IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.

Slides:



Advertisements
Similar presentations
INTRODUCTION TO NETWORKS
Advertisements

Data Link Layer B. Konkoth. PDU  Protocol Data Unit  A unit of data which is specified in a protocol of a given layer  Layer 5, 6, 7 – Data  Layer.
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
1 Chapter 9 Computer Networks. 2 Chapter Topics OSI network layers Network Topology Media access control Addressing and routing Network hardware Network.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2007 (Week 4, Tuesday 1/30/2007)
1 LANs are Subnet Standards Only Physical and Data Link Layer standards Implemented by the NICs:NICs Application Transport Internet LAN Subnet (NIC) Application.
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Review on Networking Technologies Linda Wu (CMPT )
Understanding Networks II. Objectives Compare client and network operating systems Learn about local area network technologies, including Ethernet, Token.
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
1 LAN Topologies, Access methods (Week 1, Wednesday 1/10/2007) © Abdou Illia, Spring 2007.
Core 3: Communication Systems. On any network there are two types of computers present – servers and clients. By definition Client-Server architecture.
COMPUTER NETWORKS.
Term 2, 2011 Week 1. CONTENTS Network communications standards – Ethernet – TCP/IP Other network protocols – The standard – Wireless application.
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Network Topologies An introduction to Network Topologies and the Link Layer.
Chapter 4.  Understand network connectivity.  Peer-to-Peer network & Client-Server network  Understand network topology  Star, Bus & Ring topology.
Chapter Five Network Architecture. Chapter Objectives  Describe the basic and hybrid LAN technologies  Describe a variety of enterprise-wide and WAN.
Network Architecture Layout designed and constructed by: Vicki Kertz.
Network Access and Transmission Methods Chapter 10.
SIMS-201 Computer Networks. 2 Introduction to Computer Networks Chapter 19 The Local Area Network  Overview.
Basic network concepts (Part 5)
Introduction to IT and Communications Technology Justin Champion C208 – 3292 Ethernet Fundamentals CE
20 LAN Hardware Overview Version A.01 H3065S Module 2 Slides.
1 LAN Technologies and Network Topology. 2 Direct Point-to-Point Communication.
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
Ch. 16 High-Speed LANs The Emergence of High- Speed LANs Trends –Computing power of PCs has continued to grow. –MIS organizations recognize the.
Introduction network Protocol
LAN Topologies and Standards Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009 Asia Pacific.
Lesson 3—Networking BASICS1 Networking BASICS Network Design Unit 2 Lesson 3.
Local Area Network Daniel Shin CS 147, Section 3 November 18, 2008.
Logical & Physical Topologies A logical technology is how the hosts are connected logically example token Ring can be laid out in a physical star but.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
1 Data Link Layer Lecture 22 Imran Ahmed University of Management & Technology.
Fast Ethernet for Networks def-fastethernet.htm/ Link provided by yuhong Villanova university.
 LANs – A Definition - A local area network (LAN) is a computer network covering a small physical area, like a home, office, or small group of buildings,
Day10 LAN. Why? Allow more than one machine to share –Resources –Internet connectivity –Information.
Chapter 11 Extending LANs 1. Distance limitations of LANs 2. Connecting multiple LANs together 3. Repeaters 4. Bridges 5. Filtering frame 6. Bridged network.
Ethernet Overview it the IEEE standard for Ethernet.
Lesson 4—Networking BASICS1 Networking BASICS Network Architectures Unit 2 Lesson 4.
Understanding Network Architecture CHAPTER FOUR. The Function of Access Methods The set of rules that defines how a computer puts data onto the network.
1 Chapter Overview Ethernet Token Ring FDDI Wireless Networking.
Internetworking School of Business Eastern Illinois University © Abdou Illia, Spring 2016 (February 3, 2016)
Introduction to Computer Networks Introduction to Computer Networks.
Simple LAN Topologies  Terminators stop signals after they have reached their destination  Signal bounce –Phenomenon in which signals travel endlessly.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Welcome Back Cisco Semester 1 & 2 Review. Why are Networks Complex Environments?? They involve: They involve: –Interconnections to networks outside an.
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
COMPUTER NETWORKS CS610 Lecture-13 Hammad Khalid Khan.
SIMS-201 Computer Networks.
Network Access and Transmission Methods
Multiple Access Methods
Network Protocols.
Nada Al Dosary CT 1502 Planning and Design of Communication Networks Local Area Networks (LANs) & Networks.
TOKEN BUS & TOKEN RING.
Ethernet and Token Ring LAN Networks
Ethernet and Token Ring LAN Networks
Multiple Access Methods
Physical and Logical Topologies
Protocol layering and data
7- chapter Seven Local Area Networks (LAN)
SIMS-201 Computer Networks.
Protocol layering and data
Multiple Access Methods
Ethernet and Token Ring LAN Networks
SYSTEM ADMINISTRATION Chapter 3
Presentation transcript:

IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking technologies developed by manufacturers are compatible. These standards describe the cabling, physical topology, electrical topology and access schemes of network products. These standards describe the protocols used in the lower two layers of the OSI model: 1. Physical layer 2.Data link layer. They don’t go above those layers.

The committee structure of the IEEE is numbered like the decimal system. The general committee working on these standards is 802. Various subcommittees, designed by decimal numbers, have worked on different version of the standards.

IEEE The IEEE standard specifies the characteristics for Token Ring networks. Token Ring was introduced by IBM in the mid- 1980s.

What is token ring LAN? Token ring LAN technology is a local area network protocol which resides at the data link layer (DLL) of the OSI model. Stations on a token ring LAN are logically organized in a ring topology with data being transmitted sequentially from one ring station to the next with a token travelling around the ring. This standard describes a token passing protocol which means that a machine can only use the network when it has control of the “token” This ensures that there are no collisions because only one machine can use the network at any given time.

Token ring protocol uses a special three-byte frame called a token that travels around the ring. Token ring frames travel completely around the loop. Stations that have data frames to transmit must first acquire the token before they can transmit data frames.

When no station is transmitting a data frame, a token frame circles the loop. This token frame is repeated from station to station until arriving at a station that needs to transmit data. When a station needs to transmit data, it first has to capture the free Token and replace the data with its own message. Once the sending station receives its data frame, it converts the frame back into a token. On 4 Mbit/s Token Ring, only one token may circulate; on 16 Mbit/s Token Ring, there may be multiple tokens.

Operation of Token Ring At the start, a free Token is circulating on the ring. If machine 1 wants to send some data to machine 4, so it first has to capture the free Token. It then writes its data and the recipient's address onto the Token (represented by the yellow flashing screen).

The packet of data is then sent to machine 2 who reads the address, realizes it is not its own, so passes it on to machine 3. Machine 3 does the same and passes the Token on to machine 4. This time it is the correct address and so number 4 reads the message (represented by the yellow flashing screen). Machine 4 cannot, however, release a free Token on to the ring, it must first send the message back to number 1 with an acknowledgement to say that it has received the data (represented by the purple flashing screen).

The receipt is then sent to machine 5 who checks the address, realizes that it is not its own and so forwards it on to the next machine in the ring, number 6. Machine 6 does the same and forwards the data to number 1, who sent the original message. Machine 1 recognizes the address, reads the acknowledgement from number 4 (represented by the purple flashing screen) and then releases the free Token back on to the ring ready for the next machine to use.

That's the basics of Token Ring and it shows how data is sent, received and acknowledged.

The following is a list of the specific characteristics specified in the standard: Speed: The Token Ring specifies network speeds of 4 and 16Mbps. Topology: Token Ring networks use a logical ring topology and most often a physical star. Media: Token Ring networks use unshielded twisted pair cabling or shielded twisted pair. Access method: specify an access method known as token passing.. The token travels around the network looking for computers with data to send. The computer's data is passed along with the token until it gets to the destination computer at which point, the data is removed from the token and the empty token placed back on the ring.

802.3 IEEE Standard The IEEE standard defines the characteristics for Ethernet networks. The Ethernet specification served as the basis for the IEEE standard What is an Ethernet? A LAN architecture or telecommunications networking protocol introduced by Xerox Corp. in It was developed as an inexpensive way of sending information quickly between offices machines connected together in a single room or building. The original data rate of 10 megabits per second has been increased to 100 megabits per second for a new standard known as fast Ethernet.

Ethernet uses a bus or star topology and supports data transfer rates of 10 Mbps.

The features for are listed here: Speed: The original IEEE standard specified a network transfer rate of 10Mbps. There have been modifications to the standard, the result being Fast Ethernet (802.3u), which can transmit network data up to 100Mbps and higher, as well as Gigabit Ethernet (802.3z), which can transmit at speeds up to 1000Mbps ae is a very fast standard. Known as 10-Gigabit Ethernet.

Topology: The original Ethernet networks used a bus or star topology because the original standard included specifications for both twisted pair and coaxial cabling.

Media The media refers to the physical cabling used to transmit the signal around the network. The original specifications identified coaxial and twisted pair cabling to be used. The more modern standards specify twisted pair and fiber-optic cable ae currently only supports fiber media.

Access method The access method refers to the way that the network media is accessed. Ethernet networks use a system called Carrier Sense Multiple Access with Collision Detection (CSMA/CD). The CSMA/CD method is internationally standardized in IEEE 802.3IEEE CSMA/CD works by monitoring the computers that are sending data on the network.

If two computers transmit data at the same time, a data collision will occur. To prevent collisions, the systems sending the data will be required to wait a period of time and then retransmit the data to avoid the collision.

Carrier Sense Multiple Access / Collision Detection, a set of rules determining how network devices respond when two devices attempt to use a data channel simultaneously (called a collision). CSMA/CD is a type of contention protocol i.e. how to handle competition of resources. The term contention is used especially in networks to describe the situation where two or more nodes attempt to transmit a message across the same wire at the same time.