Contributed by: Anubhooti Malhotra Himani Sharma BCA-2(A)

Slides:



Advertisements
Similar presentations
Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Advertisements

Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
University of Calgary – CPSC 441.  Ethernet, defined under IEEE 802.3, is one of today's most widely used data communications standards  It finds its.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
CCNA 1 v3.1 Module 6 Review. 2 What 3 things happen on an Ethernet network after a collision occurs? A backoff algorithm is invoked and transmission is.
Chapter 7 Local Area Networks: The Basics
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Chapter 15: LAN Systems Business Data Communications, 4e.
Module 6 Chapter 5. Ethernet Ethernet is now the dominant LAN technology in the world. Ethernet is not one technology but a family of LAN technologies.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
COMPUTER NETWORKS.
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
SIMS-201 LAN Basics, MANs, WANs.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
LOCAL AREA NETWORS. A local area network (LAN) is a data communication system that allows a number of independent devices to communicate directly with.
Lecture 2 Computer Communications and Networks Boriana Koleva Room: C54 Phone:
1 10Base-T Ethernet LAN. 2 LANs u Local Area Networks u Limited Geographical Area –Single office –Single building –University campus or industrial park.
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
Chapter 7 Local Area Networks: The Basics. Topics Definition of LAN Primary function, advantage and disadvantage Difference between Client/Server network.
1 Chapter 2: LAN Standards, Physical Connectivity, and Media Access.
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Fundamentals CE
Wired LANs: Ethernet In Chapter 1, we learned that a local area network (LAN) is a computer network that is designed for a limited geographic area such.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Basic LAN techniques IN common with all other computer based systems networks require both HARDWARE and SOFTWARE to function. Networks are often explained.
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
Local Area Network Daniel Shin CS 147, Section 3 November 18, 2008.
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
McGraw-Hill©The McGraw-Hill Companies, Inc., 2004 Chapter 14 Local Area Networks: Ethernet.
CT1303 LAN LECTURE 15.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
Ethernet Term Paper Introduced by: Almarshood, Yosef Bahaitham, Ahmed Alrashudi, Ahmed.
Local Area Networks: Ethernet. IEEE Background Institution of Electrical and Electronic Engineering (IEEE) A professional non-profit organization Project.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Ethernet Network Fundamentals – Chapter 9.
1Ethernet Lecture # 12 Computer Communication & Networks.
IST 126 Computer Networks Day 2. Server Security Only one password needed to access network Associated with the account is permission to access certain.
Summary - Part 2 - Objectives The purpose of this basic IP technology training is to explain video over IP network. This training describes how video can.
Lesson 4—Networking BASICS1 Networking BASICS Network Architectures Unit 2 Lesson 4.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
IEEE STANDARDS IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication.
Local Area Networks: Monil Adhikari. Primary Function of a LAN File serving – large storage disk drive acts as a central storage repository Print serving.
1 Chapter Overview Ethernet Token Ring FDDI Wireless Networking.
Rehab AlFallaj.  Standards determine:  Techniques used in the networks.  Its protocols.  Network specifications and features.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
LECTURE 10 NET301 11/12/2015Lect 10 NET NETWORK STANDARDS Standards determine: Techniques used in the networks. Its protocols. Network specifications.
Local Area Networks a data communication system that allows a number of independent devices to communicate directly with each other in a limited geographic.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Data and Computer Communications Eighth Edition by William Stallings Chapter 15 – Local Area Network Overview.
Introduction to Communication Lecture (10) 1. 2 Wired LANs: Ethernet IEEE Project 802 defines the LLC and MAC sublayers for all LANs including Ethernet.
Lec # 23 Data communucation Muhammad Waseem Iqbal 1ethernet.
ETHERNET Yash Vaidya. Introduction Ethernet is a family of computer networking technologies for local area networks (LANs). Ethernet was commercially.
LECTURE 11 NET301 11/16/2015Lect IEEE LAN STANDARDS Ethernet LAN (by Xerox): Topology: Bus Transmission Media: Thick Coaxial Cable. Signal: Digital.
SIMS-201 Computer Networks.
Ethernet and Token Ring LAN Networks
CT1303 LAN Rehab AlFallaj.
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
Protocol layering and data
7- chapter Seven Local Area Networks (LAN)
SIMS-201 Computer Networks.
Chapter 12 Local Area Networks
Protocol layering and data
Chapter 12 Local Area Networks
Ethernet 16EC351 Computer networks unit II Mr.M.Jagadesh,AP/ECE.
Ethernet and Token Ring LAN Networks
Presentation transcript:

Contributed by: Anubhooti Malhotra Himani Sharma BCA-2(A)

 The Institution of Electrical and Electronics Engineers (IEEE) has developed several standards for LANs. These standards are collectively known as IEEE 802 or Project 802.  The IEEE project 802 divides data link layer into two sub layers: Logical link control (LLC) and Medium access control (MAC).  LLC provides one single data link control protocol for all IEEE LANs. This single LLC protocol can provide interconnectivity between different LANs as it makes the MAC sub layer transparent. On the other hand MAC provides different protocols for the different LANs.

802.1 Network management and Internetworking Logical Link Control (LLC) Ethernet or CSMA/CD Token Bus Token Ring Metropolitan Area Networks (MAN) or Distributed Queue Dual Bus (DQDB) Band pass Technical Advisory Group Fibre Optic Technical Advisory Group Integrated Data and Voice Network Security Working Group Wireless LAN Demand priority

Cable Modems Wireless PAN Bluetooth certification ZigBee certification Broadband Wireless Access(WiMax certification) e (Mobile) Broadband Wireless Access Local Multipoint Distribution Service Resilient Package Ring Radio Regulatory TAG Coexistence TAG Mobile Broadband Wireless Access Media Independent Handoff Wireless Regional Area Network Wireless ISDN System

 IEEE supports a LAN standard originally developed by Xerox and later extended by a joint venture between Digital Equipment Corporation, Intel Corporation, and Xerox. This was called Ethernet.  IEEE defines two categories: baseband and broadband. The word base specifies a digital signal.  The word broad specifies an analog signal. IEEE divides the baseband category into five different standards: 10Base5, 10Base2, 10Base-T, 1Base5, and 100Base-T. The first num (10, 1, 100) indicates the data rate in Mbps.  The last number or letter (5, 2, 1, or T) indicates the maximum cable length or the type of cable.

Carrier Sense Multiple Access with Collision Detection

 Whenever multiple users have unregulated access to a single line, there is a danger of signals overlapping and destroying each other.  Such overlaps, which turns the signals into unusable noise, are called collisions.  As traffic increases on a multiple access link, so do collisions. A LAN therefore needs a mechanism to coordinate traffic, minimize the number of collisions that occur, and maximize the number of frames that are delivered successfully.

In CSMA system, any workstation wishing to transmit must first listen for existing traffic on the line. A device listens by checking for a voltage. If no voltage is detected, the line is considered idle and the transmission is initiated. CSMA cuts down on the number of collisions but does not eliminate them. Collisions can still occur. If another station has transmitted too recently for its signal to have reached the listening station, the listener assumes the line is idle and introduces its own signal onto the line.

 The final step is the addition of collision detection (CD).  In CSMA/CD the station wishing to transmit first listens to make certain the link is free, then transmits its data, then listens again.  During the data transmission, the station checks the line for the extremely high voltages that indicate a collision.  If a collision is detected, the station quits the current transmission and waits a predetermined amount of time for the line to clear, then sends its data again.

Each station on an Ethernet network (such as a PC, workstation, or printer) has its own network interface card (NIC). The NIC usually fits inside the station and provides the station with a six byte physical address. The number on the NIC is unique.

The baseband system use Manchester digital encoding. There is one broadband system, 10Broad36. Ethernet LANs can support data rates between 1 and 100 Mbps.

 Preamble: The first field of the frame, the preamble, contains seven bytes of alternating 0s and 1s that alert the receiving system to the coming frame and enable it to synchronize its input timing.  Start frame delimiter (SFD): The second field of the frame signals the beginning of the frame. The SFD tells the receiver that everything that follows is data, starting with the addresses.  Destination Address (DA): The destination address (DA) field is allotted six bytes and contains the physical address of the packet’s next destination.

 Source Address (SA): The source address (SA) field is also allotted six bytes and contains the physical address of the last device to forward the packet.  Length/type of PDU: These next two bytes indicate the number of bytes in the coming PDU.  frame (PDU): This field of the frame contains the entire frame as modular, removable unit.  CRC: The last field in the frame contains the error detection information in this case a CRC-32.

 The first of the physical standards defined in the IEEE model is called 10Base5, thick Ethernet, or Thicknet.  The nickname derives from the size of the cable, which is roughly the size of garden hose and too stiff to bend with your hands.  10Base5 is a bus topology LAN that uses baseband signalling and has maximum segment length of 500 meters.

The second Ethernet implementation defined by the IEEE 802 series is called 10Base2 or thin Ethernet. Thin Ethernet provides an inexpensive alternative to 10Base5 Ethernet, with the same data rate. The advantages of thin Ethernet are reduced cost and ease of installation. It also uses a bus topology.

o The most popular standard defined in the IEEE series is 10Base-T, a star topology LAN using unshielded twisted pair (UTP) cable instead of coaxial cable. o It supports a data rate of 10 Mbps and has a maximum length of 100 meters.

 Star LAN is an AT & T product used infrequently today because of its slow speed. At only 1 Mbps, it is 10 times slower than the three standards discussed above.  What is interesting about Star LAN is its range, which can be increased by a mechanism called Daisy Chaining. Like 10Base-T, star LAN uses twisted pair cable to connect stations to a central intelligent hub.

 Local area networks have a direct application in a factory automation and process control, where the nodes are computers controlling the manufacturing process.  In this type of application, real time processing with minimum delay is needed. Processing must occur at the speed as the objects moving along the assembly line.

Furthur…..  Ethernet Is not suitable protocol for this purpose because the number of collisions is not predictable and the delay in sending data from the control centre to the computers along the assembly line is not a fixed value.  Token Bus combines the features of Ethernet and Token Ring.  It combines the physical configuration of Ethernet and collision free feature of Token Ring.  Token Bus is a physical bus that operates as a logical ring using tokens.

Stations are logically organized into a ring. A token is passed among stations. If a station wants to send data, it must wait and capture the token. However, like Ethernet, stations communicate via a common bus. Token Bus is limited to factory automation and process control and has no commercial application in data communication. Also, the details of the operation are very involved. When a station passes the token, it sends a token to its logical neighbour irrespective of where that station is physically located on the cable.

MAC SUB LAYER  When the ring is initialized, stations are inserted into it in order of station address, from highest to lowest. Token passing is done from high to low address.  Whenever a station acquires the token, it can transmit frames for a specific amount of time.  If a station has no data, it passes the token immediately upon receiving it.  The Token Bus defines four priority classes, 0, 2, 4, and 6 for traffic, with 0 the lowest and 6 the highest.  Each station is internally divided into four substations, one at each priority level i.e. 0, 2, 4 and 6. ring.

 As input comes into the MAC sub layer from above, the data are checked for priority and routed to one of the four substations.  Thus each station maintains its own queue of frames to be transmitted.  When a token comes into the station over the cable, it is passed internally to the priority 6 substation, which can begin transmitting its frames, if it has any.  When it is done or when its time expires, the token is passed to the priority 4 substation, which can then transmit frames until its timer expires. After this the token is then passed internally to priority 2 substation.  This process continues until either the priority 0 substation has sent all its frames or its time expires.  After this the token is passed to the next station in the ring.

FRAME FORMAT The various fields present in the frame format are:  Preamble: This field is 1 byte long. It is used for synchronization.  Start Delimiter: This one byte field marks the beginning of frame.  Frame Control: This one byte field specifies the type of frame. It distinguishes data frame from control frames. For data frames it carries frame’s priority.  Destination Address: It specifies 2 to 6 bytes destination address.  Source Address: It specifies 2 to 6 bytes source address.  Data: This field may be up to 8182 bytes long when 2 bytes address are used & up to 8174 bytes long when 6 bytes address is used.  Checksum: This 4 byte field detects transmission errors. End Delimiter: This one byte field marks the end of frame.

Token Ring resolves this uncertainty by requiring that stations take turns sending data. Each station may transmit only during its turn and may send only one frame during each turn. The mechanism that coordinates this rotation is called Token passing. A token is a simple placeholder frame that is passed from station to station around the ring.

 Token Ring resolves this uncertainty by requiring that stations take turns sending data. Each station may transmit only during its turn and may send only one frame during each turn. The mechanism that coordinates this rotation is called Token passing. A token is a simple placeholder frame that is passed from station to station around the ring.

ADDRESSING Token ring uses a 6-byte address which is imprinted on the NIC card similar to Ethernet addresses. ELECTRICAL SPECIFICATION Signaling: Token ring uses differential Manchestar encoding. Data rate: token ring supports data rates of upto 16 Mbps.

References Castelli, Matthew (2002). Network Consultants Handbook. Cisco Press. ISBN Gallo, Michael; Hancock, William M. (2001). Networking Explained. Digital Press. ISBN External links IEEE Web Site Get the IEEE standard Troubleshooting Cisco Router Token Ring Interfaces Futureobservatory.org discussion of IBM's failure in token ring technology 802 Committee website IEEE 802 Standards