant standard for guided media for the internet is Ethernet. How does it work?
LECTURE 13 NET BASE FP STANDARDS Pair of Fiber Optics. Star topology. 1 km for each part of network. Analog signal. Encoding the digital signal.
Layer 2 Switch  Layer 2 Switching is hardware based.  Uses the host's Media Access Control (MAC) address.  Uses Application Specific Integrated Circuits.
Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
5: DataLink Layer5-1 LAN technologies Data link layer so far: m services, error detection/correction, multiple access Next: LAN technologies m addressing.
Lecture 17 Ethernet r Widely deployed because: m First LAN technology m Simpler and less expensive than token LANs and ATM m Kept up with the speed race:
Introduction1-1 Data Communications and Computer Networks Chapter 5 CS 3830 Lecture 27 Omar Meqdadi Department of Computer Science and Software Engineering.
LAN Technologies MAC protocols used in LANs, to control access to the channel Token Rings: IEEE (IBM token ring), for computer room, or department.
Packet Transmission (Part III) Local Area Networks (LANs)
5: DataLink Layer5-1 Ethernet “dominant” wired LAN technology: r cheap $20 for 100Mbs! r first widely used LAN technology r Simpler, cheaper than token.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Component 9 – Networking and Health Information Exchange Unit 1-2 ISO Open Systems Interconnection (OSI) This material was developed by Duke University,
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Copyright Objectives: Chapter 3: Layer 2 Ethernet  Ethernet Fundamentals Ethernet Operations Carrier Sense Multiple Access/Collision.
Internetworking An internetwork is typically comprised of many physical networks over which data travels There are many different types of physical networks:
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
14-Oct-15Computer Networks1 Reliable Transmission.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
CCNA 3 Week 4 Switching Concepts. Copyright © 2005 University of Bolton Introduction Lan design has moved away from using shared media, hubs and repeaters.
Cisco 3 – Switching Concepts Perrine. J Page 16/1/2016 Module 4 The use of bridges and switches for segmentation results in ____? 1.Multiple broadcast.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Local Area Networks.
Version 4.0 Ethernet Network Fundamentals – Chapter 9 Sandra Coleman, CCNA, CCAI.
1 6/4/ :56 Chapter 8Token Ring LANs, FDDI & MANs1 Rivier College CS575: Advanced LANs Chapter 8: Token Ring LANs, FDDI and MANs.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
5: DataLink Layer5-1 Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach Featuring the Internet, 3 rd edition. Jim Kurose, Keith Ross.
CSE 461: Multiple Access Networks. This Lecture  Key Focus: How do multiple parties share a wire?  This is the Medium Access Control (MAC) portion of.
The Saigon CTT Semester 1 CHAPTER 7 Le Chi Trung.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
Network Communications Chapter 9
IEEE l IEEE has had the greatest impact on Layer 2 standards. l IEEE divided Layer 2 into two sublayers.
EE 122: Lecture 6 Ion Stoica September 13, 2001 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose)
Networking and Health Information Exchange Unit 1b ISO Open Systems Interconnection (OSI) Component 9/Unit 1b1 Health IT Workforce Curriculum Version 1.0/Fall.
1 Chapter 2: Direct Link Networks (Part Two) Dr. Rocky K. C. Chang 30 January 2004.
1 Ethernet History –developed by Xerox PARC in mid-1970s –roots in Aloha packet-radio network –standardized by Xerox, DEC, and Intel in 1978 –similar to.
1 Shared Access Networks: Token ring, Wireless Sections 2.7 & 2.8.
1 Multiple Access: Ethernet Section Point-to-Point vs. Broadcast Media Point-to-point –PPP for dial-up access –Point-to-point link between Ethernet.
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
+ Lecture#2: Ethernet Asma ALOsaimi. + Objectives In this chapter, you will learn to: Describe the operation of the Ethernet sublayers. Identify the major.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D.
Advanced Computer Networks
TOKEN BUS & TOKEN RING.
CS 457 – Lecture 8 Switching and Forwarding
Medium Access Control (MAC) Sub-layer
Ethernet Neil Tang 9/17/2008 CS440 Computer Networks.
Protocol layering and data
Token Ring Neil Tang 9/22/2008 CS440 Computer Networks.
Protocol layering and data
Ethernet 16EC351 Computer networks unit II Mr.M.Jagadesh,AP/ECE.
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Presentation transcript:

Lecture 9: Ethernet and Token Ring Networks

Ethernet review Network topology with two stars connected by a point-to-point link

Ethernet Frame MAX=1500 bytes Min=46 bytes Type—demux key to identify application CRC-32

Addresses Media Access Control (MAC) address Broadcast address 48 bits/6 bytes-X1X2:X3X4:X5X6:X7X8:X9X10:X11X12 Unique worldwide for all time Belongs to adapter Broadcast address FF:FF:FF:FF:FF:FF Multicast address 1xxxxxxx:XX:XX:XX:XX:XX

Receiver Algorithm Adaptor Receives all frames on the ethernet Only Accepts Frames Addressed to: Its unicast address the broadcast address A mult-cast address it has been programmed to accept Accepts all frames in “promiscuous (eavesdropping) mode”

Transmitter Algorithm If adapter has a frame to send: Line is idle-sends its frame-up to 1500 bytes Line is busy-wait til line goes idle and send the frame Collisions These are detected as overvoltage AT AN ADAPTER When collision is detected, receiver transmits 32 bit jamming sequence and shuts down-purpose of jamming sequence is to cause a collision at the sender Frame must be long enough for this collision to occur—512 bits in classic ethernet

The ethernet advantage It’s simple—no routing tables to maintain It’s flexible—just plug in your PC It’s cheap Cable—$ 0.12/ft Adaptors—$ 20 Hubs--$ 30/port Switch--$ 50/port

Token Ring Shared medium similar to ethernet Distributed algorithm controls transmission All nodes see all frames Token=small (24 bit) circulating frame To send: Remove token and send frame Sender: removes message when it comes around and reinserts token

Multi-station access unit (MSAU) create a star-like topology

Token Ring Media Access Control MAC Network adaptor contains-receiver, transmitter, buffer >1 bit Need enough storage within the ring to store a 24 bit token If you have less than 24 stations—one has to provide the storage—this will be the monitor

MAC cont. To seize the ring-change 1 bit in the second byte-becomes preamble to the data packet. A host copies those packets addressed to it and retransmits it around the ring Sender removes the packet as it comes around—may still be sending information

Key Concept Token Holding Time (THT)>transmission time of a packet Token Rotation Time (TRT)< ActiveNodes x THT+RingLatency Note: TRT is load dependent

Early release versus delayed release THT=Frame transmission time + Ring Latency THT=Frame transmission time

Reliable Transmission A-bit set to 1 by destination host when message is detected C-bit set to 1 if successfully copied

Priority Priority (3-bits)—8 levels Token priority, packet priority To seize the ring: Packet priority > Token priority Reservations: Use reservation bits (3-bits) on a circulating packet to lock out low priority users. Increase rb’s to your packet priority. Current token holder sets token priority to the reservation All users with packet priority > reservation may seize the ring. New user must reset token priority to the original value

Token Ring Maintenance Monitor roles Ensure adequate delay Check for token circulation— Max TRT=Number of users*THT+RingLatency Removes orphaned and corrupted frames Detects dead stations-beacon frame

Death of a Monitor Monitor sends control message periodically Hosts watch for this signal-if timeout, they try to become the monitor by sending a claim token If claim token returns-sender is the monitor If another claim token returns first-arbitration determines the new monitor

Token ring frame Manchester encoding Illegal Manchester codes are used as delimiters Frame status bits-A & C