BYABHIJEET KUMAR SHAH
 The term Ethernet refers to the family of local-  area network (LAN). A local-area network (LAN) protocol developed by ...
 The Ethernet specification served as the basis for the  IEEE 802.3 standard, which specifies the physical and  lower sof...
FAST ETHERNET Fast Ethernet was designed to compete with LAN  protocols such as FDDI (Fiber Distributed Data  Interface) ...
 The need for higher data rate resulted in the design of the    Gigabit Ethernet (1000 Mbps).    The IEEE committee call...
(a) point to point between two computers(b) (b) point to point between switch and computer
 Half duplex is used when computers are connected by    a hub.   Collision in hub is possible and so CSMA/CD is    requi...
 The heart of the system is a switch containing a high  speed back-plane and room for typically 4 to 32 plug-  in cards, ...
 All ports on the same card are wired together to form a    local on-card LAN.   Collisions on this on-card LAN are dete...
 MAC begins the transmission sequence by transferring the    LLC information into the MAC frame buffer.   The preamble a...
 After the frame is assembled, actual frame    transmission will depend on MAC.   There are two Media Access Control(MAC...
 Refers to the transmission of data in just one direction  at a time. Half-Duplex Ethernet is the traditional form of  E...
 The network is monitored for presence of a  transmitting station (carrier sense). After sending the jam sequence the tr...
 If a collision is detected, the transmitting station stops  sending the frame data and sends a 32-bit "jam  sequence. I...
 Based on the IEEE 802.3x standard, “Full-Duplex”  MAC type bypasses the CSMA/CD protocol Full-duplex mode allows two st...
 Full-Duplex operation is supported by: – 10-Base-T, 10Base-FL, 100Base-TX, 100Base-    FX, 100Base-   T2, 1000Base-CX,...
Full Duplex Operation
 Full-duplex MACs must have separate frame buffers and  data paths to allow for simultaneous frame transmission  and rece...
 ISO data link layer is divided into two IEEE 802 sublayers      Media Access Control (MAC) sublayer      MAC-client subl...
 The Ethernet MAC Sublayer has two primary responsibilities:   Data encapsulation, including frame assembly before    tr...
 Token ring local area network (LAN) technology is    a protocol which resides at the data link layer (DLL) of    the OSI...
 In token ring , Data being transmitted sequentially  from one ring station to the next with a control token  circulating...
 In 1985, token ring ran at 4 Mbit/s. In 1989 IBM introduced the first 16 Mbit/s token ring  products and the 802.5 stan...
 A data token ring frame is used by stations to  transmit media access control(MAC) management  frames or data frames fro...
PDU from SD     AC    SD      AC     FC     DA     SA    LLC (IEEE CRC    ED      FS                                      ...
 Starting Delimiter(SD) consists of a special bit pattern  denoting the beginning of the frame. The bits from  most signi...
 Frame Control(FC) a one byte field that contains bits describing the data portion of the frame contents which indicates ...
 Destination address (DA) a six byte field used to  specify the destination(s) physical address . Source address(SA) Con...
 Ending Delimiter(ED) The counterpart to the starting  delimiter, this field marks the end of the frame and  consists of ...
 TOKEN FRAME   Start Delimiter     Access Control      End Delimiter     8 bits              8 bits                  8 bi...
 Empty information frames are continuously circulated  on the ring. When a computer has a message to send, it inserts a ...
 When the frame gets back to the originator, it sees that  the token has been changed to 0 and that the message  has been...
Thank   You
Ethernet and token ring
Ethernet and token ring
Ethernet and token ring
Ethernet and token ring
Ethernet and token ring
Ethernet and token ring
Ethernet and token ring
Ethernet and token ring
Ethernet and token ring
Upcoming SlideShare
Loading in...5
×

Ethernet and token ring

8,192
-1

Published on

Published in: Technology
0 Comments
8 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
8,192
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
331
Comments
0
Likes
8
Embeds 0
No embeds

No notes for slide

Ethernet and token ring

  1. 1. BYABHIJEET KUMAR SHAH
  2. 2.  The term Ethernet refers to the family of local- area network (LAN). A local-area network (LAN) protocol developed by XeroxCorporation in cooperation with DEC and Intel in 1976. Ethernet uses a bus or star topology and supports data transfer rates of 10/100/1000 Mbps. Ethernet defines the lower two layers of the OSI Reference Model.
  3. 3.  The Ethernet specification served as the basis for the IEEE 802.3 standard, which specifies the physical and lower software layers. Ethernet uses the CSMA/CD access method to handle simultaneous demands. Ethernet, like other local area networks, falls in a middle ground between long-distance, low-speed networks that carry data for hundreds or thousands of kilometres, and specialized, very high speed interconnections that are generally limited to tens of meters.
  4. 4. FAST ETHERNET Fast Ethernet was designed to compete with LAN protocols such as FDDI (Fiber Distributed Data Interface) or Fiber Channel. IEEE created Fast Ethernet under the name 802.3u. Fast Ethernet is backward-compatible with Standard Ethernet. It can transmit data 10 times faster at a rate of 100 Mbps.
  5. 5.  The need for higher data rate resulted in the design of the Gigabit Ethernet (1000 Mbps). The IEEE committee calls the standard 802.3z. All configurations of gigabit Ethernet are point to point. Point-to-point, between two computers or one computer – to –switch. It supports two different modes of operation: full duplex mode and half duplex mode. Full duplex is used when computers are connected by a switch. No collision is there and so CSMA/CD is not used.
  6. 6. (a) point to point between two computers(b) (b) point to point between switch and computer
  7. 7.  Half duplex is used when computers are connected by a hub. Collision in hub is possible and so CSMA/CD is required. The 802.3z committee considered a radius of 25 meters to be unacceptable and added two new features to increase the radius-Carrier Extension and Frame Bursting. Carrier Extension tells the hardware to add its own padding bits after the normal frame to extend the frame to 512 bytes. Frame Bursting allows a sender to transmit a concatenated sequence of multiple frames in a single transmission. If the total burst is less than 512 bytes, the hardware pads it again.
  8. 8.  The heart of the system is a switch containing a high speed back-plane and room for typically 4 to 32 plug- in cards, each containing one to eight connectors. When a station wants to transmit a frame, it outputs a frame to switch. The plug-in card checks to see if the frame is for the other station on the same card. If so, it is copied there otherwise it is sent over high speed back-plane to destination station’s card.
  9. 9.  All ports on the same card are wired together to form a local on-card LAN. Collisions on this on-card LAN are detected and handled using CSMA/CD protocol. One transmission per card is possible at any instant. All the cards can transmit in parallel. With this design each card forms its own collision domain. In other design, each input port is buffered, so incoming frames are stored in the card’s on board RAM. It allows all input ports to receive (and transmit) frame at same time
  10. 10.  MAC begins the transmission sequence by transferring the LLC information into the MAC frame buffer. The preamble and start-of-frame delimiter are inserted in the PRE and SOF fields. The destination and source addresses are inserted into the address fields. The LLC data bytes are counted, and the number of bytes is inserted into the Length/Type field. The LLC data bytes are inserted into the Data field. If the number of LLC data bytes is less than 46, a pad is added to bring the Data field length up to 46. An FCS value is generated over the DA, SA, Length/Type, and Data fields and is appended to the end of the Data field.
  11. 11.  After the frame is assembled, actual frame transmission will depend on MAC. There are two Media Access Control(MAC) protocols defined for Ethernet: Half-Duplex Full-Duplex Half-Duplex is the traditional form of Ethernet that uses the CSMA/CD protocol. Full-Duplex bypasses the CSMA/CD protocol Full-duplex mode allows two stations to simultaneously exchange data over a point to point link that provides independent transmit and receive paths
  12. 12.  Refers to the transmission of data in just one direction at a time. Half-Duplex Ethernet is the traditional form of Ethernet that uses the CSMA/CD. The CSMA/CD access rules are summarized by the protocols acronym: carrier sense multiple access collision detect Half duplex Ethernet assumes that all the "normal" rules of Ethernet are in effect on the local network.
  13. 13.  The network is monitored for presence of a transmitting station (carrier sense). After sending the jam sequence the transmitting station waits a random period of time (called “backoff”). If an active carrier is not detected then the station immediately begins transmission of the frame. While the transmitting station is sending the frame, it monitors the medium for a collision.
  14. 14.  If a collision is detected, the transmitting station stops sending the frame data and sends a 32-bit "jam sequence. If repeated collisions occur, then transmission is repeated - the random delay is increased with each attempt Once a station successfully transmits a frame, it clears the collision counter it uses to increase the backoff time after each repeated collision.
  15. 15.  Based on the IEEE 802.3x standard, “Full-Duplex” MAC type bypasses the CSMA/CD protocol Full-duplex mode allows two stations to simultaneously exchange data over a point to point link The aggregate throughput of the link is effectively doubled – A full-Duplex 100 Mb/s station provides 200 Mb/s of bandwidth
  16. 16.  Full-Duplex operation is supported by: – 10-Base-T, 10Base-FL, 100Base-TX, 100Base- FX, 100Base- T2, 1000Base-CX, 1000Base-SX, 1000Base-LS, and 1000Base-T. Full-Duplex operation is NOT supported by: – 10Base5, 10Base2, 10Base-FP, 10Base-FB, and 100Base- T4. Full-Duplex operation is restricted to point to point links connecting exactly two stations
  17. 17. Full Duplex Operation
  18. 18.  Full-duplex MACs must have separate frame buffers and data paths to allow for simultaneous frame transmission and reception. The destination address of the received frame is checked to determine whether the frame is destined for that station If an address match is found  the frame length is checked and the received FCS is compared to the FCS that was generated during frame reception.  If the frame length is okay and there is an FCS match, the frame type is determined by the contents of the Length/Type field.  The frame is then parsed and forwarded to the appropriate upper layer.
  19. 19.  ISO data link layer is divided into two IEEE 802 sublayers Media Access Control (MAC) sublayer MAC-client sublayer. IEEE 802.3 physical layer same as ISO physical layer. The MAC-client sublayer may be  Logical Link Control (LLC) if the unit is a DTE  Bridge entity, if the unit is a DCE  Lan to LAN if  Ethernet to etnernet  Ethernet to token ring
  20. 20.  The Ethernet MAC Sublayer has two primary responsibilities:  Data encapsulation, including frame assembly before transmission, and frame parsing/error detection during and after reception  Media access control, including initiation of frame transmission and recovery from transmission failure
  21. 21.  Token ring local area network (LAN) technology is a protocol which resides at the data link layer (DLL) of the OSI model. It uses a special three-byte frame called a token that travels around the ring. Token-possession grants the possessor permission to transmit on the medium. Token ring frames travel completely around the loop. it was eventually standardized with protocol IEEE 802.5. Stations on a token ring LAN are logically organized in a ring topology .
  22. 22.  In token ring , Data being transmitted sequentially from one ring station to the next with a control token circulating around the ring controlling access. Token passing mechanism is shared by ARCNET, token bus, and FDDI ,and has theoretical advantages over the stochastic CSMA/CD of Ethernet. A token ring network is wired as a star, with hubs and arms out to each station and the loop going out-and- back through each. Cabling is generally "Type-1" shielded twisted pair, with unique hermaphroditic connectors, commonly referred to as IBM data connectors in formal writing or colloquially as Boy George connectors
  23. 23.  In 1985, token ring ran at 4 Mbit/s. In 1989 IBM introduced the first 16 Mbit/s token ring products and the 802.5 standard was extended to support this. In 1981, Apollo Computer introduced their proprietary 12 Mbit/s Apollo token ring (ATR). Proteon introduced their 10 Mbit/s ProNet-10 token ring network in 1984.
  24. 24.  A data token ring frame is used by stations to transmit media access control(MAC) management frames or data frames from upper layer protocols and applications. Token Ring support two basic frame types: tokens and data/command frames. Tokens are 3 bytes in length and consist of a start delimiter, an access control byte, and an end delimiter. Data/command frames vary in size, depending on the size of the Information field
  25. 25. PDU from SD AC SD AC FC DA SA LLC (IEEE CRC ED FS 802.2) up to8 8 8 8 8 48 48 32 8 18200x8 8 bitsbits bits bits bits bits bits bits bits bits bits
  26. 26.  Starting Delimiter(SD) consists of a special bit pattern denoting the beginning of the frame. The bits from most significant to least significant are J,K,0,J,K,0,0,0. J and K are code violations. Access Control(AC) this byte field consists of the following bits from most significant to least significant bit order: P,P,P,T,M,R,R,R. The P bits are priority bits, T is the token bit which when set specifies that this is a token frame, M is the monitor bit which is set by the Active Monitor (AM) station when it sees this frame, and R bits are reserved bits.
  27. 27.  Frame Control(FC) a one byte field that contains bits describing the data portion of the frame contents which indicates whether the frame contains data or control information. In control frames, this byte specifies the type of control information. + Bits 0–1 Bits 2–7 0 Frame type Control BitsFrame type – 01 indicates LLC frame IEEE 802.2 (data)and ignore control bits; 00 indicates MAC frame andcontrol bits indicate the type of MAC control frame
  28. 28.  Destination address (DA) a six byte field used to specify the destination(s) physical address . Source address(SA) Contains physical address of sending station . It is six byte field that is either the local assigned address (LAA) or universally assigned address (UAA) of the sending station adapter. Data a variable length field of 0 or more bytes, the maximum allowable size depending on ring speed containing MAC management data or upper layer information.Maximum length of 4500 bytes. Frame Check Sequence a four byte field used to store the calculation of a CRC for frame integrity verification by the receiver.
  29. 29.  Ending Delimiter(ED) The counterpart to the starting delimiter, this field marks the end of the frame and consists of the following bits from most significant to least significant: J,K,1,J,K,1,I,E. I is the intermediate frame bit and E is the error bit. Frame Status(FS)a one byte field used as a primitive acknowledgement scheme on whether the frame was recognized and copied by its intended receiver. A C 0 0 A C 0 0 1 bit 1 bit 1 bit 1 bit 1 bit 1 bit 1 bit 1 bit A = 1, Address recognized C = 1, Frame copied
  30. 30.  TOKEN FRAME Start Delimiter Access Control End Delimiter 8 bits 8 bits 8 bits Abort Frame SD ED 8 bits 8 bits Used to abort transmission by the sending station
  31. 31.  Empty information frames are continuously circulated on the ring. When a computer has a message to send, it inserts a token in an empty frame (this may consist of simply changing a 0 to a 1 in the token bit part of the frame) and inserts a message and a destination identifier in the frame. The frame is then examined by each successive workstation. The workstation that identifies itself to be the destination for the message copies it from the frame and changes the token back to 0.
  32. 32.  When the frame gets back to the originator, it sees that the token has been changed to 0 and that the message has been copied and received. It removes the message from the frame. The frame continues to circulate as an "empty" frame, ready to be taken by a workstation when it has a message to send.
  33. 33. Thank You
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×