SlideShare a Scribd company logo
IEEE 802 Standards for
LAN & MAN




    Network Security
IEEE 802 Standards

 Define physical network interfaces such
  as NICs, bridges, routers, connectors,
  cables etc.
 Describe the three lowest layers of
  network architecture: physical layer,
  MAC sublayer & Data link layer.




              Network Security
Famous IEEE Standards

 802.2 : LLC
 802.3 : Ethernet
 802.4 : Token Bus
 802.5 : Token Ring
 802.6 : DQDB (MAN standard)
 802.11 : Wireless LAN (CSMA)
 802.14 : Cable Modem


                Network Security
802.3 - Ethernet
 Modes of operation: half-duplex and full-duplex
 Four data rates defined for operation over optical fiber and
   twisted-pair cables:
       10 Mbps - 10Base-T Ethernet (IEEE 802.3)
       100 Mbps - Fast Ethernet (IEEE 802.3u)
       1000 Mbps - Gigabit Ethernet (IEEE 802.3z)
    
        10-Gigabit - 10 Gbps Ethernet (IEEE 802.3ae).
 Three basic elements:
       physical medium
       a set of medium access control rules, and
       an Ethernet frame that consists of a standardized set of bits used to
        carry data over the system.




                        Network Security
Ethernet Frame

•Preamble (PRE)- 7 bytes. To synchronize the frame-reception portions of receiving
physical layers with the incoming bit stream.

•Start-of-frame delimiter (SFD)- 1 byte.

•Destination address (DA)- 6 bytes

•Source addresses (SA)- 6 bytes

•Length/Type- 2 bytes. This field indicates the number of data bytes that are contained in
the data field of the frame.

•Data- Is a sequence of n bytes (46=< n =<1500) of any value. (The total frame minimum is
64 bytes.)

•Frame check sequence (FCS)- 4 bytes. Contains a 32-bit cyclic redundancy check
(CRC) value to check for damaged frames.


                               Network Security
Ethernet Specifications

 10Base2 : thin wire coax cable
 10Base5 : thick wire coax cable
 10BaseF : Optical fiber cable
 10BaseT : Twisted pair cable




              Network Security
802.4 –
Token Bus


 It a network implementing the token ring protocol over a "virtual
  ring" on a coaxial cable.
 A token is passed around the network nodes and only the node
  possessing the token may transmit. If a node doesn't have
  anything to send, the token is passed on to the next node on the
  virtual ring.
 Token Bus suffered from two limitations:
       Any failure in the bus caused all the devices beyond the failure to
        be unable to communicate with the rest of the network.
       Adding more stations to the bus was somewhat difficult.

                         Network Security
Token Bus Frame


Frame Control (FC):

This field is used to distinguish data frames from control
frames.

For data frames, it carries the frame's priority indicator
requiring destination to acknowledge the frame receipt.

For control frames, it is used to specify the frame type. The
allowed types include token passing, entrance of any new
station and various ring maintenance functions.

                       Network Security
802.5 –
Token Ring



 The principle used in the token ring network is that a
  token is circulating in the ring and whichever node grabs
  that token will have right to transmit the data
 Each link is terminated with an active repeater that
  detects a data packet on the in-bound link and re-
  transmits it on the outbound link.
 At the end of the packet transmission, the data
  equipment unit issues another idle token.
                    Network Security
Token Ring Frame




Token consists of –
    Start delimiter - which alerts the stations of a token arrival.

    Access control byte - which contains the priority and reservation
    fields, a token bit to differentiate token from data/command frame and
    a monitor bit checking whether a frame is circling the ring endlessly.

    End delimiter - which signals the end of a frame, end of a logical
    sequence and damaged frames.

                      Network Security
Things to do

 LAN transmission modes
 LLC, Hiper LAN
 Ethernet cables & connectors
 CSMA/CD, Frame Relay & X.25 protocol
 Comparison of various IEEE Standards
 Merits & demerits of IEEE Standards




               Network Security

More Related Content

What's hot

Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)rajivagarwal23dei
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
deawoo Kim
 
Signalling Techniques & Basics of CCS
Signalling Techniques & Basics of CCSSignalling Techniques & Basics of CCS
Signalling Techniques & Basics of CCS
Gec bharuch
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
Menaga Selvaraj
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Embedded systems and their applications in our daily routine
Embedded systems and their applications in our daily routineEmbedded systems and their applications in our daily routine
Embedded systems and their applications in our daily routine
Asad Qayyum Babar
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocolsbarodia_1437
 
Cellular network
Cellular networkCellular network
Cellular networkshreb
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
Swathi Ch
 
Types of line coding
Types of line codingTypes of line coding
Types of line coding
ramalakshmi54
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
Sayed Chhattan Shah
 
Stick Diagram
Stick DiagramStick Diagram
Stick Diagram
Kalyan Acharjya
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
Darwin Nesakumar
 
CAN Bus
CAN BusCAN Bus
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
METHODIST COLLEGE OF ENGG & TECH
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
Shreejan Acharya
 
Arduino and its hw architecture
Arduino and its hw architectureArduino and its hw architecture
Arduino and its hw architecture
Zeeshan Rafiq
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSNYara Ali
 

What's hot (20)

Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)Sensor Protocols for Information via Negotiation (SPIN)
Sensor Protocols for Information via Negotiation (SPIN)
 
Wireless sensor network
Wireless sensor networkWireless sensor network
Wireless sensor network
 
Signalling Techniques & Basics of CCS
Signalling Techniques & Basics of CCSSignalling Techniques & Basics of CCS
Signalling Techniques & Basics of CCS
 
Classification of routing protocols
Classification of routing protocolsClassification of routing protocols
Classification of routing protocols
 
Multiple Access Techniques
Multiple Access TechniquesMultiple Access Techniques
Multiple Access Techniques
 
Embedded systems and their applications in our daily routine
Embedded systems and their applications in our daily routineEmbedded systems and their applications in our daily routine
Embedded systems and their applications in our daily routine
 
Wireless routing protocols
Wireless routing protocolsWireless routing protocols
Wireless routing protocols
 
Cellular network
Cellular networkCellular network
Cellular network
 
Wsn unit-1-ppt
Wsn unit-1-pptWsn unit-1-ppt
Wsn unit-1-ppt
 
Types of line coding
Types of line codingTypes of line coding
Types of line coding
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Stick Diagram
Stick DiagramStick Diagram
Stick Diagram
 
Leach protocol
Leach protocolLeach protocol
Leach protocol
 
Contention based MAC protocols
Contention based  MAC protocolsContention based  MAC protocols
Contention based MAC protocols
 
CAN Bus
CAN BusCAN Bus
CAN Bus
 
Gsm architecture
Gsm architectureGsm architecture
Gsm architecture
 
Multiple access techniques for wireless communications
Multiple access techniques for wireless communicationsMultiple access techniques for wireless communications
Multiple access techniques for wireless communications
 
wireless network IEEE 802.11
 wireless network IEEE 802.11 wireless network IEEE 802.11
wireless network IEEE 802.11
 
Arduino and its hw architecture
Arduino and its hw architectureArduino and its hw architecture
Arduino and its hw architecture
 
Localization in WSN
Localization in WSNLocalization in WSN
Localization in WSN
 

Viewers also liked

Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
Cisco Canada
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
Online
 
Software-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief IntroductionSoftware-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief Introduction
Jason TC HOU (侯宗成)
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
rjain51
 
Wireless communication
Wireless communicationWireless communication
Wireless communicationDarshan Maru
 

Viewers also liked (6)

Software Defined Networks
Software Defined NetworksSoftware Defined Networks
Software Defined Networks
 
Wireless networking
Wireless networkingWireless networking
Wireless networking
 
Software-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief IntroductionSoftware-Defined Networking SDN - A Brief Introduction
Software-Defined Networking SDN - A Brief Introduction
 
Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)Introduction to Software Defined Networking (SDN)
Introduction to Software Defined Networking (SDN)
 
Sdn ppt
Sdn pptSdn ppt
Sdn ppt
 
Wireless communication
Wireless communicationWireless communication
Wireless communication
 

Similar to Mac protocols

Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
Chandan Gupta Bhagat
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
shanthishyam
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
pkaviya
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communicationskuramartin
 
UNIT-2 PPT Data link layer.pptx
UNIT-2 PPT Data link layer.pptxUNIT-2 PPT Data link layer.pptx
UNIT-2 PPT Data link layer.pptx
diptijilhare
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01
techbed
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
ShantanuDharekar
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
ShantanuDharekar
 
III_UNIT.ppt
III_UNIT.pptIII_UNIT.ppt
III_UNIT.ppt
ShantanuDharekar
 
The Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet CommunicationsThe Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet Communications
Westermo Network Technologies
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo Network Technologies
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networking
sdb2002
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realy
Deepak John
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
Deepak John
 

Similar to Mac protocols (20)

Ethernet
EthernetEthernet
Ethernet
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
Ethernet Frames Explained
Ethernet Frames ExplainedEthernet Frames Explained
Ethernet Frames Explained
 
Networking and Data Communications
Networking and Data CommunicationsNetworking and Data Communications
Networking and Data Communications
 
UNIT-2 PPT Data link layer.pptx
UNIT-2 PPT Data link layer.pptxUNIT-2 PPT Data link layer.pptx
UNIT-2 PPT Data link layer.pptx
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01813 Ieeestds 090330072026 Phpapp01
813 Ieeestds 090330072026 Phpapp01
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
 
III_UNIT.pptx
III_UNIT.pptxIII_UNIT.pptx
III_UNIT.pptx
 
III_UNIT.ppt
III_UNIT.pptIII_UNIT.ppt
III_UNIT.ppt
 
The Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet CommunicationsThe Basics of Industrial Ethernet Communications
The Basics of Industrial Ethernet Communications
 
Westermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet NetworkingWestermo webinar: Learning the Basics of Ethernet Networking
Westermo webinar: Learning the Basics of Ethernet Networking
 
Fddi
FddiFddi
Fddi
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networking
 
Computer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realyComputer networks high speed swan,atm,frame realy
Computer networks high speed swan,atm,frame realy
 
Lan architecture
Lan architectureLan architecture
Lan architecture
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
 

Recently uploaded

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
DeeptiGupta154
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
goswamiyash170123
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
Kartik Tiwari
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
Balvir Singh
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
Wasim Ak
 

Recently uploaded (20)

How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Overview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with MechanismOverview on Edible Vaccine: Pros & Cons with Mechanism
Overview on Edible Vaccine: Pros & Cons with Mechanism
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdfMASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
MASS MEDIA STUDIES-835-CLASS XI Resource Material.pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Chapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdfChapter -12, Antibiotics (One Page Notes).pdf
Chapter -12, Antibiotics (One Page Notes).pdf
 
Operation Blue Star - Saka Neela Tara
Operation Blue Star   -  Saka Neela TaraOperation Blue Star   -  Saka Neela Tara
Operation Blue Star - Saka Neela Tara
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Normal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of LabourNormal Labour/ Stages of Labour/ Mechanism of Labour
Normal Labour/ Stages of Labour/ Mechanism of Labour
 

Mac protocols

  • 1. IEEE 802 Standards for LAN & MAN Network Security
  • 2. IEEE 802 Standards  Define physical network interfaces such as NICs, bridges, routers, connectors, cables etc.  Describe the three lowest layers of network architecture: physical layer, MAC sublayer & Data link layer. Network Security
  • 3. Famous IEEE Standards  802.2 : LLC  802.3 : Ethernet  802.4 : Token Bus  802.5 : Token Ring  802.6 : DQDB (MAN standard)  802.11 : Wireless LAN (CSMA)  802.14 : Cable Modem Network Security
  • 4. 802.3 - Ethernet  Modes of operation: half-duplex and full-duplex  Four data rates defined for operation over optical fiber and twisted-pair cables:  10 Mbps - 10Base-T Ethernet (IEEE 802.3)  100 Mbps - Fast Ethernet (IEEE 802.3u)  1000 Mbps - Gigabit Ethernet (IEEE 802.3z)  10-Gigabit - 10 Gbps Ethernet (IEEE 802.3ae).  Three basic elements:  physical medium  a set of medium access control rules, and  an Ethernet frame that consists of a standardized set of bits used to carry data over the system. Network Security
  • 5. Ethernet Frame •Preamble (PRE)- 7 bytes. To synchronize the frame-reception portions of receiving physical layers with the incoming bit stream. •Start-of-frame delimiter (SFD)- 1 byte. •Destination address (DA)- 6 bytes •Source addresses (SA)- 6 bytes •Length/Type- 2 bytes. This field indicates the number of data bytes that are contained in the data field of the frame. •Data- Is a sequence of n bytes (46=< n =<1500) of any value. (The total frame minimum is 64 bytes.) •Frame check sequence (FCS)- 4 bytes. Contains a 32-bit cyclic redundancy check (CRC) value to check for damaged frames. Network Security
  • 6. Ethernet Specifications  10Base2 : thin wire coax cable  10Base5 : thick wire coax cable  10BaseF : Optical fiber cable  10BaseT : Twisted pair cable Network Security
  • 7. 802.4 – Token Bus  It a network implementing the token ring protocol over a "virtual ring" on a coaxial cable.  A token is passed around the network nodes and only the node possessing the token may transmit. If a node doesn't have anything to send, the token is passed on to the next node on the virtual ring.  Token Bus suffered from two limitations:  Any failure in the bus caused all the devices beyond the failure to be unable to communicate with the rest of the network.  Adding more stations to the bus was somewhat difficult. Network Security
  • 8. Token Bus Frame Frame Control (FC): This field is used to distinguish data frames from control frames. For data frames, it carries the frame's priority indicator requiring destination to acknowledge the frame receipt. For control frames, it is used to specify the frame type. The allowed types include token passing, entrance of any new station and various ring maintenance functions. Network Security
  • 9. 802.5 – Token Ring  The principle used in the token ring network is that a token is circulating in the ring and whichever node grabs that token will have right to transmit the data  Each link is terminated with an active repeater that detects a data packet on the in-bound link and re- transmits it on the outbound link.  At the end of the packet transmission, the data equipment unit issues another idle token. Network Security
  • 10. Token Ring Frame Token consists of – Start delimiter - which alerts the stations of a token arrival. Access control byte - which contains the priority and reservation fields, a token bit to differentiate token from data/command frame and a monitor bit checking whether a frame is circling the ring endlessly. End delimiter - which signals the end of a frame, end of a logical sequence and damaged frames. Network Security
  • 11. Things to do  LAN transmission modes  LLC, Hiper LAN  Ethernet cables & connectors  CSMA/CD, Frame Relay & X.25 protocol  Comparison of various IEEE Standards  Merits & demerits of IEEE Standards Network Security