IEEE11
IEEE11
Adopted by IEEE
Now called IEEE 802.3
– 802.3 was backed by Xerox, 802.4 by General Motors
and 802.5 by IBM.
a) IEEE 802.3 Ethernet LANs
– The MAC layer uses CSMA/CD (Carrier Sense Multiple
Access with Collision Detection) technology.
– When a computer wants to transmit a frame it:
• Listens for a frame on the cable, if busy, the computer waits for a
random time and attempts transmission again. This is known as
Carrier Sense.
• If the cable is quiet, the computer begins to transmit.
• Two computers could transmit at the same time. To prevent this
happening, the transmitting computer listens to what it is
sending.
• If what it hears is different to what it is sending, then a collision
has occurred. This is known as Collision Detection.
a) IEEE 802.3 Ethernet LANs
– When a computer wants to receive a frame it:
• Listens to all frames traveling on the cable.
• If the frame address is the same as the computer’s address or the
same as the group address of the computers of which it is a
member, it copies the frame from the cable.
• Otherwise it just ignores the frame.
• Note: Ethernet LAN is a broadcast network. It is possible to
– Unicast a frame from one computer to any other computer
connected to the same cable.
– Broadcast a frame from one computer to all other computers
connected to the same cable.
– Multicast a frame from one computer to a subset of the computers
connected to the same cable.
10 F
Bytes 7 1 2 or 6 2 or 6 2 0 – 1500 0 – 46 4
Preamble Start of
Destination Source Length of
7 bytes Frame Data Pad Checksum
Address Address Data Field
10101010 Delimiter
Advantages of Thinnet
b) Cheap
c) Easy to install
d) Flexible
e) Light weight
Disadvantages
i) Shorter range (185 meters)
j) Smaller capacity (few stations/Segments)
Figure 12-12
Disadvantages
j) Shorter range (100 meters)
k) Extra cost of Hub
Ethernet Cabling
Cable topologies. (a) Linear, (b) Spine, (c) Tree, (d) Segmented.
Figure 12-14
T4-
b) 4 pairs of Cat-3 (2-pairs bidirectional, 2 unidirectional)
c) 33.66 Mbps on each
d) Encoding 8B/6T
e) Length <100ms
TX-
g) 2 pairs of Cat 5 (1- S to H 2 -H to S)
h) Encoding 4B/5B
i) Signaling NRZ-I
j) Length <100ms
FX-
l) 2 fibers are used
m) Encoding 4B/5B
n) Signaling NRZ-I
o) Length <2000ms
Gigabit Ethernet
Token Bus
IEEE 802.4
IEEE 802.4
a) Physical Bus and logical ring
b) Application in factory automation
* Real time (no collision)
* Minimum delay
5. Each station knowing the address of station on left and right
6. When initialized, the highest no station may send first frame and after
sending, it passes the special frame called token to neighbor
7. No collisions
8. Physical order/location of the station does not matter
9. All stations will receive frame and if does not belong to them, discard it
10. Four priority classes are maintained internally (0,2,4,6)
11. MAC protocol is more complex (more timers and internal state variables
need to be maintained)
Physical layer
1. 75 ohm broadband coaxial cable
2. Modulation used: Phase continuous FSK
Phase Coherent FSK
Multilevel duobinary AM-PSK
3. Speed: 1,5 and 10 Mbps
Five times
than 802.3
IEEE 802.4
Frame control
To distinguish between data and control frames
For data frames it carries:
Frame priority and Indicator (telling the receiver to ACK
correct or incorrect receipt)
For control frames it carries:
Frame Type:
• Token passing
• Various Ring Maintenance Frame
• Mechanisms for letting new stations to enter/leave the ring
IEEE 802.5
Token Ring
a) 802.5 Token Ring LANs
– A Token Ring LAN consists of a collection of ring
interfaces connected by point-to-point lines.
Ring
interface
Unidirectional
Ring – One Way
Computers
a) IEEE 802.5 Token Ring LANs
– The MAC sub layer uses Token Ring Technology.
– In a Token Ring LAN, a special bit pattern called the
token circulates around the ring whenever all computers
are idle.
– When a computer wants to transmit:
• It waits for the token to arrive.
• When it arrives, it removes the token from the ring. There is only
one token so only one computer can transmit at any one time.
• The computer can now transmit its frame on its output link for
token holding time.
• This frame will now propagate around the ring until it arrives
back at the sender who removes the frame from the ring.
• The sender then regenerates the token and passes it to the next
computer (restarting the above steps).
a) IEEE 802.5 Token Ring LANs
–A computer removing the token, eliminates the
possibility of collisions.
– Removal of the token is done by inverting a bit in the 3
byte token. Inverting this bit converts the token into the
first 3 bytes of a normal data frame.
b) Interface power
– From ring
– From external source
c) Priorities are maintained
d) Monitor station will manage the ring
Wire Centre (star shaped ring)
Figure 12-16
Token Ring Frame
Physical Layer:
Encoding: Differential Manchester Encoding
Data rate: 1,4 and 16 Mbps
Addressing : 6 byte NIC
Frame Control
Claim_token: To become monitor when ring initialized
Orphan frame: If monitor bit is set
Beacon: To check if neighbor is dead
Purge: Reinitialize the ring
Upstream for
A