Ethernet and Token Ring LAN Networks

Slides:



Advertisements
Similar presentations
CompTIA Network+ Chapter 2
Advertisements

1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
CCNA 1 v3.1 Module 6 Review. 2 What 3 things happen on an Ethernet network after a collision occurs? A backoff algorithm is invoked and transmission is.
Review on Networking Technologies Linda Wu (CMPT )
Chapter 13 Wired LANs: Ethernet
Module 6 Chapter 5. Ethernet Ethernet is now the dominant LAN technology in the world. Ethernet is not one technology but a family of LAN technologies.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
LOCAL AREA NETWORS. A local area network (LAN) is a data communication system that allows a number of independent devices to communicate directly with.
CSC 311 IEEE STANDARD ETHERNET Common Bus topology Uses CSMA/CD Named after “ether”, the imaginary substance many once believed occupied all of space.
Wired LANs: Ethernet In Chapter 1, we learned that a local area network (LAN) is a computer network that is designed for a limited geographic area such.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
Copyright CCNA 1 Chapter 5 Ethernet Fundamentals By Your Name.
CSCI 465 D ata Communications and Networks Lecture 19 Martin van Bommel CSCI 465 Data Communications & Networks 1.
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 14 Local Area Networks: Ethernet.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
Ethernet Standards DIX consortium – Mbps Ethernet 1 st Blue book – 1980 IEEE group takes over – Project 802 –802.1 – High Level Interface –HLI –
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
 LANs – A Definition - A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings,
13.1 Chapter 13 Wired LANs: Ethernet Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ETHERNET. Network Architecture Covers issue like how data will flow between the computers on the network. Involves with: Logical design Physical design.
Enterprise network 8.1:Introduction 8.2:LANs 8.3:Ethernet / IEEE :Token ring 8.5:Bridges.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
IEEE STANDARDS IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication.
Chapter 14 Local Area Networks
Rehab AlFallaj.  Standards determine:  Techniques used in the networks.  Its protocols.  Network specifications and features.
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
Wired LANs: Ethernet Shashank Srivastava Motilal Nehru national Institute Of Information Technology, Allahabad 4 Sep 2013.
Local Area Networks a data communication system that allows a number of independent devices to communicate directly with each other in a limited geographic.
Data and Computer Communications Eighth Edition by William Stallings Chapter 15 – Local Area Network Overview.
Introduction to Communication Lecture (10) 1. 2 Wired LANs: Ethernet IEEE Project 802 defines the LLC and MAC sublayers for all LANs including Ethernet.
Introduction to Computer Networks Introduction to Computer Networks.
ETHERNET Yash Vaidya. Introduction Ethernet is a family of computer networking technologies for local area networks (LANs). Ethernet was commercially.
LOCAL AREA NETWORKS. LAN SYSTEMS-TRADITIONAL ETHERNET local area network (LAN) is a computer network that is designed for a limited geographic area such.
1 Kyung Hee University Chapter 13 Wired LANs: Ethernet.
Data Link Issues Relates to Lab 2.
LECTURE 11 NET301 11/16/2015Lect IEEE LAN STANDARDS Ethernet LAN (by Xerox): Topology: Bus Transmission Media: Thick Coaxial Cable. Signal: Digital.
Wired Local Area Network (Ethernet-IEEE 802.3)
Chapter 13 Wired LANs: Ethernet
Data Link Issues This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D.
Chapter 13 Wired LANs: Ethernet
Part III Datalink Layer.
Underlying Technology
Data Link Issues This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point.
Ethernet and Token Ring LAN Networks
CT1303 LAN Rehab AlFallaj.
Chapter 12 Local Area Networks
Physical and Logical Topologies
Protocol layering and data
CCNA 1 Chapter 5 Ethernet Fundamentals
Part III Datalink Layer.
7- chapter Seven Local Area Networks (LAN)
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
LAN Addresses and ARP IP address: drives the packet to destination network LAN (or MAC or Physical) address: drives the packet to the destination node’s.
Ethernet and Token Ring LAN Networks
SYSTEM ADMINISTRATION Chapter 3
Chapter 13 Wired LANs: Ethernet
Presentation transcript:

Ethernet and Token Ring LAN Networks

Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although a LAN can be used as an isolated network, most LANs today are also linked to a wide area network (WAN) or the Internet. A computer connected via a LAN to the Internet needs all the 5 layers of the TCP/IP model. The three upper layers are common to all LANs. The LANs differ in the 2 lower layers.

IEEE Project 802 In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety of manufacturers. Project 802 does not seek to replace any part of the OSI or the TCP/IP model. Instead, it is a way of specifying functions of the physical layer and the data link layer of major LAN protocols. The IEEE has subdivided the data link layer into two sublayers: logical link control (LLC) and media access control (MAC).

IEEE Project 802 cont. IEEE has also created several physical layer standards for different LAN protocols. Flow control and error control duties are collected into the LLC sublayer. MAC sublayer governs the operation of access method. Framing is handled in both the LLC sublayer and the MAC sublayer. The LLC sublayer is the same for all LANs. The LANs differ in their MAC sublayer and in their physical layer.

LANs The LAN market has seen several technologies such as Ethernet, Token Ring, Token Bus, FDDI, and ATM LAN. Some of these technologies survived for a while, but Ethernet is by far the dominant technology.

Ethernet

Ethernet Ethernet is the most popular LAN. Ethernet use CSMA/CD as an access method. Traditional Ethernet is designed to operate at 10 Mbps. For a higher data rate, Fast Ethernet is designed to operate at 100 Mbps. For an even higher data rate, Gigabit Ethernet is designed to operate at 1000 Mbps. There are four different implementations for baseband (digital), Traditional Ethernet : 10 Base 5 10 Base 2 10 Base-T 10 Base-FL

The Ethernet Frame Format The Ethernet frame include the following fields: Description Frame field Marks the start of the frame Preamble The origin and destination physical addresses Destination and source addresses Used to identify the network layer protocol Type The data encapsulated from the upper layer protocol. Data Error-checking field to determine if the frame arrived without being corrupted Cyclical redundancy check (CRC)

10 Base5: Thick Ethernet It is sometimes called thick Ethernet, or Thicknet. This Ethernet LAN makes use of thick coaxial cable. It uses a bus topology with an external transceiver (transmitter/receiver) connected via a tap to the thick coaxial cable. The transceiver is responsible for transmitting, receiving, and detecting collisions. The maximum length of the coaxial cable must not exceed 500 m. Can support as many as 100 nodes (stations, repeaters, and so on) per backbone segment. 

Transceiver cables or drop cable that connects the transceiver to the NIC.

10Base2: Thin Ethernet It is called thin Ethernet, or Cheapernet. The size of the coaxial cable is much thinner and more flexible than the 10Base5. It also uses a bus topology applied as a daisy chain. In this Ethernet, the transceiver is normally part of the network interface card (NIC), which is installed inside the station. Note that the collision here occurs in the thin coaxial cable. This implementation is more cost effective than 10Base5 because thin coaxial cable is less expensive than thick coaxial. The length of each segment cannot exceed 200 m. Can support up to 30 nodes per backbone segment. 

10BaseT It uses twisted-pair cable to connect computers. It use a physical star topology, but internally they use a bus signaling system like other Ethernet configurations. The stations are connected to a hub via two pairs of twisted cable, one pair is used to receive data and one pair is used to transmit data. Any collision here happens in the hub. The maximum length of a 10BaseT segment is 100m. Can support up to 1024 nodes. 

10Base-F 10 Base-F uses a star topology to connect stations to a hub. The stations are connected to the hub using two fiber-optic cables. The segment length is 2,000 m.

Token Ring

Token Ring The Token Ring architecture was developed in the mid-1980s by IBM.  Token Ring specifications are governed by the IEEE 802.5 standards. It use the token-passing access method. It can be implemented with a physical ring, or  can be a logical ring with a physical star topology. The logical ring represents the token's path between computers. The actual physical ring of cable is in the hub.

Token Ring A Token Ring network includes the following features: Star-wired ring topology Token-passing access method Shielded and unshielded twisted-pair cabling Transfer rates of 4 and 16 Mbps Baseband transmission

Token Ring In a pure token-passing network ( with ring topology), a computer that fails, stops the token from continuing. This in turn brings down the network. In the logical ring , a hub is designed to detect a failed NIC, and to disconnect from it. This procedure bypasses the failed computer so that the token can continue on.  Therefore, a faulty computer or connection will not affect the rest of the Token Ring network.

Token Ring The hub in the Token Ring networks does not function like a shared Ethernet hub. The Token Ring method is more deterministic and ensures that all users get regular turns at transmitting their data. With Ethernet, all users compete to get onto the network.

Token Ring Frame Formats The Token Ring frame include the following fields:

Description Frame field Indicates start of the frame Start delimiter Indicates the frame's priority and whether it is a token or a data frame Access control Contains either Media Access Control information for all computers or "end station" information for only one computer Frame control The address of receiver Destination address The address of source Source address Contains the data being sent Information, or data Contains CRC error-checking information Frame check sequence Indicates the end of the frame End delimiter Tells whether the frame was recognized, copied, or whether the destination address was available Frame status

Monitoring the System The first computer to come online is assigned by the Token Ring system to monitor network activity. The monitoring computer makes sure that frames are being delivered and received correctly. It does this by checking for frames that have circulated the ring more than once and ensuring that only one token is on the network at a time. Also the process of monitoring called beaconing. The active monitor sends out a beacon announcement every seven seconds. The beacon is passed from computer to computer throughout the entire ring.

Cont. If a station does not receive an expected announcement from its upstream neighbor, it attempts to notify the network of the lack of contact. It sends a message that includes its address, the address of the neighbor that did not announce, and the type of beacon. From this information, the ring attempts to diagnose the problem and make a repair without disrupting the entire network. If it is unable to complete the reconfiguration automatically, manual intervention is required.