SlideShare a Scribd company logo
1 of 18
IEEE STANDARDS
802.3,802.4,802.5
INTRODUCTION
ļ¶IEEE 802 refers to a family of IEEE standards
ļƒ˜Dealing with local area network and metropolitan area network.
ļƒ˜Restricted to networks carrying variable-size packets.
ļƒ˜Specified in IEEE 802 map to the lower two layers
ļƒ¼ Data link layer
ļƒ¼ Physical layer
ļ¶The most widely used standards
ļ¶.802.3 - Ethernet
ļ¶802.4 - Token Bus
ļ¶802.5 - Token Ring
3
ETHERNET (IEEE 802.3 )
ļƒ˜The IEEE 802.3 standard specifies the CSMA/CD (Carrier Sense Multiple
Access with Collision Detection) media access control method. CSMA/CD is
the most commonly employed access method for LANs using a bus or tree
topology. It is the media access control method used by Ethernet[1].
ļƒ˜Most widely type used at present, with a huge installed base and considerable
operational experience.
ļƒ˜Protocol is very simple
ļƒ˜Stations can be added without making the network down.
ļƒ˜The delay at low load is practically zero. (no token waiting)
ETHERNET CABLING
The most common kinds of Ethernet cabling.
ETHERNET SIGNALLING
(a) Binary encoding, (b) Manchester encoding,
(c) Differential Manchester encoding.
CSMA/CD TRANSMISSION FRAME
ļ¶ Preamble
The preamble is responsible for providing the synchronization between the sending and receiving
device.It is a series of 56 bits (7 bytes) of alternating 1s and 0s found at the beginning of the frame[2]
ļ¶ Start of Frame Delimiter
The start frame delimiter follows the preamble. As its name implies, it indicates the start of the data frame.
The start frame delimiter is 1 byte in lengthā€”made up of the following 8-bit sequenceā€”10101011[3].
ļ¶ Address Fields
Each of the address fieldsā€”the destination address and the source addressā€”can be either 2 bytes or 6
bytes in length. If universal addressing is used, the addresses must be 6 bytes each. But if local addressing is
used they may be either 2 or 6 bytes long. Both destination and source addresses must be of the same length
for all devices on a given network[2].
ļ¶ Length Count
This is a 2-byte field indicating the length of the data field that follows. It is needed to determine the
length of the data field in those cases when a pad field is used[2].
ļ¶Information Field
The information field contains the actual data packet to be transmitted. Its
length is variable[2].
ļ¶ Pad Field
A pad field is used to ensure that the frame meets a minimum length
requirement. A frame must contain a minimum number of bytes in order for
stations to detect collisions accurately[2].
ļ¶Frame Check Sequence
The frame check field is used as an error-control mechanism. When the
transmitting device assembles a frame, it performs a calculation on the bits in
the frame. The algorithm used to perform this calculation always results in a 4-
byte value. The sending device stores this value in the frame check sequence
field[2].
TOKEN BUS (IEEE 802.4)
ā€¢ The IEEE 802.4 standard specifies the Token-bus media access control method. It is
one of two token passing access methods. IEEE 802.4 is based on a physical bus or tree
topology. The Token-bus approach requires a station to have possession of a token in
order to transmit. The token is passed from station to station in a logical ring[3].
ā€¢ Uses highly reliable cable television equipments.
ā€¢ It is more deterministic than 802.3, although repeated loss of token at critical times
can introduce the uncertainness.
ā€¢ Can easily handle shorter frames. (no limitation on frame size)
ā€¢ It supports priorities and hence suitable for Real Time traffic.
ā€¢ It also has excellent throughput and efficiency at high load.
TOKEN-BUS TRANSMISSION FRAME
ļ¶ Preamble
The preamble is responsible for providing the synchronization between the sending and receiving device. The
length of this field and its contents depend on the modulation method being used and the speed of the
network.
ļ¶ Start of Frame
The start delimiter follows the preamble. As its name implies, it indicates the start of the data frame. The start
frame delimiter is 1 byte in length and contains a signaling pattern that is always different from the dataā€”
the actual signaling pattern varies with the encoding scheme used[5].
ļ¶ Frame Control
This field identifies the type of frame being sentā€”Logical Link Control data frames, token control frames,
Media Access Control management data frames, or special-purpose data frames.
ļ¶ Address Fields
Each of the address fieldsā€”the destination address and the source addressā€”can be either 2 bytes (16-bit
addresses) or 6 bytes (48-bit addresses) in length. If universal addressing is used, the addresses must be 6
bytes each. But if local addressing is used they may be either 2 or 6 bytes long. Both destination and source
addresses must be of the same length for all devices on a given network. The source address must be for an
individual device. The destination address can be an individual address, a group address or a broadcast
address[5].
ļ¶Information Field
The information field contains the actual data packet to be transmitted. Its length is variable. It
may contain a Logical Link protocol data unit, token control data, management data or special-
purpose dataā€”as indicated in the frame control field.
ļ¶Frame Checksum
The frame check field is used as an error control mechanism. When the transmitting device
assembles a frame, it performs a calculation on the bits in the frame. The algorithm used to
perform this calculation always results in a 4-byte value. The sending device stores this value
in the frame check sequence field. When the destination device receives the frame, it performs
the same calculation and compares the result to that in the frame check sequence field. If the
two values are the same, the transmission is assumed to be correct. If the two values are
different, the destination device can request a retransmission of the frame[5].
ļ¶ End of Frame
The end delimiter marks the end of the frame and shows the position of the frame check
sequence field. Just as with the start delimiter, the signaling value is always different from the
data.
TOKEN RING (IEEE 802.5)
ā€¢ IEEE 802.5 is the second of the token passing access control methods. Token-ring is
most commonly used in a network structure following both a logical and physical ring
topology. The right to transmit is controlled by a token[3].
ā€¢ It uses point-to-point connections and hence the engineering is easy.
ā€¢ Any transmission media can be used.
ā€¢ The use of wire centers make the token ring the only LAN that can detect and eliminate
cable failures automatically.
ā€¢ Like 802.4, priorities also possible, although the scheme is not as fair.
ā€¢ Very short and very large frames both are possible.
ā€¢ At very high load, the throughput and efficiency are excellent.
TOKEN-RING TRANSMISSION FRAME
ļ¶ Start of frame
The starting delimiter indicates the start of the data frame. It uses a unique signal pattern that does not
correspond to either a 0 or 1 bit. These are known as nondata values and ensure that no data sequence
will ever be mistaken for a delimiter.
ļ¶ Access Control Field
This field identifies whether the frame is a data frame or a token. It contains a bit used to identify a
constantly busy token, a priority bit and reservations bits.
ļ¶ Frame Control Field
This field identifies the frame type and for certain types of control frames, the function it is to perform.
ļ¶ Address Fields
Each of the address fieldsā€”the destination address and the source addressā€”can be either 2 bytes (16-bit
addresses) or 6 bytes (48-bit addresses) in length. If universal addressing is used, the addresses must be 6
bytes each. But if local addressing is used they may be either 2 or 6 bytes long. Both destination and
source addresses must be of the same length for all devices on a given network.
The source address must be for an individual device. The destination address can be an individual address,
a group address or a broadcast address.
ļ¶ Information Field
The information field contains the actual data packet to be transmitted. This can be either a protocol data unit being
passed from the logical link control sublayer or control information supplied by the media access control sublayer. Its
length is variable anywhere from 0 to 17800 bytes in length.
ļ¶ Frame Check Sequence
The frame check field is used as an error control mechanism. When the transmitting device assembles a frame, it
performs a calculation on the bits in the frame. The algorithm used to perform this calculation always results in a 4 byte
value. The sending device stores this value in the frame check sequence field. When the destination device receives the
frame, it performs the same calculation and compares the result to that in the frame check sequence field. If the two
values are the same, the transmission is assumed to be correct. If the two values are different, the destination station can
request a retransmission of the frame.
ļ¶ Ending Delimiter
This identifies the end of the frame by containing nondata values. It also contains bits used to identify whether or not it is
the last frame in a multiframe transmission and if an error has been detected by any station.
ļ¶ Frame Status Field
The frame status field contains the address recognized and frame copied control bits.
REFERENCE
[1]. http://www.erg.abdn.ac.uk/users/gorry/course/lan-pages/csma-cd.html
[2]. http://www.erg.abdn.ac.uk/users/gorry/course/lan-pages/enet.html
[3]. G. Watson, A. Albrecht, J. Curcio, D. Dove, S. Goody, J. Grinham, M.P. Spratt, and P.A. Thaler.
The demand priority MAC protocol. IEEE Network, 9(1):28ā€“34, Jan./Feb. 1995.
[4]. R. Yavatkar, P. Pai, and R. Finkel. A reservation-based CSMA protocol for inte-grated manufacturing
networks. IEEE Transactions on Systems, Man, and Cybernet-ics, 24(8):1247ā€“1258, Aug. 1994.
[5]. Q. Zheng and K.G. Shin. On the ability of establishing real-time channels in point-to-point
packet-switched networks. IEEE Transactions on Communications, 42(2/3/4):1096ā€“1105,
Feb./Mar./Apr. 1994.
THANK YOU

More Related Content

What's hot

IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
Ā 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Kaushik Panta
Ā 
Data link layer
Data link layer Data link layer
Data link layer Mukesh Chinta
Ā 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocolMuuluu
Ā 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentationViet Nguyen
Ā 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11Shreejan Acharya
Ā 
Ethernet
EthernetEthernet
EthernetJaya Yadav
Ā 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)NetProtocol Xpert
Ā 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureManoj Kumar
Ā 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)k33a
Ā 
Network Switching | Computer Science
Network Switching | Computer ScienceNetwork Switching | Computer Science
Network Switching | Computer ScienceTransweb Global Inc
Ā 
Osi reference model
Osi reference modelOsi reference model
Osi reference modelSagar Gor
Ā 
Ethernet frame format
Ethernet frame formatEthernet frame format
Ethernet frame formatmyrajendra
Ā 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptxAcad
Ā 

What's hot (20)

IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Ā 
Ethernet technology
Ethernet technologyEthernet technology
Ethernet technology
Ā 
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Circuit Switching, Packet Switching, Virtual Circuit Networks and Datagram Ne...
Ā 
TCP /IP
TCP /IPTCP /IP
TCP /IP
Ā 
csma ca
 csma ca csma ca
csma ca
Ā 
Ch5
Ch5Ch5
Ch5
Ā 
Data link layer
Data link layer Data link layer
Data link layer
Ā 
Ethernet
EthernetEthernet
Ethernet
Ā 
Spanning tree protocol
Spanning tree protocolSpanning tree protocol
Spanning tree protocol
Ā 
Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
Ā 
Ethernet
EthernetEthernet
Ethernet
Ā 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
Ā 
Ethernet
EthernetEthernet
Ethernet
Ā 
Address resolution protocol (ARP)
Address resolution protocol (ARP)Address resolution protocol (ARP)
Address resolution protocol (ARP)
Ā 
TCP/IP Protocol Architeture
TCP/IP Protocol ArchitetureTCP/IP Protocol Architeture
TCP/IP Protocol Architeture
Ā 
Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)Transmission Control Protocol (TCP)
Transmission Control Protocol (TCP)
Ā 
Network Switching | Computer Science
Network Switching | Computer ScienceNetwork Switching | Computer Science
Network Switching | Computer Science
Ā 
Osi reference model
Osi reference modelOsi reference model
Osi reference model
Ā 
Ethernet frame format
Ethernet frame formatEthernet frame format
Ethernet frame format
Ā 
Network Layer design Issues.pptx
Network Layer design Issues.pptxNetwork Layer design Issues.pptx
Network Layer design Issues.pptx
Ā 

Viewers also liked

Ieee standards
Ieee standardsIeee standards
Ieee standardsNitesh Singh
Ā 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5Vicky Kumar
Ā 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Securitydkp205
Ā 
token bus
 token bus token bus
token busiamvisakh
Ā 
Token bus standard
Token bus standardToken bus standard
Token bus standardDhaval Kaneria
Ā 
Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5Adil Mehmoood
Ā 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lanParthipan Parthi
Ā 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5Pnkj_Sharma
Ā 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methodsbwire sedrick
Ā 
Media Access Methods
Media Access MethodsMedia Access Methods
Media Access Methodsnizam143
Ā 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)Hinal Lunagariya
Ā 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer ProtocolRajan Pandey
Ā 

Viewers also liked (20)

WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
Ā 
Ieee standards
Ieee standardsIeee standards
Ieee standards
Ā 
IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5IEEE STANDARDS 802.3,802.4,802.5
IEEE STANDARDS 802.3,802.4,802.5
Ā 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
Ā 
091005 Internet Security
091005 Internet Security091005 Internet Security
091005 Internet Security
Ā 
IEEE 802
IEEE 802IEEE 802
IEEE 802
Ā 
token bus
 token bus token bus
token bus
Ā 
Token bus standard
Token bus standardToken bus standard
Token bus standard
Ā 
Token ring
Token ringToken ring
Token ring
Ā 
Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
Ā 
Ieee 802.11 wireless lan
Ieee 802.11 wireless lanIeee 802.11 wireless lan
Ieee 802.11 wireless lan
Ā 
Token bus
Token busToken bus
Token bus
Ā 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
Ā 
Lan access control methods
Lan access control methodsLan access control methods
Lan access control methods
Ā 
Media Access Methods
Media Access MethodsMedia Access Methods
Media Access Methods
Ā 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
Ā 
IEEE
IEEEIEEE
IEEE
Ā 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
Ā 
IEEE 802 standards
IEEE 802 standardsIEEE 802 standards
IEEE 802 standards
Ā 
Simple Mail Transfer Protocol
Simple Mail Transfer ProtocolSimple Mail Transfer Protocol
Simple Mail Transfer Protocol
Ā 

Similar to IEEE STANDARDS 802.3,802.4,802.5

Similar to IEEE STANDARDS 802.3,802.4,802.5 (20)

Ethernet
EthernetEthernet
Ethernet
Ā 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
Ā 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
Ā 
III_UNIT.ppt
III_UNIT.pptIII_UNIT.ppt
III_UNIT.ppt
Ā 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
Ā 
group11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressinggroup11_DNAA:protocol stack and addressing
group11_DNAA:protocol stack and addressing
Ā 
Ethernet Frames Explained
Ethernet Frames ExplainedEthernet Frames Explained
Ethernet Frames Explained
Ā 
DISTIBUTED OPERATING SYSTEM
DISTIBUTED  OPERATING SYSTEM DISTIBUTED  OPERATING SYSTEM
DISTIBUTED OPERATING SYSTEM
Ā 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Ā 
unit2-210710110327.pdf
unit2-210710110327.pdfunit2-210710110327.pdf
unit2-210710110327.pdf
Ā 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
Ā 
Mac protocols
Mac protocolsMac protocols
Mac protocols
Ā 
Frame relay
Frame relayFrame relay
Frame relay
Ā 
DLL Protocol.pptx
DLL Protocol.pptxDLL Protocol.pptx
DLL Protocol.pptx
Ā 
Can basics
Can basicsCan basics
Can basics
Ā 
Unit 4 ppt-idc
Unit 4 ppt-idcUnit 4 ppt-idc
Unit 4 ppt-idc
Ā 
Data link layer
Data link layerData link layer
Data link layer
Ā 
Unit 2 ppt 3.ppt
Unit 2 ppt 3.pptUnit 2 ppt 3.ppt
Unit 2 ppt 3.ppt
Ā 
Frame relay
Frame relayFrame relay
Frame relay
Ā 
Ax31338342
Ax31338342Ax31338342
Ax31338342
Ā 

Recently uploaded

Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixingviprabot1
Ā 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
Ā 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
Ā 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEroselinkalist12
Ā 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture designssuser87fa0c1
Ā 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
Ā 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
Ā 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
Ā 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .Satyam Kumar
Ā 
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...9953056974 Low Rate Call Girls In Saket, Delhi NCR
Ā 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
Ā 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
Ā 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
Ā 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
Ā 
Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)
Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)
Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)dollysharma2066
Ā 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
Ā 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage examplePragyanshuParadkar1
Ā 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
Ā 

Recently uploaded (20)

Effects of rheological properties on mixing
Effects of rheological properties on mixingEffects of rheological properties on mixing
Effects of rheological properties on mixing
Ā 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
Ā 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Ā 
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETEINFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
INFLUENCE OF NANOSILICA ON THE PROPERTIES OF CONCRETE
Ā 
pipeline in computer architecture design
pipeline in computer architecture  designpipeline in computer architecture  design
pipeline in computer architecture design
Ā 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
Ā 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
Ā 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
Ā 
young call girls in Green ParkšŸ” 9953056974 šŸ” escort Service
young call girls in Green ParkšŸ” 9953056974 šŸ” escort Serviceyoung call girls in Green ParkšŸ” 9953056974 šŸ” escort Service
young call girls in Green ParkšŸ” 9953056974 šŸ” escort Service
Ā 
Churning of Butter, Factors affecting .
Churning of Butter, Factors affecting  .Churning of Butter, Factors affecting  .
Churning of Butter, Factors affecting .
Ā 
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
šŸ”9953056974šŸ”!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
Ā 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
Ā 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
Ā 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
Ā 
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Serviceyoung call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
young call girls in Rajiv ChowkšŸ” 9953056974 šŸ” Delhi escort Service
Ā 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
Ā 
Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)
Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)
Call Us ā‰½ 8377877756 ā‰¼ Call Girls In Shastri Nagar (Delhi)
Ā 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
Ā 
DATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage exampleDATA ANALYTICS PPT definition usage example
DATA ANALYTICS PPT definition usage example
Ā 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
Ā 

IEEE STANDARDS 802.3,802.4,802.5

  • 2. INTRODUCTION ļ¶IEEE 802 refers to a family of IEEE standards ļƒ˜Dealing with local area network and metropolitan area network. ļƒ˜Restricted to networks carrying variable-size packets. ļƒ˜Specified in IEEE 802 map to the lower two layers ļƒ¼ Data link layer ļƒ¼ Physical layer ļ¶The most widely used standards ļ¶.802.3 - Ethernet ļ¶802.4 - Token Bus ļ¶802.5 - Token Ring
  • 3. 3 ETHERNET (IEEE 802.3 ) ļƒ˜The IEEE 802.3 standard specifies the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) media access control method. CSMA/CD is the most commonly employed access method for LANs using a bus or tree topology. It is the media access control method used by Ethernet[1]. ļƒ˜Most widely type used at present, with a huge installed base and considerable operational experience. ļƒ˜Protocol is very simple ļƒ˜Stations can be added without making the network down. ļƒ˜The delay at low load is practically zero. (no token waiting)
  • 4. ETHERNET CABLING The most common kinds of Ethernet cabling.
  • 5. ETHERNET SIGNALLING (a) Binary encoding, (b) Manchester encoding, (c) Differential Manchester encoding.
  • 7. ļ¶ Preamble The preamble is responsible for providing the synchronization between the sending and receiving device.It is a series of 56 bits (7 bytes) of alternating 1s and 0s found at the beginning of the frame[2] ļ¶ Start of Frame Delimiter The start frame delimiter follows the preamble. As its name implies, it indicates the start of the data frame. The start frame delimiter is 1 byte in lengthā€”made up of the following 8-bit sequenceā€”10101011[3]. ļ¶ Address Fields Each of the address fieldsā€”the destination address and the source addressā€”can be either 2 bytes or 6 bytes in length. If universal addressing is used, the addresses must be 6 bytes each. But if local addressing is used they may be either 2 or 6 bytes long. Both destination and source addresses must be of the same length for all devices on a given network[2]. ļ¶ Length Count This is a 2-byte field indicating the length of the data field that follows. It is needed to determine the length of the data field in those cases when a pad field is used[2].
  • 8. ļ¶Information Field The information field contains the actual data packet to be transmitted. Its length is variable[2]. ļ¶ Pad Field A pad field is used to ensure that the frame meets a minimum length requirement. A frame must contain a minimum number of bytes in order for stations to detect collisions accurately[2]. ļ¶Frame Check Sequence The frame check field is used as an error-control mechanism. When the transmitting device assembles a frame, it performs a calculation on the bits in the frame. The algorithm used to perform this calculation always results in a 4- byte value. The sending device stores this value in the frame check sequence field[2].
  • 9. TOKEN BUS (IEEE 802.4) ā€¢ The IEEE 802.4 standard specifies the Token-bus media access control method. It is one of two token passing access methods. IEEE 802.4 is based on a physical bus or tree topology. The Token-bus approach requires a station to have possession of a token in order to transmit. The token is passed from station to station in a logical ring[3]. ā€¢ Uses highly reliable cable television equipments. ā€¢ It is more deterministic than 802.3, although repeated loss of token at critical times can introduce the uncertainness. ā€¢ Can easily handle shorter frames. (no limitation on frame size) ā€¢ It supports priorities and hence suitable for Real Time traffic. ā€¢ It also has excellent throughput and efficiency at high load.
  • 11. ļ¶ Preamble The preamble is responsible for providing the synchronization between the sending and receiving device. The length of this field and its contents depend on the modulation method being used and the speed of the network. ļ¶ Start of Frame The start delimiter follows the preamble. As its name implies, it indicates the start of the data frame. The start frame delimiter is 1 byte in length and contains a signaling pattern that is always different from the dataā€” the actual signaling pattern varies with the encoding scheme used[5]. ļ¶ Frame Control This field identifies the type of frame being sentā€”Logical Link Control data frames, token control frames, Media Access Control management data frames, or special-purpose data frames. ļ¶ Address Fields Each of the address fieldsā€”the destination address and the source addressā€”can be either 2 bytes (16-bit addresses) or 6 bytes (48-bit addresses) in length. If universal addressing is used, the addresses must be 6 bytes each. But if local addressing is used they may be either 2 or 6 bytes long. Both destination and source addresses must be of the same length for all devices on a given network. The source address must be for an individual device. The destination address can be an individual address, a group address or a broadcast address[5].
  • 12. ļ¶Information Field The information field contains the actual data packet to be transmitted. Its length is variable. It may contain a Logical Link protocol data unit, token control data, management data or special- purpose dataā€”as indicated in the frame control field. ļ¶Frame Checksum The frame check field is used as an error control mechanism. When the transmitting device assembles a frame, it performs a calculation on the bits in the frame. The algorithm used to perform this calculation always results in a 4-byte value. The sending device stores this value in the frame check sequence field. When the destination device receives the frame, it performs the same calculation and compares the result to that in the frame check sequence field. If the two values are the same, the transmission is assumed to be correct. If the two values are different, the destination device can request a retransmission of the frame[5]. ļ¶ End of Frame The end delimiter marks the end of the frame and shows the position of the frame check sequence field. Just as with the start delimiter, the signaling value is always different from the data.
  • 13. TOKEN RING (IEEE 802.5) ā€¢ IEEE 802.5 is the second of the token passing access control methods. Token-ring is most commonly used in a network structure following both a logical and physical ring topology. The right to transmit is controlled by a token[3]. ā€¢ It uses point-to-point connections and hence the engineering is easy. ā€¢ Any transmission media can be used. ā€¢ The use of wire centers make the token ring the only LAN that can detect and eliminate cable failures automatically. ā€¢ Like 802.4, priorities also possible, although the scheme is not as fair. ā€¢ Very short and very large frames both are possible. ā€¢ At very high load, the throughput and efficiency are excellent.
  • 15. ļ¶ Start of frame The starting delimiter indicates the start of the data frame. It uses a unique signal pattern that does not correspond to either a 0 or 1 bit. These are known as nondata values and ensure that no data sequence will ever be mistaken for a delimiter. ļ¶ Access Control Field This field identifies whether the frame is a data frame or a token. It contains a bit used to identify a constantly busy token, a priority bit and reservations bits. ļ¶ Frame Control Field This field identifies the frame type and for certain types of control frames, the function it is to perform. ļ¶ Address Fields Each of the address fieldsā€”the destination address and the source addressā€”can be either 2 bytes (16-bit addresses) or 6 bytes (48-bit addresses) in length. If universal addressing is used, the addresses must be 6 bytes each. But if local addressing is used they may be either 2 or 6 bytes long. Both destination and source addresses must be of the same length for all devices on a given network. The source address must be for an individual device. The destination address can be an individual address, a group address or a broadcast address.
  • 16. ļ¶ Information Field The information field contains the actual data packet to be transmitted. This can be either a protocol data unit being passed from the logical link control sublayer or control information supplied by the media access control sublayer. Its length is variable anywhere from 0 to 17800 bytes in length. ļ¶ Frame Check Sequence The frame check field is used as an error control mechanism. When the transmitting device assembles a frame, it performs a calculation on the bits in the frame. The algorithm used to perform this calculation always results in a 4 byte value. The sending device stores this value in the frame check sequence field. When the destination device receives the frame, it performs the same calculation and compares the result to that in the frame check sequence field. If the two values are the same, the transmission is assumed to be correct. If the two values are different, the destination station can request a retransmission of the frame. ļ¶ Ending Delimiter This identifies the end of the frame by containing nondata values. It also contains bits used to identify whether or not it is the last frame in a multiframe transmission and if an error has been detected by any station. ļ¶ Frame Status Field The frame status field contains the address recognized and frame copied control bits.
  • 17. REFERENCE [1]. http://www.erg.abdn.ac.uk/users/gorry/course/lan-pages/csma-cd.html [2]. http://www.erg.abdn.ac.uk/users/gorry/course/lan-pages/enet.html [3]. G. Watson, A. Albrecht, J. Curcio, D. Dove, S. Goody, J. Grinham, M.P. Spratt, and P.A. Thaler. The demand priority MAC protocol. IEEE Network, 9(1):28ā€“34, Jan./Feb. 1995. [4]. R. Yavatkar, P. Pai, and R. Finkel. A reservation-based CSMA protocol for inte-grated manufacturing networks. IEEE Transactions on Systems, Man, and Cybernet-ics, 24(8):1247ā€“1258, Aug. 1994. [5]. Q. Zheng and K.G. Shin. On the ability of establishing real-time channels in point-to-point packet-switched networks. IEEE Transactions on Communications, 42(2/3/4):1096ā€“1105, Feb./Mar./Apr. 1994.