SlideShare ist ein Scribd-Unternehmen logo
1 von 24
LAN TECHNOLOGIES
S.T.D.Maduranga
• Ethernet
• FIBER DISTRIBUTED DATA INTERFACE (FDDI)
• Token Ring
Technology Options
Our Focus is Ethernet
• History
• Developed by Bob Metcalfe and others at Xerox PARC
in mid-1970s
• Roots in Aloha packet-radio network
• Standardized by Xerox, DEC, and Intel in 1978
• LAN standards define MAC and physical layer
connectivity
• IEEE 802.3 (CSMA/CD - Ethernet) standard – originally
2Mbps
• IEEE 802.3u standard for 100Mbps Ethernet
• IEEE 802.3z standard for 1,000Mbps Ethernet
Ethernet Standard Defines Physical Layer
Metcalfe’s original
Ethernet Sketch
802.3 standard defines both MAC and physical layer
details
Ethernet
• 10 Base 5 (Thicknet) (Bus
Topology)
• 10 Base 2 (Thinnet) (Bus
Topology)
• 10 Base T (UTP) (Star/Tree
Topology)
• 10 Base FL (Fiber) (Star/Tree
Topology)
Ethernet Technologies: 10Base2
10: 10Mbps; 2: under 185 (~200) meters cable length
Thin coaxial cable in a bus topology
Repeaters used to connect multiple segments
Repeater repeats bits it hears on one interface to its other interfaces: physical layer device only!
10BaseT and 100BaseT
• 10/100 Mbps rate
• T stands for Twisted Pair
• Hub(s) connected by twisted pair facilitate “star topology”
• Distance of any node to hub must be < 100M
Fast Ethernet
• 100 Mbps bandwidth
• Uses same CSMA/CD media access protocol and packet format as in Ethernet.
• 100BaseTX (UTP) and 100BaseFX (Fiber) standards
• Physical media :-
• 100 BaseTX - UTP Cat 5e
• 100 BaseFX - Multimode / Singlemode Fiber
• Full Duplex/Half Duplex operations.
• Provision for Auto-Negotiation of media speed:
10 Mbps or 100Mbps (popularly available for copper media only).
• Maximum Segment Length
• 100 Base TX - 100 m
• 100 Base FX - 2 Km (Multimode Fiber)
• 100 Base FX - 20 km (Singlemode Fiber)
Gigabit Ethernet
• 1 Gbps bandwidth.
• Uses same CSMA/CD media access protocol as in
Ethernet and is backward compatible (10/100/100
modules are available).
• 1000BaseT (UTP), 1000BaseSX (Multimode Fiber) and
1000BaseLX (Multimode/Singlemode Fiber) standards.
• Maximum Segment Length
• 1000 Base T - 100m (Cat 5e/6)
• 1000 Base SX - 275 m (Multimode Fiber)
• 1000 Base LX - 512 m (Multimode Fiber)
• 1000 Base LX - 20 Km (Singlemode Fiber)
• 1000 Base LH - 80 Km (Singlemode Fiber
10 Gig Ethernet
• 10 Gbps bandwidth.
• Uses same CSMA/CD media access protocol as in
Ethernet.
• Propositioned for Metro-Ethernet
• Maximum Segment Length
• 1000 Base-T - Not available
• 10GBase-LR - 10 Km (Singlemode Fiber)
• 10GBase-ER - 40 Km (Singlemode Fiber)
IEEE 802.5 and Token Ring
• Proposed in 1969 and initially referred to as a Newhall
ring.
• Token ring : a number of stations connected by
transmission links in a ring topology. Information
flows in one direction along the ring from source to
destination and back to source.
• Medium access control is provided by a small frame,
the token, that circulates around the ring when all
stations are idle. Only the station possessing the token
is allowed to transmit at any given time.
Token Ring Operation
• When a station wishes to transmit, it must wait for token to pass by
and seize the token.
• One approach: change one bit in token which transforms it into a
“start-of-frame sequence” and appends frame for transmission.
• Second approach: station claims token by removing it from the ring.
• Frame circles the ring and is removed by the transmitting station.
• Each station interrogates passing frame, if destined for station, it
copies the frame into local buffer. {Normally, there is a one bit
delay as the frame passes through a station.}
Token Ring Network
with star topology
IEEE 802.5 Token Ring
• 4 and 16 Mbps using twisted-pair cabling with differential
Manchester line encoding.
• Maximum number of stations is 250.
• Waits for last byte of frame to arrive before reinserting token on
ring {new token after received}.
• 8 priority levels provided via two 3-bit fields (priority and
reservation) in data and token frames.
• Permits 16-bit and 48-bit addresses (same as 802.3).
Token Ring
• Under light load – delay is added due to
waiting for the token.
• Under heavy load – ring is “round-robin”
• The ring must be long enough to hold the
complete token.
• Advantages – fair access
• Disadvantages – ring is single point of failure,
added issues due to token maintenance
Networks: Token Ring and FDDI
A
E
DC
B
FDDI Token Ring
FIBER DISTRIBUTED DATA
INTERFACE (FDDI)
• PROJECT INITIATED IN OCTOBER 1982 BY JAMES
HAMSTRA AT SPERRY (NOW UNISYS)
• TWO PROPOSALS FOR MEDIA ACCESS CONTROL
(MAC) & PHYSICAL (PHY) LAYERS SUBMITTED IN
JUNE 1983
• FDDI MAC BECAME AN ANSI STANDARD IN LATE
1986
• FDDI PHY WON ANSI STANDARDIZATION IN 1988
• FDDI - II PROPOSAL WAS MADE IN EARLY 1986
• FIRST PUBLIC DEMONSTRATIONS AT ADVANCED
MICRO DEVICES (AMD) IN 1989
FDDI BASIC PRINCIPLE
• TOKEN RING NETWORK LIKE IEEE 802.5
• TOKEN: A SPECIAL SEQUENCE OF BITS
• TOKEN CIRCULATES AROUND THE RING
• A STATION REMOVES THE TOKEN FROM RING BEFORE
TRANSMISSION
• AFTER TRANSMISSION, THE STATION RETURNS THE TOKEN TO
THE RING
• COLLISIONS ARE PREVENTED AS THERE IS ONLY ONE TOKEN IN
THE RING
FIBER DISTRIBUTED DATA INTERFACE
(FDDI)
FDDI ARCHITECTURAL MODEL
• ACCORDING TO THE OSI-RM, FDDI SPECIFIES LAYER 1
(PHYSICAL LAYER) AND PART OF LAYER 2 (DATA LINK
CONTROL LAYER)
• THE PHYSICAL LAYER HANDLES THE TRANSMISSION
OF RAW BITS OVER A COMMUNICATIONS LINK
• THE DATA LINK CONTROL (DLC) LAYER IS
RESPONSIBLE FOR MAINTAINING THE INTEGRITY OF
INFORMATION EXCHANGED BETWEEN TWO POINTS
FDDI - II
• SAME FEATURES AS BASIC FDDI (FDDI - I), INCLUDING MAXIMUM
NUMBER OF MODES, 100 MBPS DATA TRANSFER BIT RATE, AND THE
DUAL RING
• DEFINES THE PHYSICAL LAYER AND THE LOWER HALF OF THE DATA LINK
LAYER SIMILAR TO FDDI-I
• FDDI-I SUPPORTS ONLY PACKET MODE (SYNCHRONOUS AND
ASYNCHRONOUS) TRAFFIC, FDDI-II SUPPORTS BOTH PACKET DATA AS
WELL AS ISOCHRONOUS DATA TRAFFIC (IN FDDI ISOCHRONOUS
INDICATES A CLASS OF TRAFFIC FOR VOICE AND VIDEO
• THE SIMULTANEOUS SUPPORT OF BOTH PACKET AND ISOCHRONOUS
TRAFFIC IS CALLED THE HYBRID MODE OF OPERATION
A FDDI BACKBONE NETWORK
EXAMPLE
FEATURES FDDI ETHERNET TOKEN RING
TRANSMISSION
RATE
125 MBAUD 20 MBAUD 8 & 32 MBAUD
DATA RATE 100 MBPS 10 MBPS 4 & 16 MBPS
SIGNAL
ENCODING
4B/5B (80%
EFFICIENT)
MANCHESTER
(50%
EFFICIENT)
DIFFERENTIAL
MANCHESTER
(50% EFFICIENT)
MAXIMUM
COVERAGE
100 KM 2.5 KM CONFIGURATION
DEPENDENT
MAXIMUM
NODES
500 1024 250
MAXIMUM
DISTANCE
BETWEEN
NODES
2 KM (MULTIMODE
FIBER)
40 KM (SINGLE-
MODE FIBER)
2.5 KM 300 M
(RECOMMENDED
100 M)
COMPARISON WITH OTHER NETWORKS
………. THANK YOU ……….

Weitere ähnliche Inhalte

Was ist angesagt?

Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Alan Mark
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPMukesh Chinta
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesSayed Chhattan Shah
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission MediaSyed Ahmed Zaki
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer ProtocolsMeenakshi Paul
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network pptextraganesh
 
basic networking
basic networkingbasic networking
basic networkingAnmol Bagga
 

Was ist angesagt? (20)

Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)Cisco Networking (Routing and Switching)
Cisco Networking (Routing and Switching)
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Token ring
Token ringToken ring
Token ring
 
IEEE 802.11 and Bluetooth
IEEE 802.11 and BluetoothIEEE 802.11 and Bluetooth
IEEE 802.11 and Bluetooth
 
Reference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IPReference models in Networks: OSI & TCP/IP
Reference models in Networks: OSI & TCP/IP
 
Ppt of routing protocols
Ppt of routing protocolsPpt of routing protocols
Ppt of routing protocols
 
IEEE 802 standards
IEEE 802 standardsIEEE 802 standards
IEEE 802 standards
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
OSI Model
OSI ModelOSI Model
OSI Model
 
Presentation on arp protocol
Presentation on arp protocolPresentation on arp protocol
Presentation on arp protocol
 
IEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and ServicesIEEE 802.11 Architecture and Services
IEEE 802.11 Architecture and Services
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
 
Ethernet
EthernetEthernet
Ethernet
 
IPv4 Addressing
 IPv4 Addressing   IPv4 Addressing
IPv4 Addressing
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
TCP/IP Network ppt
TCP/IP Network pptTCP/IP Network ppt
TCP/IP Network ppt
 
Routing protocols
Routing protocolsRouting protocols
Routing protocols
 
Frame relay
Frame relayFrame relay
Frame relay
 
basic networking
basic networkingbasic networking
basic networking
 

Andere mochten auch

LAN TECHNOLOGIES
LAN TECHNOLOGIESLAN TECHNOLOGIES
LAN TECHNOLOGIESWILLA REYES
 
Tutorial transmission line details
Tutorial transmission line detailsTutorial transmission line details
Tutorial transmission line detailsDillian Jhair Staine
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamentalashrawi92
 
Chapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyChapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyAman Jaiswal
 
DITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingDITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingRasan Samarasinghe
 
Data Mining: Outlier analysis
Data Mining: Outlier analysisData Mining: Outlier analysis
Data Mining: Outlier analysisDatamining Tools
 
3.7 outlier analysis
3.7 outlier analysis3.7 outlier analysis
3.7 outlier analysisKrish_ver2
 
Sistemas de Telecomunicações - Aula 14 - Redes ATM, Ethernet, Token Ring e Re...
Sistemas de Telecomunicações - Aula 14 - Redes ATM, Ethernet, Token Ring e Re...Sistemas de Telecomunicações - Aula 14 - Redes ATM, Ethernet, Token Ring e Re...
Sistemas de Telecomunicações - Aula 14 - Redes ATM, Ethernet, Token Ring e Re...Leinylson Fontinele
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ringAbhijeet Shah
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5Pnkj_Sharma
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Controltameemyousaf
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets myrajendra
 

Andere mochten auch (20)

LAN TECHNOLOGIES
LAN TECHNOLOGIESLAN TECHNOLOGIES
LAN TECHNOLOGIES
 
Tutorial transmission line details
Tutorial transmission line detailsTutorial transmission line details
Tutorial transmission line details
 
Network fundamental
Network fundamentalNetwork fundamental
Network fundamental
 
Csc339 – lecture 2 network fundamental
Csc339 – lecture 2 network fundamentalCsc339 – lecture 2 network fundamental
Csc339 – lecture 2 network fundamental
 
Chapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topologyChapter 8 lan_technologies_and_network_topology
Chapter 8 lan_technologies_and_network_topology
 
01. network topologies & cable
01. network topologies & cable01. network topologies & cable
01. network topologies & cable
 
04 Client Server Computing
04 Client Server Computing04 Client Server Computing
04 Client Server Computing
 
DITEC - Fundamentals in Networking
DITEC - Fundamentals in NetworkingDITEC - Fundamentals in Networking
DITEC - Fundamentals in Networking
 
Data Mining: Outlier analysis
Data Mining: Outlier analysisData Mining: Outlier analysis
Data Mining: Outlier analysis
 
Intro to Dynamic Web Pages
Intro to Dynamic Web PagesIntro to Dynamic Web Pages
Intro to Dynamic Web Pages
 
3.7 outlier analysis
3.7 outlier analysis3.7 outlier analysis
3.7 outlier analysis
 
Sistemas de Telecomunicações - Aula 14 - Redes ATM, Ethernet, Token Ring e Re...
Sistemas de Telecomunicações - Aula 14 - Redes ATM, Ethernet, Token Ring e Re...Sistemas de Telecomunicações - Aula 14 - Redes ATM, Ethernet, Token Ring e Re...
Sistemas de Telecomunicações - Aula 14 - Redes ATM, Ethernet, Token Ring e Re...
 
Hfc d coaxial fiber optic
Hfc d coaxial fiber opticHfc d coaxial fiber optic
Hfc d coaxial fiber optic
 
Static dynamic and active web pages
Static dynamic and active web pagesStatic dynamic and active web pages
Static dynamic and active web pages
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
Ppt of socket
Ppt of socketPpt of socket
Ppt of socket
 
Web technology
Web technologyWeb technology
Web technology
 
Flow & Error Control
Flow & Error ControlFlow & Error Control
Flow & Error Control
 
Ports & sockets
Ports  & sockets Ports  & sockets
Ports & sockets
 

Ähnlich wie Lan technologies

Real-World Networks
Real-World NetworksReal-World Networks
Real-World Networkszaisahil
 
Network architecture
Network architectureNetwork architecture
Network architectureOnline
 
Lan basic
Lan basicLan basic
Lan basicOnline
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernetOnline
 
educational content educational content educational content
educational content educational content  educational contenteducational content educational content  educational content
educational content educational content educational contentOlajide Kuku
 
Educational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentEducational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentOlajide Kuku
 
Chapter 3 Networking
Chapter 3 NetworkingChapter 3 Networking
Chapter 3 Networkingmlrbrown
 
CCNA Data Center Ethernet Communication Standards
CCNA Data Center Ethernet Communication StandardsCCNA Data Center Ethernet Communication Standards
CCNA Data Center Ethernet Communication StandardsNetProtocol Xpert
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)Sam Bowne
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)Sam Bowne
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 
Networking Chapter 5
Networking Chapter 5Networking Chapter 5
Networking Chapter 5mlrbrown
 
HPE Training uts prs PowerPoint presentation
HPE Training uts   prs    PowerPoint presentationHPE Training uts   prs    PowerPoint presentation
HPE Training uts prs PowerPoint presentationurmishabm
 

Ähnlich wie Lan technologies (20)

Real-World Networks
Real-World NetworksReal-World Networks
Real-World Networks
 
Network architecture
Network architectureNetwork architecture
Network architecture
 
IEEE standard
IEEE standardIEEE standard
IEEE standard
 
Lan basic
Lan basicLan basic
Lan basic
 
Fast ethernet
Fast ethernetFast ethernet
Fast ethernet
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
Fast_Ethernet.ppt
Fast_Ethernet.pptFast_Ethernet.ppt
Fast_Ethernet.ppt
 
educational content educational content educational content
educational content educational content  educational contenteducational content educational content  educational content
educational content educational content educational content
 
Educational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-ContentEducational-Content-Educational-Content-Educational-Content
Educational-Content-Educational-Content-Educational-Content
 
Chapter 3 Networking
Chapter 3 NetworkingChapter 3 Networking
Chapter 3 Networking
 
Week 5 lan topology
Week 5 lan topologyWeek 5 lan topology
Week 5 lan topology
 
Ethernet
EthernetEthernet
Ethernet
 
CCNA Data Center Ethernet Communication Standards
CCNA Data Center Ethernet Communication StandardsCCNA Data Center Ethernet Communication Standards
CCNA Data Center Ethernet Communication Standards
 
Gigabit Ethernet.pptx
Gigabit Ethernet.pptxGigabit Ethernet.pptx
Gigabit Ethernet.pptx
 
Chapter10
Chapter10Chapter10
Chapter10
 
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)CISSP Prep: Ch 5. Communication and Network Security (Part 2)
CISSP Prep: Ch 5. Communication and Network Security (Part 2)
 
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
CNIT 125 Ch 5 Communication & Network Security (part 2 of 2)
 
IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
Networking Chapter 5
Networking Chapter 5Networking Chapter 5
Networking Chapter 5
 
HPE Training uts prs PowerPoint presentation
HPE Training uts   prs    PowerPoint presentationHPE Training uts   prs    PowerPoint presentation
HPE Training uts prs PowerPoint presentation
 

Mehr von Manusha Dilan

Telco app development
Telco app developmentTelco app development
Telco app developmentManusha Dilan
 
Jade Application Wedding Planner (Groom Assist)
Jade Application Wedding Planner (Groom Assist)Jade Application Wedding Planner (Groom Assist)
Jade Application Wedding Planner (Groom Assist)Manusha Dilan
 
E commerce application using asp.net mvc4
E commerce application using asp.net mvc4E commerce application using asp.net mvc4
E commerce application using asp.net mvc4Manusha Dilan
 
Advanced python concepts
Advanced python conceptsAdvanced python concepts
Advanced python conceptsManusha Dilan
 
Ruhune maha wiharaya(රුහුණේ මහා විහාරය )
Ruhune maha wiharaya(රුහුණේ මහා විහාරය )Ruhune maha wiharaya(රුහුණේ මහා විහාරය )
Ruhune maha wiharaya(රුහුණේ මහා විහාරය )Manusha Dilan
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocolManusha Dilan
 
Java_practical_handbook
Java_practical_handbookJava_practical_handbook
Java_practical_handbookManusha Dilan
 
HCI_chapter_09-Evaluation_techniques
HCI_chapter_09-Evaluation_techniquesHCI_chapter_09-Evaluation_techniques
HCI_chapter_09-Evaluation_techniquesManusha Dilan
 

Mehr von Manusha Dilan (13)

Cell aging
Cell agingCell aging
Cell aging
 
Waterfall model
Waterfall modelWaterfall model
Waterfall model
 
Telco app development
Telco app developmentTelco app development
Telco app development
 
Jade Application Wedding Planner (Groom Assist)
Jade Application Wedding Planner (Groom Assist)Jade Application Wedding Planner (Groom Assist)
Jade Application Wedding Planner (Groom Assist)
 
E commerce application using asp.net mvc4
E commerce application using asp.net mvc4E commerce application using asp.net mvc4
E commerce application using asp.net mvc4
 
Advanced python concepts
Advanced python conceptsAdvanced python concepts
Advanced python concepts
 
Ruhune maha wiharaya(රුහුණේ මහා විහාරය )
Ruhune maha wiharaya(රුහුණේ මහා විහාරය )Ruhune maha wiharaya(රුහුණේ මහා විහාරය )
Ruhune maha wiharaya(රුහුණේ මහා විහාරය )
 
B2C Models
B2C ModelsB2C Models
B2C Models
 
Python collections
Python collectionsPython collections
Python collections
 
Selective repeat protocol
Selective repeat protocolSelective repeat protocol
Selective repeat protocol
 
Cellular concepts
Cellular conceptsCellular concepts
Cellular concepts
 
Java_practical_handbook
Java_practical_handbookJava_practical_handbook
Java_practical_handbook
 
HCI_chapter_09-Evaluation_techniques
HCI_chapter_09-Evaluation_techniquesHCI_chapter_09-Evaluation_techniques
HCI_chapter_09-Evaluation_techniques
 

Kürzlich hochgeladen

Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataBabyAnnMotar
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operationalssuser3e220a
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxVanesaIglesias10
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management systemChristalin Nelson
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 

Kürzlich hochgeladen (20)

Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
Measures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped dataMeasures of Position DECILES for ungrouped data
Measures of Position DECILES for ungrouped data
 
Expanded definition: technical and operational
Expanded definition: technical and operationalExpanded definition: technical and operational
Expanded definition: technical and operational
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
ROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptxROLES IN A STAGE PRODUCTION in arts.pptx
ROLES IN A STAGE PRODUCTION in arts.pptx
 
Concurrency Control in Database Management system
Concurrency Control in Database Management systemConcurrency Control in Database Management system
Concurrency Control in Database Management system
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 

Lan technologies

  • 2. • Ethernet • FIBER DISTRIBUTED DATA INTERFACE (FDDI) • Token Ring Technology Options
  • 3. Our Focus is Ethernet • History • Developed by Bob Metcalfe and others at Xerox PARC in mid-1970s • Roots in Aloha packet-radio network • Standardized by Xerox, DEC, and Intel in 1978 • LAN standards define MAC and physical layer connectivity • IEEE 802.3 (CSMA/CD - Ethernet) standard – originally 2Mbps • IEEE 802.3u standard for 100Mbps Ethernet • IEEE 802.3z standard for 1,000Mbps Ethernet
  • 4. Ethernet Standard Defines Physical Layer Metcalfe’s original Ethernet Sketch 802.3 standard defines both MAC and physical layer details
  • 5. Ethernet • 10 Base 5 (Thicknet) (Bus Topology) • 10 Base 2 (Thinnet) (Bus Topology) • 10 Base T (UTP) (Star/Tree Topology) • 10 Base FL (Fiber) (Star/Tree Topology)
  • 6. Ethernet Technologies: 10Base2 10: 10Mbps; 2: under 185 (~200) meters cable length Thin coaxial cable in a bus topology Repeaters used to connect multiple segments Repeater repeats bits it hears on one interface to its other interfaces: physical layer device only!
  • 7. 10BaseT and 100BaseT • 10/100 Mbps rate • T stands for Twisted Pair • Hub(s) connected by twisted pair facilitate “star topology” • Distance of any node to hub must be < 100M
  • 8. Fast Ethernet • 100 Mbps bandwidth • Uses same CSMA/CD media access protocol and packet format as in Ethernet. • 100BaseTX (UTP) and 100BaseFX (Fiber) standards • Physical media :- • 100 BaseTX - UTP Cat 5e • 100 BaseFX - Multimode / Singlemode Fiber • Full Duplex/Half Duplex operations. • Provision for Auto-Negotiation of media speed: 10 Mbps or 100Mbps (popularly available for copper media only). • Maximum Segment Length • 100 Base TX - 100 m • 100 Base FX - 2 Km (Multimode Fiber) • 100 Base FX - 20 km (Singlemode Fiber)
  • 9. Gigabit Ethernet • 1 Gbps bandwidth. • Uses same CSMA/CD media access protocol as in Ethernet and is backward compatible (10/100/100 modules are available). • 1000BaseT (UTP), 1000BaseSX (Multimode Fiber) and 1000BaseLX (Multimode/Singlemode Fiber) standards. • Maximum Segment Length • 1000 Base T - 100m (Cat 5e/6) • 1000 Base SX - 275 m (Multimode Fiber) • 1000 Base LX - 512 m (Multimode Fiber) • 1000 Base LX - 20 Km (Singlemode Fiber) • 1000 Base LH - 80 Km (Singlemode Fiber
  • 10. 10 Gig Ethernet • 10 Gbps bandwidth. • Uses same CSMA/CD media access protocol as in Ethernet. • Propositioned for Metro-Ethernet • Maximum Segment Length • 1000 Base-T - Not available • 10GBase-LR - 10 Km (Singlemode Fiber) • 10GBase-ER - 40 Km (Singlemode Fiber)
  • 11. IEEE 802.5 and Token Ring • Proposed in 1969 and initially referred to as a Newhall ring. • Token ring : a number of stations connected by transmission links in a ring topology. Information flows in one direction along the ring from source to destination and back to source. • Medium access control is provided by a small frame, the token, that circulates around the ring when all stations are idle. Only the station possessing the token is allowed to transmit at any given time.
  • 12. Token Ring Operation • When a station wishes to transmit, it must wait for token to pass by and seize the token. • One approach: change one bit in token which transforms it into a “start-of-frame sequence” and appends frame for transmission. • Second approach: station claims token by removing it from the ring. • Frame circles the ring and is removed by the transmitting station. • Each station interrogates passing frame, if destined for station, it copies the frame into local buffer. {Normally, there is a one bit delay as the frame passes through a station.}
  • 13. Token Ring Network with star topology
  • 14. IEEE 802.5 Token Ring • 4 and 16 Mbps using twisted-pair cabling with differential Manchester line encoding. • Maximum number of stations is 250. • Waits for last byte of frame to arrive before reinserting token on ring {new token after received}. • 8 priority levels provided via two 3-bit fields (priority and reservation) in data and token frames. • Permits 16-bit and 48-bit addresses (same as 802.3).
  • 15. Token Ring • Under light load – delay is added due to waiting for the token. • Under heavy load – ring is “round-robin” • The ring must be long enough to hold the complete token. • Advantages – fair access • Disadvantages – ring is single point of failure, added issues due to token maintenance
  • 16. Networks: Token Ring and FDDI A E DC B FDDI Token Ring
  • 17. FIBER DISTRIBUTED DATA INTERFACE (FDDI) • PROJECT INITIATED IN OCTOBER 1982 BY JAMES HAMSTRA AT SPERRY (NOW UNISYS) • TWO PROPOSALS FOR MEDIA ACCESS CONTROL (MAC) & PHYSICAL (PHY) LAYERS SUBMITTED IN JUNE 1983 • FDDI MAC BECAME AN ANSI STANDARD IN LATE 1986 • FDDI PHY WON ANSI STANDARDIZATION IN 1988 • FDDI - II PROPOSAL WAS MADE IN EARLY 1986 • FIRST PUBLIC DEMONSTRATIONS AT ADVANCED MICRO DEVICES (AMD) IN 1989
  • 18. FDDI BASIC PRINCIPLE • TOKEN RING NETWORK LIKE IEEE 802.5 • TOKEN: A SPECIAL SEQUENCE OF BITS • TOKEN CIRCULATES AROUND THE RING • A STATION REMOVES THE TOKEN FROM RING BEFORE TRANSMISSION • AFTER TRANSMISSION, THE STATION RETURNS THE TOKEN TO THE RING • COLLISIONS ARE PREVENTED AS THERE IS ONLY ONE TOKEN IN THE RING
  • 19. FIBER DISTRIBUTED DATA INTERFACE (FDDI)
  • 20. FDDI ARCHITECTURAL MODEL • ACCORDING TO THE OSI-RM, FDDI SPECIFIES LAYER 1 (PHYSICAL LAYER) AND PART OF LAYER 2 (DATA LINK CONTROL LAYER) • THE PHYSICAL LAYER HANDLES THE TRANSMISSION OF RAW BITS OVER A COMMUNICATIONS LINK • THE DATA LINK CONTROL (DLC) LAYER IS RESPONSIBLE FOR MAINTAINING THE INTEGRITY OF INFORMATION EXCHANGED BETWEEN TWO POINTS
  • 21. FDDI - II • SAME FEATURES AS BASIC FDDI (FDDI - I), INCLUDING MAXIMUM NUMBER OF MODES, 100 MBPS DATA TRANSFER BIT RATE, AND THE DUAL RING • DEFINES THE PHYSICAL LAYER AND THE LOWER HALF OF THE DATA LINK LAYER SIMILAR TO FDDI-I • FDDI-I SUPPORTS ONLY PACKET MODE (SYNCHRONOUS AND ASYNCHRONOUS) TRAFFIC, FDDI-II SUPPORTS BOTH PACKET DATA AS WELL AS ISOCHRONOUS DATA TRAFFIC (IN FDDI ISOCHRONOUS INDICATES A CLASS OF TRAFFIC FOR VOICE AND VIDEO • THE SIMULTANEOUS SUPPORT OF BOTH PACKET AND ISOCHRONOUS TRAFFIC IS CALLED THE HYBRID MODE OF OPERATION
  • 22. A FDDI BACKBONE NETWORK EXAMPLE
  • 23. FEATURES FDDI ETHERNET TOKEN RING TRANSMISSION RATE 125 MBAUD 20 MBAUD 8 & 32 MBAUD DATA RATE 100 MBPS 10 MBPS 4 & 16 MBPS SIGNAL ENCODING 4B/5B (80% EFFICIENT) MANCHESTER (50% EFFICIENT) DIFFERENTIAL MANCHESTER (50% EFFICIENT) MAXIMUM COVERAGE 100 KM 2.5 KM CONFIGURATION DEPENDENT MAXIMUM NODES 500 1024 250 MAXIMUM DISTANCE BETWEEN NODES 2 KM (MULTIMODE FIBER) 40 KM (SINGLE- MODE FIBER) 2.5 KM 300 M (RECOMMENDED 100 M) COMPARISON WITH OTHER NETWORKS
  • 24. ………. THANK YOU ……….