IEEE l IEEE has had the greatest impact on Layer 2 standards. l IEEE divided Layer 2 into two sublayers.

Slides:



Advertisements
Similar presentations
Token Ring/IEEE Risanuri Hidayat.
Advertisements

Ethernet Risanuri Hidayat. Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE standard. Three.
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 1 Local Area Network (LAN) Technologies.
LAN Protocol Architecture
CHAPTER Practical Token Ring Implementation. Chapter Objectives Give an overview of the Token Ring LAN Describe the characteristics of the Token Ring.
Token Ring and Fiber Distributed Data Interface (FDDI)
Token Ring/IEEE Annida Farhana bt SuibWET Azuna Nurzahra bt KandarWET Ima Shanaz bt Wahidin WET Farah Nawwar bt BidinWET
Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI)
Institute of Technology Sligo - Dept of Computing Naming & Framing Ch. 6–Layer 2 Concepts Paul Flynn.
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
Token Ring and FDDI.
CS335 Networking & Network Administration Tuesday, April 13, 2010.
Understanding Network Architecture Access Methods –CSMA/CD Carrier Sense Multiple Access/Collision Detect –CSMA/CA Carrier Sense Multiple Access/Collision.
The Saigon CTT Semester 1 CHAPTER 6. The Saigon CTT  Content LAN Standards. Hexadecimal Numbers. MAC Addressing. Framing. Media Access Control (MAC).
LECTURE 13 NET BASE FP STANDARDS Pair of Fiber Optics. Star topology. 1 km for each part of network. Analog signal. Encoding the digital signal.
Local Area Network local area network (LAN) is a computer network that is designed for a limited geographic area such as a building or a campus. Although.
Internet Protocol (IP)
LOCAL AREA NETWORS. A local area network (LAN) is a data communication system that allows a number of independent devices to communicate directly with.
IEEE Standards, FDDI, Collision Free Protocols
Packet Transmission (Part III) Local Area Networks (LANs)
Layer 2: Technologies Chapter 7
Layer 2 Technology Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Lecture 9: Ethernet and Token Ring Networks
Naming & Framing Ch. 6–Layer 2 Concepts By: Allan Johnson.
1 Layer 2: Concepts Honolulu Community College Cisco Academy Training Center Semester 1 Version
1 Ethernet & IEEE Cisco Section 7.3 Stephanie Hutter October 2000.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
Access to Shared Media - Media Access Control protocols RD-CSY10171.
McGraw-Hill©The McGraw-Hill Companies, Inc. Chapter 9 Local Area Networks Part I: Basic Concepts and Wired Ethernet LANs.
1 Semester 1 CHAPTER 6 REVIEW JEOPARDY Frames Data Link LayerMACAddressingHexadecimalsMiscellaneous
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
Chapter Six The Data Link Layer. Objectives Learn about physical addressing on the network. Explore the MAC and LLC sublayers of Data Link. Get introduced.
Semester 1 Chapter6 + Chapter7 Layer 2 Data Link Layer Concepts And Technologies.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
Ethernet Overview it the IEEE standard for Ethernet.
The Saigon CTT Semester 1 CHAPTER 7 Le Chi Trung.
Naming & Framing Ch. 6–Layer 2 Concepts. Layer 2’s Job For every limitation of Layer 1, Layer 2 has a solution. Layer 1 cannot name computers. How does.
IEEE 802.X Standards The Institute of Electrical and Electronics Engineers (IEEE) has developed a series of networking standards to ensure that networking.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
Network Communications Chapter 9
FDDI Network Security.
CS3502: Data and Computer Networks Loca Area Networks - 3 Adaptive Tree Walk Token Ring LAN : IEEE slotted rings FDDI.
802.5 Token-Ring Networks Differential Manchester Encoding –For a 1 No transition at start of bit period Transition in middle –For a 0 Transition at start.
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Introduction to Computer Networks Introduction to Computer Networks.
Data Communication Networks Lec 18. Wired LAN:Ethernet Datalink layer – Logical link control(LLC) – MAC Physical layer.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D.
Part III Datalink Layer.
Data Networking via LANs Packets and Frames
TOKEN BUS & TOKEN RING.
Ethernet and Token Ring LAN Networks
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
Internet Protocol (IP)
Ethernet and Token Ring LAN Networks
Chapter 12 Local Area Networks
Token Ring/IEEE Risanuri Hidayat.
شبكات الحاسب 2_2.
FDDI.
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
Part III Datalink Layer.
7- chapter Seven Local Area Networks (LAN)
Chapter 12 Local Area Networks
Chapter 12 Local Area Networks
Chaithra Ashwin Sanjana
Ethernet and Token Ring LAN Networks
Chapter 13 Wired LANs: Ethernet
Presentation transcript:

IEEE l IEEE has had the greatest impact on Layer 2 standards. l IEEE divided Layer 2 into two sublayers.

IEEE—Layers 1 & 2 l The Logical Link Control sublayer was created to provide different Layer 1 technologies a single method of accessing the higher layers. IEEE Base TIEEE 802.5FDDI IEEE Ethernet These sample technologies include Layer 1 & the MAC sublayer of Layer 2 LLC sublayer of Layer 2

BASIC OF TOKEN-RING

Variants IBM developed the first Token Ring network in the 1970s. It is still IBM's primary LAN technology, and is second only to Ethernet (IEEE 802.3) in terms of LAN implementation.

Ring Topology

Data passing When a station has information to transmit, it seizes the token and sends data frame to the next station. When a station has information to transmit, it seizes the token and sends data frame to the next station. When frame reaches the destination station, the data is copied for processing. When frame reaches the destination station, the data is copied for processing. Frame continues to circle the ring until it returns to the sending station. Frame continues to circle the ring until it returns to the sending station. Sending station removes the frame from the ring, verifies receipt, and releases the token. Sending station removes the frame from the ring, verifies receipt, and releases the token.

Token-Ring frame format

Start Delimiter and End Delimiter l Start delimiter. –Alert for the arrival of a token. –Includes an identification symbol. –Violates the encoding system to differentiate it from other frame fields. l End Delimiter –Completes the token or data/command frame. –Contains damage indicator. –Last of logical sequence.

Access control P: Priority bits P: Priority bits T: Token bit T: Token bit M: Monitor bit M: Monitor bit R: Reservation bits R: Reservation bits (this is the second field in the frame. It is one byte, or 8 bits; each bit has it’s own function.) (this is the second field in the frame. It is one byte, or 8 bits; each bit has it’s own function.) PPPTMRRR

Frame control Only present in data/command frames. Indicates whether frame contains data or control information. If control, this byte specifies type of control information. Only present in data/command frames. Indicates whether frame contains data or control information. If control, this byte specifies type of control information.

Destination and Source addresses Universal Address. Local Administered Address. Broadcast Address (D). Functional Address (0x0C XXXX) (D). Universal Address. Local Administered Address. Broadcast Address (D). Functional Address (0x0C XXXX) (D).

Data Length limited by the maximum time a station may hold the token.

Frame checksum Frame Check Sequence. Source fills field with calculated value dependent on frame contents. Destination recalculates to check data integrity. Frame is discarded if damaged. Frame Check Sequence. Source fills field with calculated value dependent on frame contents. Destination recalculates to check data integrity. Frame is discarded if damaged.

Frame status Address recognized / frame copied indicator.

Management mechanisms l Active Monitor –One station acts as centralized source of timing information for other stations. –Removes continuously circulating frames by set monitor bit to 1 (i.e., ends “loops”). –Start a token, when token have been lost. l Beaconing –Detects and repairs network faults. –Initiates auto-reconfiguration.

Physical topology l l Physical topology : Star. l l Logical topology : Ring. l l IBM Token Ring network stations are connected to MSAU (Multi-Station Access Unit). l l Many MSAU can be wired together to form one large ring.

Multi-MSAU