FDDI Network Security.

Slides:



Advertisements
Similar presentations
Token Ring/IEEE Risanuri Hidayat.
Advertisements

Ethernet Risanuri Hidayat. Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE standard. Three.
LAN Protocol Architecture
CHAPTER Practical Token Ring Implementation. Chapter Objectives Give an overview of the Token Ring LAN Describe the characteristics of the Token Ring.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
1 Fibre Distributed Data Interface 100Mbps –1986 ANSI - X3T9.5 committee –Supports IEEE Access Methodology = Modified token-passing Logical topology.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Network Concepts. Networks LAN WAN Main Concepts n Protocol n Media n Topology.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Review on Networking Technologies Linda Wu (CMPT )
Module 6 Chapter 5. Ethernet Ethernet is now the dominant LAN technology in the world. Ethernet is not one technology but a family of LAN technologies.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
LECTURE 13 NET BASE FP STANDARDS Pair of Fiber Optics. Star topology. 1 km for each part of network. Analog signal. Encoding the digital signal.
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
SIMS-201 LAN Basics, MANs, WANs.
Internet Protocol (IP)
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
Ethernet, MAC podvrstva
20 LAN Hardware Overview Version A.01 H3065S Module 2 Slides.
Packet Transmission (Part III) Local Area Networks (LANs)
Layer 2: Technologies Chapter 7
Submitted by:Guided by: Arun Kumar GuptaMr. Vipin Kaushik M.Tech (Opto-Electronics)- II Sem Dept. of Applied Physics SGSITS, Indore FIBER DISTRIBUTED –
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Copyright CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name.
Internetworking An internetwork is typically comprised of many physical networks over which data travels There are many different types of physical networks:
FDDI Fiber Distributed Data Interface By Ya’kob, Aidid & Fikri.
CSCI 465 D ata Communications and Networks Lecture 19 Martin van Bommel CSCI 465 Data Communications & Networks 1.
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
Fiber Distributed Data Interface. The Fiber Distributed Data Interface (FDDI) specifies a 100-Mbps token-passing, dual-ring LAN using fiber-optic cable.
FDDI (Fiber Distributed Data Interface) Standardized by ASI and ITU-T (ITU-T X.3.
Semester 1 Chapter6 + Chapter7 Layer 2 Data Link Layer Concepts And Technologies.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
The Saigon CTT Semester 1 CHAPTER 7 Le Chi Trung.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
FDDI (Fiber Distributed Data Interface)
Chapter 7 OSI Data Link Layer.
IEEE l IEEE has had the greatest impact on Layer 2 standards. l IEEE divided Layer 2 into two sublayers.
1 Hardware Addressing and Frame Type Identification.
Rehab AlFallaj.  Standards determine:  Techniques used in the networks.  Its protocols.  Network specifications and features.
1 Chapter 2: Direct Link Networks (Part Two) Dr. Rocky K. C. Chang 30 January 2004.
Chapter 7 – Layer 2 Technologies Token Ring FDDI Ethernet and IEEE Layer 2 Devices Data Flow Ethernet: 10BASE-T Troubleshooting By: Stacy Olson –
802.5 Token-Ring Networks Differential Manchester Encoding –For a 1 No transition at start of bit period Transition in middle –For a 0 Transition at start.
FDDI Last Update Copyright Kenneth M. Chipps Ph.D. 1.
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
Local Area Networks a data communication system that allows a number of independent devices to communicate directly with each other in a limited geographic.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Data and Computer Communications Eighth Edition by William Stallings Chapter 15 – Local Area Network Overview.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
SEMINAR ON FDDI NAME REG. NO BRANCH. CONTENTS INTRODUCTION INTRODUCTION STANDARDS STANDARDS FDDI TRANSMISSION MEDIA FDDI TRANSMISSION MEDIA FDDI SPECIFICATIONS.
SIMS-201 Computer Networks.
Data Networking via LANs Packets and Frames
Ct1403 Lecture#2: DATA LINK LAYER
Ethernet and Token Ring LAN Networks
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
CT1303 LAN Rehab AlFallaj.
Internet Protocol (IP)
Ethernet and Token Ring LAN Networks
Token Ring/IEEE Risanuri Hidayat.
FDDI.
CCNA 1 Chapter 5 Ethernet Fundamentals
SIMS-201 Computer Networks.
Ethernet and Token Ring LAN Networks
Presentation transcript:

FDDI Network Security

What is FDDI? Fiber Distributed Data Interface 100-Mbps token passing Dual-ring LAN A high-speed backbone technology High bandwidth Optical fiber transmission Allows up to 1000 stations Network Security

FDDI Architecture Network Security

Components of FDDI Fiber optic cable A concentrator (ring) Stations: 2 types DAS (Dual Attachment Station) or Class A: Connected to both the rings SAS (Single Attachment Station) or Class B: Connected to primary ring Network Security

Ring Wrapping When a single station fails, devices on either side of the failed (or powered-down) station wrap, forming a single ring. Network operation continues for the remaining stations on the ring. Network Security

FDDI Access Method FDDI uses token passing as an access method similar to the IEEE 802.5 token ring. Any station wants to transmit information holds the token and then transmits the information and when it finish it releases the token in the ring. The time a station holds the token is called Synchronous Allocation Time (SAT) and this time is variable for each station. The allocation of this time to each station is achieved by Station Management (SMT). The functions of SMT are ring control, ring initialization, station insertion and station removal. Network Security

FDDI Frame Format Similar to token ring frame Network Security

FDDI Frame Fields Preamble: Gives a unique sequence that prepares each station for an upcoming frame Start delimiter: Indicates the beginning of a frame Frame control: Indicates the size of the address fields and whether the frame contains asynchronous or synchronous data, among other control information Destination address: Contains a unicast (singular), multicast (group), or broadcast (every station) address Source address: Identifies the single station that sent the frame Data: Contains either information destined for an upper-layer protocol or control information. Network Security

FDDI Frame Fields (continued) Frame check sequence (FCS): Is filed by the source station with a calculated cyclic redundancy check value dependent on frame contents. The destination address recalculates the value to determine whether the frame was damaged in transit. If so, the frame is discarded. End delimiter: Contains unique symbols; cannot be data symbols that indicate the end of the frame. Frame status: Allows the source station to determine whether an error occurred; identifies whether the frame was recognized and copied by a receiving station. Network Security

FDDI Characteristics 100 Mbps of data throughput Two interfaces Connects equipment to the ring over long distances Allows all stations to have equal amount of time to transmit data FDDI is a LAN with Station Management Network Security

Things to know FDDI Vs Token Ring FDDI Layered structure FDDI specifications CDDI Network Security