Вы находитесь на странице: 1из 28

Network Sizes and IEEE 802.

X
standards
IEEE 802.X Standards
• The Institute of Electrical and Electronics Engineers (IEEE) has
developed a series of networking standards to ensure that
networking technologies developed by manufacturers are
compatible.
• These standards describe the cabling, physical topology,
electrical topology and access schemes of network products.
• These standards describe the protocols used in the lower two
layers of the OSI model:
1. Physical layer
2. Data link layer.
They don’t go above those layers.
• The committee structure of the IEEE is
numbered like the decimal system.
• The general committee working on these
standards is 802.
• Various subcommittees, designed by decimal
numbers, have worked on different version of
the standards.
IEEE 802.X standards
IEEE 802.5
• The IEEE 802.5 standard specifies the
characteristics for Token Ring networks.
• Token Ring was introduced by IBM in the mid-
1980s.
What is token ring LAN?
• Token ring LAN technology is a local area network
protocol which resides at the data link layer (DLL) of
the OSI model.
• Stations on a token ring LAN are logically organized in a
ring topology with data being transmitted sequentially
from one ring station to the next with a token
travelling around the ring.
• This standard describes a token passing protocol which
means that a machine can only use the network when
it has control of the “token”
• This ensures that there are no collisions because only
one machine can use the network at any given time.
• Token ring protocol uses a special three-byte
frame called a token that travels around the
ring.
• Token ring frames travel completely around
the loop.
• Stations that have data frames to transmit
must first acquire the token before they can
transmit data frames.
• When no station is transmitting a data frame, a
token frame circles the loop.
• This token frame is repeated from station to
station until arriving at a station that needs to
transmit data.
• When a station needs to transmit data, it first has
to capture the free Token and replace the data
with its own message.
• Once the sending station receives its data frame,
it converts the frame back into a token.
• On 4 Mbit/s Token Ring, only one token may
circulate; on 16 Mbit/s Token Ring, there may be
multiple tokens.
Operation of Token Ring
• At the start, a free Token is circulating on the
ring.
• If machine 1 wants to send some data to
machine 4, so it first has to capture the free
Token.
• It then writes its data and the recipient's
address onto the Token (represented by the
yellow flashing screen).
• The packet of data is then sent to machine 2 who
reads the address, realizes it is not its own, so
passes it on to machine 3.
• Machine 3 does the same and passes the Token
on to machine 4.
• This time it is the correct address and so number
4 reads the message (represented by the yellow
flashing screen).
• Machine 4 cannot, however, release a free Token
on to the ring, it must first send the message
back to number 1 with an acknowledgement to
say that it has received the data (represented by
the purple flashing screen).
• The receipt is then sent to machine 5 who
checks the address, realizes that it is not its
own and so forwards it on to the next
machine in the ring, number 6.
• Machine 6 does the same and forwards the
data to number 1, who sent the original
message.
• Machine 1 recognizes the address, reads the
acknowledgement from number 4
(represented by the purple flashing screen)
and then releases the free Token back on to
the ring ready for the next machine to use.
• That's the basics of Token Ring and it shows
how data is sent, received and acknowledged.
• The following is a list of the specific characteristics
specified in the 802.5 standard:
• Speed: The 802.5 Token Ring specifies network speeds
of 4 and 16Mbps.
• Topology: Token Ring networks use a logical ring
topology and most often a physical star.
• Media: Token Ring networks use unshielded twisted
pair cabling or shielded twisted pair.
• Access method: 802.5 specify an access method
known as token passing.. The token travels around the
network looking for computers with data to send. The
computer's data is passed along with the token until it
gets to the destination computer at which point, the
data is removed from the token and the empty token
placed back on the ring.
802.3 IEEE Standard
• The IEEE 802.3 standard defines the characteristics for
Ethernet networks.
• The Ethernet specification served as the basis for the
IEEE 802.3 standard
• What is an Ethernet?
• A LAN architecture or telecommunications networking
protocol introduced by Xerox Corp. in 1979.
• It was developed as an inexpensive way of sending
information quickly between offices machines
connected together in a single room or building.
• The original data rate of 10 megabits per second has
been increased to 100 megabits per second for a new
standard known as fast Ethernet.
IEEE 802.3
• Ethernet is defined in a number of IEEE 802.3
standards. These standards define the physical and
data-link layer specifications for Ethernet. The most
important 802.3 standards are
• 10Base-T (IEEE 802.3) – 10 Mbps with category 3
unshielded twisted pair (UTP) wiring, up to 100
meters long.
• 100Base-TX (IEEE 802.3u) – known as Fast Ethernet,
uses category 5, 5E, or 6 UTP wiring, up to 100
meters long.
IEEE 802.3
• 100Base-FX (IEEE 802.3u) – a version of Fast Ethernet that
uses multi-mode optical fiber. Up to 412 meters long.
• 1000Base-CX (IEEE 802.3z) – uses copper twisted-pair
cabling. Up to 25 meters long.
• 1000Base-T (IEEE 802.3ab) – Gigabit Ethernet that uses
Category 5 UTP wiring. Up to 100 meters long.
• 1000Base-SX (IEEE 802.3z) – 1 Gigabit Ethernet running
over multimode fiber-optic cable.
• 1000Base-LX (IEEE 802.3z) – 1 Gigabit Ethernet running
over single-mode fiber.
• 10GBase-T (802.3.an) – 10 Gbps connections over category
5e, 6, and 7 UTP cables.
Cisco three-layer hierarchical model
• Networks can be extremely complicated, with multiple
protocols and diverse technologies.
• Cisco has developed a layered hierarchical model for
designing a reliable network infrastructure.
• Three-layer model helps you design, implement, and maintain
a scalable, reliable, and cost-effective network.
• Each of layers has its own features and functionality, which
reduces network complexity.
Cisco three-layer hierarchical
model
Cisco three-layer hierarchical model
• Access –This layer usually incorporates Layer 2 switches and access
points that provide connectivity between workstations and servers. You
can manage access control and policy, create separate collision
domains, and implement port security at this layer
• Distribution – serves as the communication point between the access
layer and the core. Its primary functions is to provide routing, filtering,
and WAN access and to determine how packets can access the core.
This layer determines the fastest way that network service requests are
accessed – for example, how a file request is forwarded to a server –
and, if necessary, forwards the request to the core layer. This layer
usually consists of routers and multilayer switches
• Core – also referred to as the network backbone, this layer is
responsible for transporting large amounts of traffic quickly. The core
layer provides interconnectivity between distribution layer devices it
usually consists of high speed devices, like high end routers and
switches with redundant links.
Network sizes
Network Type
Network Types
• LAN, MAN and WAN are the three major types of the network
designed to operate over the area they cover.
• There are some similarities and dissimilarities between them.
One of the major differences is the geographical area they cover
• LAN covers the smallest area; MAN covers an area larger than
LAN and WAN comprises the largest of all.
• There are other types of Computer Networks also, like :
– PAN (Personal Area Network)
– SAN (Storage Area Network)
– EPN (Enterprise Private Network)
– VPN (Virtual Private Network)
Local Area Network (LAN)
• LAN or Local Area Network connects network devices in such a way
that personal computer and workstations can share data, tools and
programs.
• Group of computers and devices are connected together by a
switch, or stack of switches, using a private addressing scheme as
defined by the TCP/IP protocol.
• Private addresses are unique in relation to other computers on the
local network. Routers are found at the boundary of a LAN,
connecting them to the larger WAN.
• Data transmits at a very fast rate as the number of computers
linked are limited. By definition, the connections must be high
speed and relatively inexpensive hardware (Such as hubs, network
adapters and Ethernet cables).
Local Area Network (LAN)
• LANs cover smaller geographical area (Size is limited to a few kilometers)
and are privately owned. One can use it for an office building, home,
hospital, schools, etc. LAN is easy to design and maintain.
• Communication medium used for LAN has twisted pair cables and
coaxial cables. It covers a short distance, and so the error and noise are
minimized.
• Today, speeds are normally 100 or 1000 Mbps. Propagation delay is very
short in a LAN. The smallest LAN may only use two computers, while
larger LANs can accommodate thousands of computers.

LAN
• A LAN typically relies mostly on wired
connections for increased speed and security,
but wireless connections can also be part of a
LAN.
• Fault tolerance of a LAN is more and there is less
congestion in this network.
• For example : A bunch of students playing
Counter Strike in the same room (without
internet).
Metropolitan Area Network
(MAN)
• MAN or Metropolitan area Network covers a larger area than that of a
LAN and smaller area as compared to WAN. It connects two or more
computers that are apart but resides in the same or different cities. It
covers a large geographical area and may serve as an ISP (Internet Service
Provider).
• The fault tolerance of a MAN is less and also there is more congestion in
the network. It is costly and may or may not be owned by a single
organization.
• Data transfer rate and the propagation delay of MAN is moderate. Devices
used for transmission of data through MAN are: Modem and Wire/Cable.
Examples of a MAN are the part of the telephone company network that
can provide a high-speed DSL line to the customer or the cable TV
network in a city.
Wide Area Network (WAN)
• WAN or Wide Area Network is a computer network that extends over a large
geographical area, although it might be confined within the bounds of a state
or country.
• WAN could be a connection of LAN connecting to other LAN’s via telephone
lines and radio waves and may be limited to an enterprise (a corporation or an
organization) or accessible to the public. The technology is high speed and
relatively expensive.
• WAN is difficult to design and maintain. Similar to a MAN, the fault tolerance of
a WAN is less and there is more congestion in the network.
• A Communication medium used for WAN is optical fiber or Satellite Link. Due to
long distance transmission, the noise and error tend to be more in WAN.
• Propagation delay is one of the biggest problems faced here. Devices used for
transmission of data through WAN are: Optic wires, Microwaves and Satellites.
Thank you

Вам также может понравиться