OTHER
TECHNOLOGIES &
NETWORK
ARCHITECTURE
SESSION 7
OBJECTIVES
Token Ring
Fiber Distributed data interface (FDDI)
VG AnyLAN
Asynchronous Transfer Mode (ATM)
AppleTalk
Local Talk
ARC net
Token Ring
IBM introduced the Token Ring network structure in
1985.
Token ring supports all kinds of operating system and
hardware.
This particular form of networking has two physically
separate wiring hubs.
The computers or other resources are connected to the
hub through Unshielded Twisted Pair (UTP) cables.
Multiple hubs are connected to each other through
fibre optic cables that stretch to a maximum length.
Coaxial cables can also be used to connect
multiple computers in a token ring fashion with
the help of
D-connectors.
Token ring network gets its name from this
method of transmission of information from a
node to another.
The data flows from one node to another in the
form of a circle.
The wiring is a combination of star and ring
topology
Token ring ensures that only one node transmits
at any given point and also gives each node an
equal chance to transmit data.
They are capable of transferring data at either 4
Mbps or 16 Mbps depending on the networking
components like the cable MAUs (Multi-station
Access Units) etc.
Speeds up to 32MB can be supported by Token
ring by simultaneously transmitting and
receiving.
Secondly if a cable is broken it results in the
break down of the total network.
Working of Token-Ring network
A special packet called the token is constantly
passed through the ring.
This token is nothing but a single bit of data.
The token is circulated in only one direction
around the ring.
Any computer that wants to send a packet of
data has to take the token first.
When the token is taken the computer inverts
the token bit in the token packet making it
unavailable to other computers which wants to
send the data packet.
This way there is no possibility of a collision.
The data is then put onto the ring and circulated.
It moves from one computer in the ring to another.
The data frame sent contains the sender and
destination's addresses.
Each node on the ring checks the destination address
of this data frame.
In case it is not addressed to them the data packet is
passed to the next computer in the ring.
When the data reaches its destination the recipient
copies the information and adds a flag to the end of the
frame so that the sender knows that it was received.
Nodes in the Token Ring network monitor each
other for reliability.
The first computer who monitors in such a
setup is called the Active Monitor and the rest of
the computers are called Passive Monitors.
The function of a passive monitor is to monitor
its nearest upstream neighbour.
In case an error occurs the computer broadcasts
a packet indicating the error.
Nodes in a network can automatically remove
packets sent by a computer that is having a
problem.
The NICs of all systems respond to packets by
running self-tests and removing themselves from
the network when not required.
Network Token Ring
Cable STP/UTP/Fibre optic
Physical topology Star
Logical topology Ring
Speed (Mbps) 4 -16 Mbps
Fiber Distributed Data Interface
(FDDI)
FDDI was initiated by American National
Standards Institute (ANSI).
The FDDI networks are high-speed, long-
distance and highly reliable networks
FDDI also works partly with a method similar
to token passing and can provide a backbone
network capability at 100 Mbps speed.
The logical topology for FDDI is a ring but the
physical topology can either be a star or a ring.
FDDI is a dual ring network which uses the
token passing scheme.
This type of network is wired with two rings
Primary Ring
This ring is used for normal networks.
Secondary Ring
This ring is used when failure is detected.
It compensates for the failure of Primary ring by being
used in the opposite direction.
The major difference between Token Ring and FDDI
is that when a data frame is transmitted a FDDI token
is attached at the end of the transmitting data frame
It differs in two ways:
The sending machine places a new token on to the network
after transmitting the data frame
A computer on an FDDI network can transmit as many
frames as it can produce within a predetermined amount of
time before the token must be released.
Both these factors improve throughput by reducing
delays.
FDDI can use dual counter-rotating rings to protect
against media failure.
VG AnyLAN
To overcome the limited bandwidth offered by
older LAN systems this new technology has
been developed by a group of companies
including HP.
It is known as 100VGAnyLAN 100 or
AnyLAN.
VGAnyLAN provides the following features:
It uses 100 Mbps bandwidth.
It uses voice grade (VG) copper wiring.
Fiber optic cable can also be used.
It supports both Ethernet and token ring frames
(not simultaneously). This allows it to connect to
existing networks during the upgrade process.
It uses Demand Priority access method to
provide two levels of priority known as high and
low.
Asynchronous Transfer Mode (ATM)
ATM allows the transport of voice data and video over the same
network link.
The data moving through an ATM network is broken down into
small fixed-length 53 byte cells.
Each of these cells are labeled with a destination address
Information is divided by ATM into 53-byte cells each
containing 48 bytes of data and 5 bytes of header information
(address information).
It is highly versatile and can be used for both LAN and WAN
systems and makes it a desirable system.
It can use a variety of media including twisted-pair and fiber
optic cable.
Advantages
ATM's are excellent for connecting LANs.
They have extremely high speeds.
Disadvantages
It is not widely available.
They are extremely expensive.
Many applications don't require high speeds.
AppleTalk
Every Apple Macintosh computer's have a built in
hardware interface which makes this technology very
cheap.
Every Mac OS computer includes AppleTalk hardware
and software which is largely transparent to users.
So if your application needs to communicate with other
Mac OS computers you may want to use an AppleTalk
protocol.
http://www.cs.mu.oz.au/appletalk/
Local Talk
A proprietary Apple Data Link Layer protocol it was
developed to avoid collisions on small networks.
It uses CSMA/CA (Carrier Sense Multiple Access with
Collision Avoidance) access method.
Each machine first signals its intention to transmit data
before any actual data transmission.
Once all the stations have seen the signal it then
transmits its data.
This makes the system relatively slow at 230 Kbps due
to which it was not used in large networks.
ARC net
ARCnet denotes 'Attached Resource Computer
network'.
Developed by a company called the Datapoint
Corporation in the 70s it was made
commercially available in the early 80s.
ARCnet's simple cheap and robust technology
incorporates automatic reconfiguration to
overcome a myriad or network faults.
For example disconnected devices.
It is a very economical uncomplicated and
vigorous technology.
However the popularity of ARCnet slipped
down once a much faster Ethernet system was
developed.
ARCnet is used with a star or bus physical
topology.
The media access system relies on token passing
using logical bus.
However this technology is rarely installed today
because other systems provide better bandwidth
other than that it also has some installation
complexities.
ARCnet Components
Active hubs
Active hubs regenerate signals and therefore require
a power supply.
Active hubs normally provide eight ports and can be
connected to passive hubs workstations or other
active hubs.
Servers ideally should be connected to an active hub.
Usually one should terminate all unused ports with
93-Ohm terminator.
Passive hubs
Passive hubs usually provide four ports for
workstation connection.
However unlike active hubs they cannot be
connected to other passive hubs as they provide no
regeneration.
This makes the signal too weak due the process of
attenuation.
Usually one should terminate all unused ports with
93-Ohm terminator.