ethernet and token ring
DESCRIPTION
TRANSCRIPT
![Page 1: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/1.jpg)
BYABHIJEET KUMAR
SHAH
ETHERNET AND TOKEN RING
![Page 2: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/2.jpg)
The term Ethernet refers to the family of local-area network (LAN).
A local-area network (LAN) protocol developed by XeroxCorporation in cooperation with DEC and Intel in 1976.Ethernet uses a bus or star topology and
supports data transfer rates of 10/100/1000 Mbps.
Ethernet defines the lower two layers of the OSI Reference Model.
Ethernet
![Page 3: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/3.jpg)
The Ethernet specification served as the basis for the IEEE 802.3 standard, which specifies the physical and lower software layers.
Ethernet uses the CSMA/CD access method to handle simultaneous demands.
Ethernet, like other local area networks, falls in a middle ground between long-distance, low-speed networks that carry data for hundreds or thousands of kilometres, and specialized, very high speed interconnections that are generally limited to tens of meters.
![Page 4: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/4.jpg)
Ethernet frame
![Page 5: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/5.jpg)
![Page 6: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/6.jpg)
Types of Ethernet
![Page 7: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/7.jpg)
Fast Ethernet was designed to compete with LAN protocols such as FDDI (Fiber Distributed Data Interface) or Fiber Channel.
IEEE created Fast Ethernet under the name 802.3u.
Fast Ethernet is backward-compatible with Standard Ethernet.
It can transmit data 10 times faster at a rate of 100 Mbps.
FAST ETHERNET
![Page 8: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/8.jpg)
Topology used by fast ethernet
![Page 9: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/9.jpg)
Fast ethernet cables
![Page 10: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/10.jpg)
![Page 11: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/11.jpg)
The need for higher data rate resulted in the design of the Gigabit Ethernet (1000 Mbps).
The IEEE committee calls the standard 802.3z. All configurations of gigabit Ethernet are point to
point.Point-to-point, between two computers or one
computer – to –switch. It supports two different modes of operation: full
duplex mode and half duplex mode. Full duplex is used when computers are connected
by a switch. No collision is there and so CSMA/CD is not used.
GigaBit Ethernet
![Page 12: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/12.jpg)
(a) point to point between two computers(b) (b) point to point between switch and computer
![Page 13: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/13.jpg)
Half duplex is used when computers are connected by a hub.
Collision in hub is possible and so CSMA/CD is required.
The 802.3z committee considered a radius of 25 meters to be unacceptable and added two new features to increase the radius-Carrier Extension and Frame Bursting.
Carrier Extension tells the hardware to add its own padding bits after the normal frame to extend the frame to 512 bytes.
Frame Bursting allows a sender to transmit a concatenated sequence of multiple frames in a single transmission. If the total burst is less than 512 bytes, the hardware pads it again.
![Page 14: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/14.jpg)
Gigbit cable
![Page 15: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/15.jpg)
The heart of the system is a switch containing a high speed back-plane and room for typically 4 to 32 plug-in cards, each containing one to eight connectors.
When a station wants to transmit a frame, it outputs a frame to switch.
The plug-in card checks to see if the frame is for the other station on the same card. If so, it is copied there otherwise it is sent over high speed back-plane to destination station’s card.
Switched Ethernet
![Page 16: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/16.jpg)
All ports on the same card are wired together to form a local on-card LAN.
Collisions on this on-card LAN are detected and handled using CSMA/CD protocol.
One transmission per card is possible at any instant. All the cards can transmit in parallel.
With this design each card forms its own collision domain.
In other design, each input port is buffered, so incoming frames are stored in the card’s on board RAM.
It allows all input ports to receive (and transmit) frame at same time
![Page 17: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/17.jpg)
![Page 18: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/18.jpg)
MAC begins the transmission sequence by transferring the LLC information into the MAC frame buffer.
The preamble and start-of-frame delimiter are inserted in the PRE and SOF fields.
The destination and source addresses are inserted into the address fields.
The LLC data bytes are counted, and the number of bytes is inserted into the Length/Type field.
The LLC data bytes are inserted into the Data field. If the number of LLC data bytes is less than 46, a pad is added to bring the Data field length up to 46.
An FCS value is generated over the DA, SA, Length/Type, and Data fields and is appended to the end of the Data field.
Frame Transmission
![Page 19: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/19.jpg)
After the frame is assembled, actual frame transmission will depend on MAC.
There are two Media Access Control(MAC) protocols defined for
Ethernet: Half-Duplex Full-DuplexHalf-Duplex is the traditional form of
Ethernet that uses the CSMA/CD protocol.Full-Duplex bypasses the CSMA/CD protocolFull-duplex mode allows two stations to
simultaneously exchange data over a point to point link that provides independent transmit and receive paths
![Page 20: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/20.jpg)
Refers to the transmission of data in just one direction at a time.
Half-Duplex Ethernet is the traditional form of Ethernet that uses the CSMA/CD.
The CSMA/CD access rules are summarized by the protocol's acronym:
carrier sense multiple access collision detectHalf duplex Ethernet assumes that all the "normal"
rules of Ethernet are in effect on the local network.
Half Duplex
![Page 21: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/21.jpg)
The network is monitored for presence of a transmitting station (carrier sense).
After sending the jam sequence the transmitting station waits a random period of time (called “backoff”).
If an active carrier is not detected then the station immediately begins transmission of the frame.
While the transmitting station is sending the frame, it monitors the medium for a collision.
Collision Detection
![Page 22: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/22.jpg)
If a collision is detected, the transmitting station stops sending the frame data and sends a 32-bit "jam sequence.
If repeated collisions occur, then transmission is repeated
- the random delay is increased with each attemptOnce a station successfully transmits a frame,
it clears the collision counter it uses to increase the backoff time after each repeated collision.
![Page 23: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/23.jpg)
![Page 24: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/24.jpg)
Based on the IEEE 802.3x standard, “Full-Duplex” MAC type bypasses the CSMA/CD protocol
Full-duplex mode allows two stations to simultaneously exchange data over a point to point link
The aggregate throughput of the link is effectively doubled
– A full-Duplex 100 Mb/s station provides 200 Mb/s of bandwidth
Full duplex
![Page 25: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/25.jpg)
Full-Duplex operation is supported by:– 10-Base-T, 10Base-FL, 100Base-TX,
100Base-FX, 100Base-T2, 1000Base-CX, 1000Base-SX, 1000Base-
LS, and 1000Base-T.Full-Duplex operation is NOT supported by:– 10Base5, 10Base2, 10Base-FP, 10Base-FB,
and 100Base-T4.Full-Duplex operation is restricted to point to
point links connecting exactly two stations
![Page 26: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/26.jpg)
Full Duplex Operation
![Page 27: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/27.jpg)
Full-duplex MACs must have separate frame buffers and data paths to allow for simultaneous frame transmission and reception.
The destination address of the received frame is checked to determine whether the frame is destined for that station
If an address match is found the frame length is checked and the received FCS is
compared to the FCS that was generated during frame reception.
If the frame length is okay and there is an FCS match, the frame type is determined by the contents of the Length/Type field.
The frame is then parsed and forwarded to the appropriate upper layer.
Frame reception
![Page 28: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/28.jpg)
IEEE 802.3 Vs ISO Ref ISO data link layer is divided into two IEEE 802
sublayersMedia Access Control (MAC) sublayerMAC-client sublayer.
IEEE 802.3 physical layer same as ISO physical layer.
The MAC-client sublayer may be Logical Link Control (LLC) if the unit is a DTE Bridge entity, if the unit is a DCE
Lan to LAN ifEthernet to etnernetEthernet to token ring
![Page 29: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/29.jpg)
The Ethernet MAC Sublayer has two primary responsibilities: Data encapsulation, including frame assembly
before transmission, and frame parsing/error detection during and after reception
Media access control, including initiation of frame transmission and recovery from transmission failure
![Page 30: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/30.jpg)
Token ring local area network (LAN) technology is a protocol which resides at the data link layer (DLL) of the OSI model.
It uses a special three-byte frame called a token that travels around the ring.
Token-possession grants the possessor permission to transmit on the medium.
Token ring frames travel completely around the loop.
it was eventually standardized with protocol IEEE 802.5.
Stations on a token ring LAN are logically organized in a ring topology .
Token Ring
![Page 31: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/31.jpg)
In token ring , Data being transmitted sequentially from one ring station to the next with a control token circulating around the ring controlling access.
Token passing mechanism is shared by ARCNET, token bus, and FDDI ,and has theoretical advantages over the stochastic CSMA/CD of Ethernet.
A token ring network is wired as a star, with 'hubs' and arms out to each station and the loop going out-and-back through each.
Cabling is generally "Type-1" shielded twisted pair, with unique hermaphroditic connectors, commonly referred to as IBM data connectors in formal writing or colloquially as Boy George connectors
![Page 32: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/32.jpg)
In 1985, token ring ran at 4 Mbit/s.In 1989 IBM introduced the first 16 Mbit/s
token ring products and the 802.5 standard was extended to support this.
In 1981, Apollo Computer introduced their proprietary 12 Mbit/s Apollo token ring (ATR).
Proteon introduced their 10 Mbit/s ProNet-10 token ring network in 1984.
![Page 33: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/33.jpg)
A data token ring frame is used by stations to transmit media access control(MAC) management frames or data frames from upper layer protocols and applications.
Token Ring support two basic frame types: tokens and data/command frames.
Tokens are 3 bytes in length and consist of a start delimiter, an access control byte, and an end delimiter.
Data/command frames vary in size, depending on the size of the Information field
Token Ring frame format
![Page 34: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/34.jpg)
SD AC SD AC FC DA SA
PDU from LLC
(IEEE 802.2)
CRC ED FS
8 bits
8 bits
8 bits
8 bits
8 bits
48 bits
48 bits
up to 18200x8 bits
32 bits
8 bits
8 bits
Data/Command Frame
![Page 35: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/35.jpg)
Starting Delimiter(SD) consists of a special bit pattern denoting the beginning of the frame. The bits from most significant to least significant are J,K,0,J,K,0,0,0. J and K are code violations.
Access Control(AC) this byte field consists of the following bits from most significant to least significant bit order: P,P,P,T,M,R,R,R. The P bits are priority bits, T is the token bit which when set specifies that this is a token frame, M is the monitor bit which is set by the Active Monitor (AM) station when it sees this frame, and R bits are reserved bits.
![Page 36: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/36.jpg)
Frame Control(FC) a one byte field that contains bits describing the data portion of the frame contents which indicates whether the frame contains data or control information. In control frames, this byte specifies the type of control information.
Frame type – 01 indicates LLC frame IEEE 802.2 (data) and ignore control bits; 00 indicates MAC frame and control bits indicate the type of MAC control frame
+ Bits 0–1 Bits 2–7
0 Frame type Control Bits
![Page 37: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/37.jpg)
Destination address (DA) a six byte field used to specify the destination(s) physical address .
Source address(SA) Contains physical address of sending station . It is six byte field that is either the local assigned address (LAA) or universally assigned address (UAA) of the sending station adapter.
Data a variable length field of 0 or more bytes, the maximum allowable size depending on ring speed containing MAC management data or upper layer information.Maximum length of 4500 bytes.
Frame Check Sequence a four byte field used to store the calculation of a CRC for frame integrity verification by the receiver.
![Page 38: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/38.jpg)
Ending Delimiter(ED) The counterpart to the starting delimiter, this field marks the end of the frame and consists of the following bits from most significant to least significant: J,K,1,J,K,1,I,E. I is the intermediate frame bit and E is the error bit.
Frame Status(FS)a one byte field used as a primitive acknowledgement scheme on whether the frame was recognized and copied by its intended receiver.
A = 1, Address recognized C = 1, Frame copied
A C 0 0 A C 0 0
1 bit 1 bit 1 bit 1 bit 1 bit 1 bit 1 bit 1 bit
![Page 39: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/39.jpg)
TOKEN FRAME
Abort Frame
Used to abort transmission by the sending station
Start Delimiter Access Control End Delimiter
8 bits 8 bits 8 bits
SD ED
8 bits 8 bits
![Page 40: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/40.jpg)
Empty information frames are continuously circulated on the ring.
When a computer has a message to send, it inserts a token in an empty frame (this may consist of simply changing a 0 to a 1 in the token bit part of the frame) and inserts a message and a destination identifier in the frame.
The frame is then examined by each successive workstation. The workstation that identifies itself to be the destination for the message copies it from the frame and changes the token back to 0.
Data Transmission
![Page 41: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/41.jpg)
When the frame gets back to the originator, it sees that the token has been changed to 0 and that the message has been copied and received. It removes the message from the frame.
The frame continues to circulate as an "empty" frame, ready to be taken by a workstation when it has a message to send.
![Page 42: Ethernet and token ring](https://reader033.vdocuments.net/reader033/viewer/2022050804/54be6afc4a7959ca468b4575/html5/thumbnails/42.jpg)
Thank You