Computer Network - Chapter 6
Computer Network - Chapter 6
4
Demand Priority Access Method
• It is a relatively new access method designed for the 100-Mbps
Ethernet standard known as 100VG-AnyLAN.
• It has been sanctioned and standardized by the Institute of
Electrical and Electronic Engineers (IEEE) in its 802.12
specification.
• This access method is based on the fact that repeaters and end
nodes are the two components that make up all 100VG-AnyLAN
networks.
• The repeaters manage network access by doing round-robin
searches for requests to send from all nodes on the network.
• The repeater, or hub, is responsible for noting all addresses,
links, and end nodes and verifying that they are all functioning.
• According to the 100VG-AnyLAN definition, an end node can be a
computer, bridge, router, or switch.
• If the hub or repeater receives two requests at the same time,
the highest priority request is serviced first. If the two requests
are of the same priority, both requests are serviced by
alternating between the two.
5
Ethernet
• Ethernet has become the most popular media access method
to the desktop computer and is used in both small and large
network environments.
• Ethernet is a nonproprietary industry standard that has found
wide acceptance by network hardware manufacturers.
• The original version of Ethernet was designed as a system of
2.94 megabits per second (Mbps) to connect over 100
computers on a 1-kilometer cable.
• Xerox Ethernet was so successful that Xerox, Intel Corporation,
and Digital Equipment Corporation drew up a standard for a 10-
Mbps Ethernet.
• Today, the 10-Mbps Ethernet is one of several specifications
describing methods for computers and data systems to connect
and share cabling.
6
Ethernet Specifications
• In 1978, the International Organization for Standardization (ISO)
released a set of specifications for connecting dissimilar devices.
• This set of standards is referred to as the OSI reference model
(OSI stands for Open Systems Interconnection).
• The Ethernet specification performs the same functions as the
OSI physical and data-link layers of this model. In the 1980s the
IEEE published Project 802.
• This project generated standards for design and compatibility
for hardware components that operated within the OSI physical
and data-link layers.
• The standard that pertains to Ethernet is the IEEE 802.3
specification.
7
Ethernet Features
• Ethernet is currently the most popular network architecture.
Ethernet breaks data down into frames. A frame is a package of
information transmitted as a single unit.
The 10-Mbps IEEE Standards
10BaseT (Twisted pair cable, 100 m)
10Base2 (Thin coaxial cable, 185 m)
10Base5 (Thick coaxial cable, 500 m)
10BaseF (Fiber optics cable, 2000 m)
10BaseT Standard
• In 1990, the IEEE committee published the 802.3 specification
for running Ethernet over twisted-pair wiring.
• 10BaseT (10 Mbps, baseband, over twisted-pair cable) uses
unshielded twisted-pair (UTP) cable to connect computers.
• The maximum length of a 10BaseT segment is 100 meters.
Repeaters can be used to extend this maximum cable length. 8
10Base2 Standard
• Is given this name in IEEE 802.3 specification because it
transmits at 10 Mbps over a baseband wire and can carry a
signal about two times 100 meters.
• This type of network uses thin coaxial cable, or thinnet, which
has a maximum segment length of 185 meters.
10Base5 Standard
• The IEEE specification for this topology is 10 Mbps, baseband,
and 500-meter (five 100-meters) segments.
• It is also called standard Ethernet. This topology makes use of
thick coaxial cable.
10BaseFL Standard
• The IEEE committee published a specification for running
Ethernet over fiber-optic cable.
• The result, 10BaseF (10Mbps, baseband, over fiber-optic cable)
is an Ethernet network that typically uses fiber-optic cable to
connect computers and repeaters.
9
100BaseX Ethernet Standard
• This standard, sometimes called Fast Ethernet, is an extension
of the existing Ethernet standard.
• It runs on UTP Category 5 data-grade cable and uses CSMA/CD
in a star-wired bus topology, similar to 10BaseT where all
cables are attached to a hub.
100BaseX incorporates three media specifications:
100BaseT4 (Category 3, 4, or 5 UTP, 100 m)
100BaseTX (Category 5 UTP or STP, 100 m)
100BaseFX (fiber-optic cable, 2000 m)
1000BaseX Ethernet Standard
• This standard, sometimes called Gigabit Ethernet, is an
extension of the existing Ethernet standard.
• Recent need for an even higher data rate resulted in the design
of the Gigabit Ethernet protocol (1000 Mbps).
1000Base-SX (fiber-optic cable 550 m)
1000Base-LX(fiber-optic cable 5000 m)
1000Base-CX (2 pairs of STP, 25 m)
1000Base-T (4 pairs of UTP, 100 m) 10
10 Mbps Ethernet cabling
11
Token Ring
• A Token Ring network is an implementation of IEEE standard
802.5.
• Their token-passing ring access method, more than their physical
cable layout, distinguishes Token Ring networks from other
networks.
• It uses token passing medium access control protocol.
• The token travels around the ring polling each computer until one
of the computers signals that it wants to transmit data and takes
control of the token.
• A computer cannot transmit unless it has possession of the token;
while the token is in use by a computer, no other computer can
transmit data.
• The frame proceeds around the ring until it reaches the computer
with the address that matches the destination address in the
frame.
• The destination computer copies the frame into its receive buffer
and marks the frame in the frame status field to indicate that the
information was received.
12
• The frame continues around the ring until it arrives at the
sending computer, where the transmission is acknowledged as
successful.
• The sending computer then removes the frame from the ring
and transmits a new token back on the ring.
Token Bus
• The stations on the bus form a logical ring, i.e., the stations are
assigned logical positions in an ordered sequence, with the last
member followed by the first.
• The physical ordering of the stations on the bus is irrelevant
and independent of the logical ordering; it has ring logical
topology and bus physical topology.
• It uses token passing medium access control protocol.
13