Layer 2: Technologies Chapter 7 - PowerPoint PPT Presentation

1 / 27
About This Presentation
Title:

Layer 2: Technologies Chapter 7

Description:

Standards for Local and Metropolitan Area Networks. 802.1. LAN and MAN Bridging and Management ... Maximum length for patch cables/jumpers in wiring closet is 6 meters ... – PowerPoint PPT presentation

Number of Views:28
Avg rating:3.0/5.0
Slides: 28
Provided by: sheph5
Category:

less

Transcript and Presenter's Notes

Title: Layer 2: Technologies Chapter 7


1
Layer 2 TechnologiesChapter 7
2
(No Transcript)
3
Token Ring Passing
4
Token Ring Format
5
Token Passing
  • Token-passing networks move a small frame, called
    a token, around the network.
  • Possession of the token grants the right to
    transmit data.
  • If a node that receives a token has no
    information to send, it passes the token to the
    next end station.
  • Each station can hold the token for a maximum
    period of time, depending on the specific
    technology that has been implemented.

6
Token Passing
  • When a token is passed to a host that has
    information to transmit, the host seizes the
    token and alters 1 bit of it. The token becomes a
    start-of-frame sequence.
  • Other stations on the ring cannot transmit at
    this time. They must wait for the token to become
    available.

7
Token Passing
  • Token Ring networks have no collisions. If early
    token release is supported, a new token can be
    released when the frame transmission has been
    completed.
  • The information frame circulates around the ring
    until it reaches the intended destination
    station, which copies the information for
    processing. The information frame continues
    around the ring until it reaches the sending
    station, where it is removed. The sending station
    can verify whether the frame was received and
    copied by the destination.

8
Token Passing
  • Unlike CSMA/CD networks, such as Ethernet,
    token-passing networks are deterministic. This
    means that you can calculate the maximum time
    that will pass before any end station will be
    able to transmit.
  • This feature, and several reliability features,
    makes Token Ring networks ideal for applications
    where any delay must be predictable, and robust
    network operation is important. Factory
    automation environments are examples of
    predictable robust network operations.

9
MultiStation Access Units(MSAUs) monitor the
network and remove down machines from the ring.
10
FDDI Basics
  • Fiber Distributed
  • Data Interface (FDDI)
  • came about because system
  • managers became concerned
  • with network reliability. Issues as
    mission-critical applications were implemented on
    high-speed networks.
  • FDDI is frequently used as a backbone technology
    and to connect high-speed computers in a LAN.

11
FDDI Media
  • FDDI specifies the use of dual rings for physical
    connections. Traffic on each ring travels in
    opposite directions.
  • Physically, the rings consist of two or more
    point-to-point connections between adjacent
    stations.
  • One of the two FDDI rings is called the primary
    ring the other is called the secondary ring.
  • The primary ring is used for data transmission
    the secondary ring is generally used as a back
    up. 

12
FDDI(Fiber Distributed Data Interface- fiddee)
  • FDDI uses a token passing
  • system similar to Token Ring.
  • Unlike CSMA/CD networks, such as Ethernet,
    token-passing networks are deterministic--you can
    calculate the maximum time that will pass before
    any end station will be able to transmit. FDDI's
    dual ring makes FDDI very reliable.

13
FDDI Media
  • FDDI specifies a 100 Mbps, token-passing,
    dual-ring LAN that uses a fiber-optic
    transmission medium.
  • Although it operates at faster speeds, FDDI is
    similar to Token Ring in its media access
    technique(deterministic and token passing. No
    Collisions.)
  • Optical fiber is exploding in popularity as a
    networking medium, being installed at a rate of
    4000 miles per day in the United States.

14
FDDI Media
Optical fiber offers several advantages over
traditional copper wiring, including such
advantages as
  • security - Fiber does not emit electrical signals
    that can be tapped.
  • reliability - Fiber is immuneto electrical
    interference.
  • speed - Optical fiber has much higher throughput
    potential than copper cable.

15
FDDI Media
  • Single-mode fiber is capable of higher bandwidth
    and greater cable run distances than multi-mode
    fiber.
  • Because of these characteristics, single-mode
    fiber is often used for inter-building
    connectivity while multi-mode fiber is often used
    for intra-building connectivity.
  • Multi-mode fiber uses LEDs as the
    light-generating devices while single-mode fiber
    generally uses lasers.

16
Ethernet and IEEE 802.3
  • Ethernet is the most widely used local area
    network (LAN) technology.
  • Ethernet is well suited to applications where a
    local communication medium must carry sporadic,
    occasionally heavy traffic at high peak data
    rates.
  • Today, the term Ethernet is often used to refer
    to all carrier sense multiple access/collision
    detection (CSMA/CD) LANs that generally conform
    to Ethernet specifications, including IEEE 802.3.

17
Ethernet and IEEE 802.3 are CSMA/CD
Technologies(Carrier Sense Multiple
Access/Collision Detection)
  • CSMA/CD networks are first come/first served
    access systems with possible collisions.
  • Before sending data, CSMA/CD
  • stations listen to the network to
  • determine if it is already in use.
  • If it is, then they wait.
  • If the network is not in use,
  • the stations transmit.

18
Ethernet and IEEE 802.3
  • A collision occurs when two stations listen for
    network traffic, hear none, and transmit
    simultaneously. In this case, both transmissions
    are damaged, and the stations must retransmit at
    some later time.
  • Backoff algorithms determine when the colliding
    stations can retransmit. CSMA/CD stations can
    detect collisions so they know when they must
    retransmit.

19
Ethernet and IEEE 802.3
  • Both Ethernet and IEEE 802.3 LANs are broadcast
    networks. This means every station can see all of
    the frames, regardless of whether they are the
    intended destination of that data.
  • Each station must examine the received frames to
    determine if they are the destination(MAC
    address).
  • If so, the frame is passed to a higher layer
    protocolwithin the station for
    appropriateprocessing.

20
(No Transcript)
21
(No Transcript)
22
(No Transcript)
23
(No Transcript)
24
(No Transcript)
25
(No Transcript)
26
Ethernet 10BaseT Media and Topologies
  • Maximum length of cable run is 90
    meters
  • Maximum length for patch cords to from
    outlet to workstation is 3
    meters
  • Maximum length for patch cables/jumpers in wiring
    closet is 6 meters

27
(No Transcript)
Write a Comment
User Comments (0)
About PowerShow.com