802.5 Token-Ring Networks Differential Manchester Encoding –For a 1 No transition at start of bit period Transition in middle –For a 0 Transition at start.

Slides:



Advertisements
Similar presentations
Business Data Communications Packetizing and Framing.
Advertisements

Token Ring/IEEE Risanuri Hidayat.
William Stallings Data and Computer Communications 7th Edition
Repeaters can Mix PHY Standards Repeater NIC BNC AUI Connectors RJ-45 UTPDrop Cables 10Base5 Trunk Cable 10Base2 10Base-T.
Chapter 9 Local Area Network Technology
Channel Access Methods
Token Ring and Fiber Distributed Data Interface (FDDI)
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
Token Ring/IEEE Annida Farhana bt SuibWET Azuna Nurzahra bt KandarWET Ima Shanaz bt Wahidin WET Farah Nawwar bt BidinWET
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI)
Institute of Technology Sligo - Dept of Computing Naming & Framing Ch. 6–Layer 2 Concepts Paul Flynn.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices when they access, transmit,
Token Ring and FDDI.
1 Subnets. 2 Token Ring Access Methodology = token passing Logical topology = sequential Physical = traditionally ring, currently star –Logical ring,
LECTURE 13 NET BASE FP STANDARDS Pair of Fiber Optics. Star topology. 1 km for each part of network. Analog signal. Encoding the digital signal.
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
CSC581 Communication Networks II Chapter 6b: Local Area Network (Token Ring ) Dr. Cheer-Sun Yang.
CSC 311 IEEE STANDARD ETHERNET Common Bus topology Uses CSMA/CD Named after “ether”, the imaginary substance many once believed occupied all of space.
IEEE Standards, FDDI, Collision Free Protocols
Ethernet Two nodes transmit at the same time
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Fundamentals CE
Packet Transmission (Part III) Local Area Networks (LANs)
Token-Ring Networks Chapter 4a Panko’s Business Data Networks and Telecommunications, 6th edition Copyright 2007 Prentice-Hall May only be used by adopters.
Lecture 9: Ethernet and Token Ring Networks
Data Link Control Protocols Dr. Muazzam A. Khan. Flow Control Ensuring the sending entity does not overwhelm the receiving entity —Preventing buffer overflow.
Aegis School of Telecommunication Chapter 7 Data Link Control Protocols Telecom Systems I by Dr. M. G. Sharma, Phd.
Naming & Framing Ch. 6–Layer 2 Concepts By: Allan Johnson.
Copyright CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
LOCAL AREA NETWORKS. CSMA/CD Carrier Sense Multiple Access with Collision Detection The CSMA method does not specify the procedure following a collision.
1 CS4550: Computer Networks II Review Data Link Layer.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
Data Link and Flow Control Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Fiber Distributed Data Interface (FDDI)
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Connecting Devices CORPORATE INSTITUTE OF SCIENCE & TECHNOLOGY, BHOPAL Department of Electronics and.
Data Link Layer: Data Link Control : Data Communication and Computer Networks Asst. Prof. Chaiporn Jaikaeo, Ph.D.
The Saigon CTT Semester 1 CHAPTER 7 Le Chi Trung.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
Network Communications Chapter 9
IEEE l IEEE has had the greatest impact on Layer 2 standards. l IEEE divided Layer 2 into two sublayers.
FDDI Network Security.
Rehab AlFallaj.  Standards determine:  Techniques used in the networks.  Its protocols.  Network specifications and features.
CS3502: Data and Computer Networks Loca Area Networks - 3 Adaptive Tree Walk Token Ring LAN : IEEE slotted rings FDDI.
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
Point-to-Point Protocol
Data and Computer Communications Data Link Control Protocols.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
1 The Data Link Layer A. S. Tanenbaum Computer Networks W. Stallings Data and Computer Communications Chapter 3.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
LECTURE 11 NET301 11/16/2015Lect IEEE LAN STANDARDS Ethernet LAN (by Xerox): Topology: Bus Transmission Media: Thick Coaxial Cable. Signal: Digital.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D.
Chapter Six Token-Passing LANs.
TOKEN BUS & TOKEN RING.
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
Data Link Layer: Data Link Control
Ethernet and Token Ring LAN Networks
Token Ring/IEEE Risanuri Hidayat.
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
CCNA 1 Chapter 5 Ethernet Fundamentals
Token Ring Neil Tang 9/22/2008 CS440 Computer Networks.
Ethernet and Token Ring LAN Networks
Presentation transcript:

802.5 Token-Ring Networks Differential Manchester Encoding –For a 1 No transition at start of bit period Transition in middle –For a 0 Transition at start of bit period Transition in middle

802.5 Token-Ring Networks Differential Manchester Encoding –For a J No transmission at start of bit period No transition in middle –For a K Transition at start of bit period No transition in middle

802.5 Token-Ring Networks Differential Manchester Encoding No Transition at Start Transition at Start Transition in Middle 10 No Transition in Middle JK

Token Frame in Start Frame Delimiter (JK0JK000) [1 octet] Access Control (PPPTMRRR) (T=1 for token frame) [1 octet] End Frame Delimiter (JK1JK1IE) [1 octet] PPP gives the priority of the token T=1 for a token, 0 for a full frame M is set to 0 by the sending station, to 1 by the monitor station; if the bit is not changed, there has been a problem, i.e. transmitting stationd didn’t remove frame after a complete run

Token Frame in Start Frame Delimiter (JK0JK000) [1 octet] Access Control (PPPTMRRR) (T=1 for token frame) [1 octet] End Frame Delimiter (JK1JK1IE) [1 octet] In the End Frame Delimiter … I=1 in a single frame or the last frame of the series; otherwise set to 0 E=0 initially; Set to 1 by any station detecting an error

Full Frame Start Frame Delimiter (JK0JK000) [1 octet] Access Control (PPPTMRRR) (T=0 for full frame) [1 octet] Frame Control (FFZZZZZZ) Type of Frame [1 octet] FF tells type of frame 01 if contains LLC Frame (data) 00 for supervisory frames ZZZZZZ tells specific type of frame

Full Frame Start Frame Delimiter (JK0JK000) [1 octet] Access Control (PPPTMRRR) (T=0 for full frame) [1 octet] Frame Control (FFZZZZZZ) Type of Frame [1 octet] Addresses are the same as in bits long Destination Address [6 octets] Source Address [6 octets]

Full Frame Earlier Fields Information field can be up to 17,997 octets for 16 Mbps Token Ring Networks Frame Check Sequence identical to FCS field Routing Information for Source Route Bridges [2-6 octets] Information Frame Check Sequence [4 octets]

802.5 Full Frame Earlier Fields End Frame Delimiter as in Token Frame Frame Status for Reporting Specific Errors A(ddress): If receiving station recognizes its address, changes from 0 to 1 C(opy): if receiving station copies the frame successfully, changes 0 to 1 End Frame Delimiter (JK1JK1IE) [1 octet] Frame Status (ACrrACrr)

Error Handling in Lost Token –There is an active monitor station that checks for problems –If active monitor does not correct the problem, another station assumes the role of active monitor –Complex; Adds to cost

Error Handling in Repairing Breaks in the Ring –A single break makes the ring useless –Really a dual ring; Normally, only one used

Error Handling in If there is a break, the ring is wrapped –Still forms a closed loop –Can only be done once, so breaks should be fixed promptly Break Wrapped Ring Access Unit