0% found this document useful (0 votes)
61 views1 page

Networking I Lesson 33

The document provides an overview of networking lesson 33 which covers network architecture standards and Ethernet specifications. It defines key terms and concepts related to network architecture criteria, IEEE 802.3 Ethernet standards, CSMA/CD access method, and differences between IEEE 802.3 and 802.3i. The lesson objectives are to understand the criteria for reliable network architecture, standards for physical and data link layers, how CSMA/CD performs collision detection and handles packet errors, and differences in cable types for IEEE Ethernet standards.

Uploaded by

Andy Zan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
61 views1 page

Networking I Lesson 33

The document provides an overview of networking lesson 33 which covers network architecture standards and Ethernet specifications. It defines key terms and concepts related to network architecture criteria, IEEE 802.3 Ethernet standards, CSMA/CD access method, and differences between IEEE 802.3 and 802.3i. The lesson objectives are to understand the criteria for reliable network architecture, standards for physical and data link layers, how CSMA/CD performs collision detection and handles packet errors, and differences in cable types for IEEE Ethernet standards.

Uploaded by

Andy Zan
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

Networking I Lesson 33

Student Objectives: After completing this lesson, students will be able to: list the criteria that all network architecture must meet explain the standards established by IEE 802.3 describe CSMA/CD list the functions of CSMA/CD explain what happens to data packets containing errors evaluate how network architecture affects topology describe IEEE 802.3 compare and contrast IEEE 802.3 with IEEE 802.3I

Terms: access method - the way in which network devices access the network medium (regulatory mechanism) IEEE 802.3 - defines implementation of physical layer & MAC sublayer (Ethernet) CSMA/CD - Carrier Sense Multiple Access Collision Detect (access method of this course) devices ready to transmit first check the channel for a carrier - if none is detected for a specific time then the device can transmit connectionless network - describes data transfer without existence of a virtual circuit (no guarantee the data sent was received- or in what condition it was received) baseband - a single signal is transmitted on a cable 10BaseT- (10 signifies 10 Mbits, base means the type of signaling used is baseband, and T means twisted pair) spec using 2 pair of twisted cable - 1 for transmitting data and 1 for receiving 10 Mbs per second - used in star and extended star topology Lesson Summary: all network architecture must meet the criteria of reliability, modularity, connectivity, ease of use, ease of modification and ease of implementation: reliable - muse provide a means of error detection and facilities to correct the error modularity - must be able to use a relatively small variety of mass produced building blocks in a broad assortment of network devices connectivity - incorporate a variety of products in such a way that interoperability isn a problem t ease of use - perform in such a way that users need have no concern for or knowledge of network structure, etc., in order to take advantage of network ease of modification - network must evolve and adapt as needs change or new technologies emerge ease of implementation - must allow for the installation of a variety of configuration that meet the needs of network users CSMA/CD used in Ethernet performs 3 functions: transmitting and receiving data packets decoding data packets and checking them for valid addresses - before passing them to outer layers detecting errors within data packets network devices can tell if a collision occurs because the network signal doubles if data packets are damaged, the data packet is discarded but the destination device does not notify the source if the data was received in good condition a connectionless system is a best effort delivery system - it doesn use a sophisticated acknowledgment system to t guarantee reliable delivery token passing - used in token ring architecture - a token is passed in a single direction around a ring, unless a device has the token it cannot transmit IEEE 802.3 originally specified coaxial for bus, in 1990 802.3i was issued, specifying Ethernet type signaling over twisted pair cables (10BaseT)

You might also like