SlideShare ist ein Scribd-Unternehmen logo
1 von 26
FDDI & GIGABIT Ethernet Presented by, Sarah Deori UtkarshVerma Vandan Joshi Vijay Deep Shukla ChineahRowin
Fiber Distributed Data Interface (FDDI)
Token Ring
Before FDDI  Groups that previously had no need for communication now want network connections. Existing token ring and Ethernet backbones that are interconnected are now reaching their capacity. Applications require increasing bandwidth, security, and fault tolerance.
Introduction What is FDDI? 	- specifies a 100-Mbps token-passing 	- dual-ring LAN 	- using fiber-optic cable Bandwidth Supported – 200Mbps Coverage – 200 km  	- Multimode -> 2km 	- Single mode -> 60km Developed by the American National Standards Institute (ANSI) X3T9.5 standards committee in the mid-1980s.
FDDI Using Primary & Secondary Rings
FDDI Station-Attachment Types Single-attachment station (SAS) Dual-attachment station (DAS)
FDDI and the OSI Model OSI Data Link OSI Physical Layer
FDDI Fault Tolerance Dual Ring
Cont… Optical Bypass Switch
Cont… Dual Homing
Advantages & Disadvantages High Speed And Deterministic Technology Long Distance    Fault Tolerance    Management    Flexibility  Cost Complex
GIGABIT ETHERNET
Demand for Gigabit Ethernet Greater Demand on servers Ongoing Desktop revolution 	- Collaborative work environment 	- Routine sharing of large files 	- Converged application 	- Multi-tasking of high bandwidth applications
High speed connection to servers
Connecting multiple locations
Media types Single-mode fiber  Multimode fiber Coaxial cable  Shielded twisted pair
Minimum Ethernet Frame Length issue When link speed increases from 100 Mbps to 1000 Mbps, for half-duplex CSMA/CD to work well (to be able to detect collision Reduce the network size by a factor of 10 to only 20 meter Not acceptable Or increase the minimum Ethernet frame length by a factor of 10 Network efficiency will decrease. Higher layer protocols needs to be modified. 12- 18
Carrier Extension Gigabit Ethernet does not want to modify application programs.  We want application programs to still use 64 bytes as the minimum frame size. Ideally, they should not need to know whether they are using Ethernet, Fast Ethernet, or Gigabit Ethernet.  However, to be able to detect collision, the minimum frame size must be enlarged from 64 bytes to 512 bytes (4096 bits). Carrier extension is introduced to insert padding at the MAC layer so that every transmitted frame is at least 512 bytes. 12- 19
Frame Bursting Although carrier extension solves the collision detection problem, the link utilization can be very low.  If every transmitted frame is a minimum-sized frame, because in every transmitted 512 bytes, there are only 64 useful bytes. The effective link utilization is only 64/512 = 12.5% Frame bursting is introduced to improve link utilization. 12- 20
Frame Bursting If the source host has many small frames to send, it can send them in a burst after a MAC arbitration. Except for the first frame, other frames sent in a burst need not be carrier-extended.  If the first frame is larger than 512 bytes, it need not be carrier-extended. The burst can be as long as 8192 bytes. 12- 21
Why Doing Carrier Extension for the First Frame in a Burst? First, if there is no carrier extension, when collision happens, the sending host may have sent out many small frames. If the sending host resends all frames that have been sent, two problems may occur: They may already be removed from the buffer. The receiver may receive duplicate frames. Second, if there is carrier extension and collision is detected in this period, the sending host knows that only the first frame should be retransmitted. Third, if there is carrier extension and there is no collision detected in this period, the sending host can be assured that no collision will happen in the future.  12- 22
Gigabit Ethernet over copper Cable configuration – 1000BASE-T provides 1Gbps Ethernet signal transmission over four pairs of Category-5 UTP cable. 250Mbps per wire pair multiplied by 4 pairs = 1000Mbps Distances – The copper standard covers cabling distances of up to 100 meters, or networks with a diameter of 200 meters (assumes 100 meters in two directions from a switch). Half duplex and CSMA/CD – Although the standard includes half-duplex operation, few Gigabit products support half duplex to date. Full duplex is preferred to maximize performance. Gigabit Ethernet uses the CSMA/CD protocol only when running in half-duplex mode. Full duplex and flow control – In full duplex, CSMA/CD collision detection is impractical. Instead, flow control methodology is used to avoid congestion and overloading. The cost of a 1000BASE-T network adapter is much cheaper than that of a 1000BASE-X network adapter.  12- 23
12- 24 Gigabit Ethernet Equipment 1000 Base X 1000 Base T
Advantages Increased bandwidth for higher performance and elimination of bottlenecks Full-duplex capacity, allowing the effective bandwidth to be virtually doubled Aggregating bandwidth to multi- Gigabit speeds using Gigabit server adapters and switches Low cost of acquisition and ownership Full compatibility with the large installed base of Ethernet and Fast Ethernet nodes Transferring large amounts of data across a network quickly 12- 25
THANK YOU !!

Weitere ähnliche Inhalte

Was ist angesagt?

HDLC(high level data link control)
HDLC(high level data link control)HDLC(high level data link control)
HDLC(high level data link control)
Anand Biradar
 

Was ist angesagt? (20)

HDLC(High level Data Link Control)
HDLC(High level Data Link Control)HDLC(High level Data Link Control)
HDLC(High level Data Link Control)
 
DMA controller intel 8257
DMA controller intel 8257DMA controller intel 8257
DMA controller intel 8257
 
HDLC(high level data link control)
HDLC(high level data link control)HDLC(high level data link control)
HDLC(high level data link control)
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
Multiplexing in mobile computing
Multiplexing in mobile computingMultiplexing in mobile computing
Multiplexing in mobile computing
 
HIGH SPEED NETWORKS
HIGH SPEED NETWORKSHIGH SPEED NETWORKS
HIGH SPEED NETWORKS
 
Computer network switching
Computer network switchingComputer network switching
Computer network switching
 
Point to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish JadiaPoint to point protocol | PPP - Nitish Jadia
Point to point protocol | PPP - Nitish Jadia
 
Pipes in Windows and Linux.
Pipes in Windows and Linux.Pipes in Windows and Linux.
Pipes in Windows and Linux.
 
Task communication
Task communicationTask communication
Task communication
 
Presentation Routing algorithm
Presentation Routing algorithmPresentation Routing algorithm
Presentation Routing algorithm
 
Models of Distributed System
Models of Distributed SystemModels of Distributed System
Models of Distributed System
 
Token ring
Token ringToken ring
Token ring
 
Ch12
Ch12Ch12
Ch12
 
Memory Organization
Memory OrganizationMemory Organization
Memory Organization
 
data-link layer protocols
data-link layer protocols  data-link layer protocols
data-link layer protocols
 
Hdlc ppt..
Hdlc ppt..Hdlc ppt..
Hdlc ppt..
 
Addressing
AddressingAddressing
Addressing
 
Input output module
Input output moduleInput output module
Input output module
 
DATA TRANSMISSION, Synchronous & Asynchronous Data Transfer
DATA TRANSMISSION, Synchronous & Asynchronous Data TransferDATA TRANSMISSION, Synchronous & Asynchronous Data Transfer
DATA TRANSMISSION, Synchronous & Asynchronous Data Transfer
 

Andere mochten auch (14)

Hippi
HippiHippi
Hippi
 
Dqdb
DqdbDqdb
Dqdb
 
Dqdb & Fddi
Dqdb & FddiDqdb & Fddi
Dqdb & Fddi
 
Fddi and isdn
Fddi and isdnFddi and isdn
Fddi and isdn
 
Fddi
FddiFddi
Fddi
 
Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)Asynchronous transfer mode (atm)
Asynchronous transfer mode (atm)
 
Gigabit Ethernet
Gigabit EthernetGigabit Ethernet
Gigabit Ethernet
 
FDDI
FDDIFDDI
FDDI
 
Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )Atm( Asynchronous Transfer mode )
Atm( Asynchronous Transfer mode )
 
Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)Asynchronous Transfer Mode (ATM)
Asynchronous Transfer Mode (ATM)
 
ATM Networking Concept
ATM Networking ConceptATM Networking Concept
ATM Networking Concept
 
Redes De Fibra Optica
Redes De Fibra OpticaRedes De Fibra Optica
Redes De Fibra Optica
 
Gigabit Ethernet
Gigabit EthernetGigabit Ethernet
Gigabit Ethernet
 
Dqdb
DqdbDqdb
Dqdb
 

Ähnlich wie Fddi & Gigabit Ethernet

Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
nakomuri
 
10 gigabit ethernet technology
10 gigabit ethernet technology10 gigabit ethernet technology
10 gigabit ethernet technology
Likan Patra
 
CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3
Ravi Yasas
 
Webinar ethernet basics part a v1.3
Webinar ethernet basics part a v1.3Webinar ethernet basics part a v1.3
Webinar ethernet basics part a v1.3
wilbertl
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
Sajid Marwat
 

Ähnlich wie Fddi & Gigabit Ethernet (20)

Networking
NetworkingNetworking
Networking
 
Advance ethernet
Advance ethernetAdvance ethernet
Advance ethernet
 
04 - Networking Technologies.ppt
04 - Networking Technologies.ppt04 - Networking Technologies.ppt
04 - Networking Technologies.ppt
 
Gigabit Ethernet.pptx
Gigabit Ethernet.pptxGigabit Ethernet.pptx
Gigabit Ethernet.pptx
 
Twisted Pair Ethernet
Twisted Pair EthernetTwisted Pair Ethernet
Twisted Pair Ethernet
 
06 explain the advanced network typologies
06 explain the advanced network typologies06 explain the advanced network typologies
06 explain the advanced network typologies
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Chapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network DesignChapter 2 -_lan_network_design - Network Design
Chapter 2 -_lan_network_design - Network Design
 
6 Ethernet
6 Ethernet6 Ethernet
6 Ethernet
 
Unit 1 ethernet vsd
Unit 1 ethernet vsdUnit 1 ethernet vsd
Unit 1 ethernet vsd
 
10 gigabit ethernet technology
10 gigabit ethernet technology10 gigabit ethernet technology
10 gigabit ethernet technology
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Fast ethernet
Fast ethernetFast ethernet
Fast ethernet
 
SAN and FICON Long Distance Connectivity
SAN and FICON Long Distance ConnectivitySAN and FICON Long Distance Connectivity
SAN and FICON Long Distance Connectivity
 
Chapter 10 network for PG PAWSN
Chapter 10 network for PG PAWSNChapter 10 network for PG PAWSN
Chapter 10 network for PG PAWSN
 
CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3CCNA Exam 640-802 Version 9.3
CCNA Exam 640-802 Version 9.3
 
Network engg
Network enggNetwork engg
Network engg
 
Webinar ethernet basics part a v1.3
Webinar ethernet basics part a v1.3Webinar ethernet basics part a v1.3
Webinar ethernet basics part a v1.3
 
WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)WiMAX (IEEE 802.16)
WiMAX (IEEE 802.16)
 
Optical Transport Technologies and Trends
Optical Transport Technologies and TrendsOptical Transport Technologies and Trends
Optical Transport Technologies and Trends
 

Mehr von Utkarsh Verma (13)

Evolution Of Convergence And Voip
Evolution Of Convergence And VoipEvolution Of Convergence And Voip
Evolution Of Convergence And Voip
 
SAP Point Of Sales
SAP Point Of SalesSAP Point Of Sales
SAP Point Of Sales
 
Godrej Adhaar
Godrej AdhaarGodrej Adhaar
Godrej Adhaar
 
Network Security Nmap N Nessus
Network Security Nmap N NessusNetwork Security Nmap N Nessus
Network Security Nmap N Nessus
 
Unified Communications
Unified CommunicationsUnified Communications
Unified Communications
 
Umts Final
Umts FinalUmts Final
Umts Final
 
ITIL in Telecom part 2
ITIL in Telecom part 2ITIL in Telecom part 2
ITIL in Telecom part 2
 
ITIL Implemetation in Telecom
 ITIL Implemetation in Telecom ITIL Implemetation in Telecom
ITIL Implemetation in Telecom
 
Green Bags Neeraj
Green Bags  NeerajGreen Bags  Neeraj
Green Bags Neeraj
 
20090117 Ver 2.0 Community Disaster Incident Response
20090117   Ver 2.0   Community Disaster  Incident Response20090117   Ver 2.0   Community Disaster  Incident Response
20090117 Ver 2.0 Community Disaster Incident Response
 
Idea Camp Presentation
Idea Camp PresentationIdea Camp Presentation
Idea Camp Presentation
 
Knowledge
KnowledgeKnowledge
Knowledge
 
On Demand Service
On Demand ServiceOn Demand Service
On Demand Service
 

Kürzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 

Fddi & Gigabit Ethernet

  • 1. FDDI & GIGABIT Ethernet Presented by, Sarah Deori UtkarshVerma Vandan Joshi Vijay Deep Shukla ChineahRowin
  • 2. Fiber Distributed Data Interface (FDDI)
  • 4. Before FDDI Groups that previously had no need for communication now want network connections. Existing token ring and Ethernet backbones that are interconnected are now reaching their capacity. Applications require increasing bandwidth, security, and fault tolerance.
  • 5. Introduction What is FDDI? - specifies a 100-Mbps token-passing - dual-ring LAN - using fiber-optic cable Bandwidth Supported – 200Mbps Coverage – 200 km - Multimode -> 2km - Single mode -> 60km Developed by the American National Standards Institute (ANSI) X3T9.5 standards committee in the mid-1980s.
  • 6. FDDI Using Primary & Secondary Rings
  • 7. FDDI Station-Attachment Types Single-attachment station (SAS) Dual-attachment station (DAS)
  • 8. FDDI and the OSI Model OSI Data Link OSI Physical Layer
  • 12. Advantages & Disadvantages High Speed And Deterministic Technology Long Distance Fault Tolerance Management Flexibility Cost Complex
  • 14. Demand for Gigabit Ethernet Greater Demand on servers Ongoing Desktop revolution - Collaborative work environment - Routine sharing of large files - Converged application - Multi-tasking of high bandwidth applications
  • 15. High speed connection to servers
  • 17. Media types Single-mode fiber Multimode fiber Coaxial cable Shielded twisted pair
  • 18. Minimum Ethernet Frame Length issue When link speed increases from 100 Mbps to 1000 Mbps, for half-duplex CSMA/CD to work well (to be able to detect collision Reduce the network size by a factor of 10 to only 20 meter Not acceptable Or increase the minimum Ethernet frame length by a factor of 10 Network efficiency will decrease. Higher layer protocols needs to be modified. 12- 18
  • 19. Carrier Extension Gigabit Ethernet does not want to modify application programs. We want application programs to still use 64 bytes as the minimum frame size. Ideally, they should not need to know whether they are using Ethernet, Fast Ethernet, or Gigabit Ethernet. However, to be able to detect collision, the minimum frame size must be enlarged from 64 bytes to 512 bytes (4096 bits). Carrier extension is introduced to insert padding at the MAC layer so that every transmitted frame is at least 512 bytes. 12- 19
  • 20. Frame Bursting Although carrier extension solves the collision detection problem, the link utilization can be very low. If every transmitted frame is a minimum-sized frame, because in every transmitted 512 bytes, there are only 64 useful bytes. The effective link utilization is only 64/512 = 12.5% Frame bursting is introduced to improve link utilization. 12- 20
  • 21. Frame Bursting If the source host has many small frames to send, it can send them in a burst after a MAC arbitration. Except for the first frame, other frames sent in a burst need not be carrier-extended. If the first frame is larger than 512 bytes, it need not be carrier-extended. The burst can be as long as 8192 bytes. 12- 21
  • 22. Why Doing Carrier Extension for the First Frame in a Burst? First, if there is no carrier extension, when collision happens, the sending host may have sent out many small frames. If the sending host resends all frames that have been sent, two problems may occur: They may already be removed from the buffer. The receiver may receive duplicate frames. Second, if there is carrier extension and collision is detected in this period, the sending host knows that only the first frame should be retransmitted. Third, if there is carrier extension and there is no collision detected in this period, the sending host can be assured that no collision will happen in the future. 12- 22
  • 23. Gigabit Ethernet over copper Cable configuration – 1000BASE-T provides 1Gbps Ethernet signal transmission over four pairs of Category-5 UTP cable. 250Mbps per wire pair multiplied by 4 pairs = 1000Mbps Distances – The copper standard covers cabling distances of up to 100 meters, or networks with a diameter of 200 meters (assumes 100 meters in two directions from a switch). Half duplex and CSMA/CD – Although the standard includes half-duplex operation, few Gigabit products support half duplex to date. Full duplex is preferred to maximize performance. Gigabit Ethernet uses the CSMA/CD protocol only when running in half-duplex mode. Full duplex and flow control – In full duplex, CSMA/CD collision detection is impractical. Instead, flow control methodology is used to avoid congestion and overloading. The cost of a 1000BASE-T network adapter is much cheaper than that of a 1000BASE-X network adapter. 12- 23
  • 24. 12- 24 Gigabit Ethernet Equipment 1000 Base X 1000 Base T
  • 25. Advantages Increased bandwidth for higher performance and elimination of bottlenecks Full-duplex capacity, allowing the effective bandwidth to be virtually doubled Aggregating bandwidth to multi- Gigabit speeds using Gigabit server adapters and switches Low cost of acquisition and ownership Full compatibility with the large installed base of Ethernet and Fast Ethernet nodes Transferring large amounts of data across a network quickly 12- 25

Hinweis der Redaktion

  1. lengths between stations can be anywhere from 2 kilometers (km) with multimode fiber, to 60 km with single-mode fiber.total ring length cannotexceed a maximum of 200km. FDDI was developed by the American National Standards Institute (ANSI) X3T9.5 standards committee in the mid-1980s.
  2. Please do mention ->>FDDI uses counter-rotating primary and secondary rings.An FDDI concentrator (also called a dual-attachment concentrator [DAC]) is the building block of an FDDI network. It attaches directly to both the primary and secondary rings and ensures that the failure or power-down of any SAS does not bring down the ring. This is particularly useful when PCs, or similar devices that are frequently powered on and off, connect to the ring.
  3. FDDI defines three type s of devices: single-attachment station (SAS), dual-attachment station (DAS), and a concentrator.An SAS attaches to only one ring (the primary) through a concentrator. One of the primary advantages of connecting devices with SAS attachments is that the devices will not have any effect on the FDDI ring if they are disconnected or powered off.Each FDDI DAS has two ports, designated A and B. These ports connect the DAS to the dual FDDI ring. Therefore, each port provides a connection for both the primary and the secondary ring.
  4. Although not part of the FDDI standard, the Logical Link Control (LLC) is required by FDDI to assure transmission of user data.The PMD, SMF-PMD, and PHY are equivalent to the physical layer of the OSI model. The PLM defines the media requirements for multimode fiber, such as fiber optic cable, connecters and driver receiver operation for FDDI stations. SMD-PMD defines similar requirements for SMF optic media.PHY corresponds to the upper layer of the physical layer and defines the symbol set, link states and encoding/ decoding,clocking and framing.