Sie sind auf Seite 1von 11

A.

INTRODUCTION

Local Area Network (LAN) is a data communications network connecting terminals, computers and printers within a building or other geographically limited areas. These devices could be connected through wired cables or wireless links. Ethernet, Token Ring and Wireless LAN using IEEE 802.11 are examples of standard LAN technologies. LANs are traditionally used to connect a group of people who are in the same local area. However, the working group are becoming more geographically distributed in today's working environment. There, virtual LAN (VLAN) technologies are defined for people in different places to share the same networking resource. LAN technology are important for necessary for connecting between the world with human nowadays. LAN technology also depends on the geographically areas such as small or big company. So, what are LAN technology that suitable building in the company. There are have two options which LAN technology that can be deployed in the company. Here, i will explain about two of LAN technology. There are Ethernet and Token Ring. I will discussion that LAN technology about overview, the implementation the technology, advantages and disadvantages and comparison this LAN technology.

B. LAN TECHNOLOGY a. Ethernet i. Overview The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. Three data rates are currently defined for operation over optical fiber and twisted-pair cables: 10BASE-T Ethernet delivers performance of up to 10 Mbps over twisted-pair copper cable.

Fast Ethernet delivers a speed increase of ten times the 10BASE-T Ethernet specification (100 Mbps) while retaining many of Ethernets technical specifications. These similarities enable organizations to use 10BASE-T applications and network management tools on Fast Ethernet networks.

Gigabit Ethernet extends the Ethernet protocol even further, increasing speed tenfold over Fast Ethernet to 1000 Mbps, or 1 Gbps. Because it is based upon the current Ethernet standard and compatible with the installed base of Ethernet and Fast Ethernet switches and routers, network managers can support Gigabit Ethernet without needing to retrain or learn a new technology.

10 Gigabit Ethernet , ratified as a standard in June 2002, is an even faster version of Ethernet. It uses the IEEE 802.3 Ethernet media access control (MAC) protocol, the IEEE 802.3 Ethernet frame format, and the IEEE 802.3 frame size. Because 10 Gigabit Ethernet is a type of Ethernet, it can support intelligent Ethernet-based network services, interoperate with existing architectures, and minimize users learning curves. Its high data rate of 10 Gbps makes it a good solution to deliver high bandwidth in wide-area networks (WANs) and metropolitan-area networks (MANs).

Fast Ethernet (100 Mbps) and Gigabit Ethernet (1000 Mbps) are nextgeneration technologies that are supplanting the installed base of traditional 10Mb Ethernet.

ii. The implementation of Ethernet technology Ethernet technology can be implementation on many topological configurations configuration, but the problem that their size or complexity, all will be a combination of only three basic interconnection structures or network building blocks.

The simplest structure is the point-to-point interconnection, shown in Figure 1. Only two network units are involved, and the connection may be DTE-to-DTE, DTE-to-DCE, or DCE-to-DCE. The cable in point-topoint interconnections is known as a network link. The maximum allowable length of the link depends on the type of cable and the transmission method that is used.

Figure 1 point-to-point interconnection

Ethernet networks also can be implemented with a coaxial bus structure, as shown in Figure 2. Segment lengths were limited to 500 meters, and up to 100 stations could be connected to a single segment. Individual segments could be interconnected with repeaters, as long as multiple paths did not exist between any two stations on the network and the number of DTEs did not exceed 1024. The total path distance between the most-distant pair of stations was also not allowed to exceed a maximum prescribed value.

Figure 2 Coaxial Bus topology

iii. The advantages and disadvantages of Ethernet technology The advantages of using Ethernet technology are conceptually simple. It is because, Ethernet is simply daisy-chained together with coax cable and "T" adapters. There are usually no hubs, transcievers, or other devices used. Then Ethernet also given advantages that there are relatively inexpensive. Due to the simplicity inherent in the design of Ethernet, it can be an inexpensive technology to implement to many company or building. Noise immunity are the advantages of Ethernet technology that can be deployed in company. The coaxial cable used in a Ethernet network is very well shielded, and has a very high immunity from electrical noise caused by outside sources.

The disadvantage of using Ethernet technologies are difficult to change. It is caused by reconfiguring a Ethernet is somewhat difficult to do once it is in place. Any changes to the network will result in at least some "down time," as the bus must be broken and a new section spliced in at the point of the break. Fault Intolerant also give the effect to Ethernet technologies because if any device or cable section attached to the network fails, it will most likely make the entire network go down. Ethernet technology are difficult troubleshooting. It is caused by Ethernet networks are very difficult to troubleshoot. There is no easy way to determine what node or cable section is causing a problem, and the network must be troubleshot by a "process of elimination." This can be very time consuming. Specialized Cable. The RG-58A/U coaxial cable used in Ethernet networks can not be used for any other purpose. In the event that the network is changed to another type, then the cable will have to be replaced.

b. Token Ring i. Overview According to article, the Token Ring network was originally developed by IBM in the 1970s. It is still IBM's primary local-area network (LAN) technology. The related IEEE 802.5 specification is almost identical to and completely compatible with IBM's Token Ring network. In fact, the IEEE 802.5 specification was modeled after IBM Token Ring, and it continues to shadow IBM's Token Ring development. The term Token Ring generally is used to refer to both IBM's Token Ring network and IEEE 802.5 networks. This article addresses both Token Ring and IEEE 802.5.

A token ring network consists of a set of nodes connected in a ring. The ring is a single shared medium. The token ring technology involves a distributed algorithm that controls when each node is allowed to transmit. All nodes see all frames, and the node identified as the destination in the frame header saves a copy of the frame as it flows past. With a ring topology, any link or node failure would render the whole network useless. This problem can be solved by using a star topology where nodes are connected to a token ring hub. The hub acts as a relay, known as a multistation access unit (MSAU). MSAUs are almost always used because of the need for robustness and ease of node addition and removal. The token, which is just a special sequence of bits, circulates around the ring; each node receives and then forwards the token. When a node that has a frame to transmit sees the token, it takes the token off the ring and instead inserts its frame into the ring. When the frame makes its way back around to the sender, this node strips its frame off the ring and reinserts the token. The token holding time (THT) is the time a given node is allowed to hold the token. From its definition, the THT has an effect on

the utilization and fairness of the network, where utilization is the measure of the bandwidth used versus that available on the given ring.

ii. The implementation of Token Ring technology In Token Ring systems, like Ethernet, use a shared media technology. Multiple stations attach to a network and share the bandwidth. Token can be implementation in 2 two ways, which in bandwidth 4Mbps and 16Mbps. Token Ring supports two bandwidth options 4 Mbps and 16 Mbps. Token Ring only support using unshielded twisted pair cable wired. The 4 Mbps version represents the original technology released by IBM. 16 Mbps, a version released after 4 Mbps, essentially works the same as 4 Mbps Token Ring and introduces a couple of optional new features to further improve the system. The Token Ring protocol requires a star-wired ring using twisted pair or fiber optic cable.

Figure 4 Mbps Token Ring Implementation

Figure 5 Mbps Token Ring Implementation

iii. The advantages and disadvantages of Token Ring technology In my opinion, some of token rings advantages include its Token Ring networks are deterministic in nature. This means that the nodes may only transmit at certain, well defined times. This eliminates incidents of two or more nodes transmitting at the same time and corrupting each other's transmission (collisions). The elimination of collisions results in a network where data almost always gets to its destination on the first attempt, greatly reducing retransmissions which waste bandwidth. The end result is a higher effective bandwidth at the same wire speed.

Token Ring is a highly reliable architecture and its token-passing scheme eliminates data collision. Additionally, the MSAUs can be detect the failure of a network card and automatically disconnect it from the ring,

thus enabling the token to continue around the ring. Hence the network is not brought down by the failure of one computer.

The disadvantage of using Ethernet technologies are cost. Token Ring network equipment costs several times as much

as Ethernet hardware. This is due to the complex token passing protocol which increases the difficulty of manufacturing such equipment. Networks built around STP cable require the use of a specialized, expensive cable which is not very useful for other applications, and networks built around UTP are so limited in size and maximum number of nodes that they generally require many small rings to be interconnected with costly bridges and routers.

Token Ring are difficult to physically install. It is this network using STP cable can be very difficult to physically install due to the size, weight, and stiffness of the STP cable. Networks using UTP cable avoid these difficulties, but are very limited in distance and number of nodes which can be put on one ring.

Token Ring also given the disadvantages that are difficult troubleshooting. All ring networks share a somewhat difficult

troubleshooting procedure. If any node or cable run fails, there is not usually an easy way to determine where the fault has occured. This results in a long and tedious process of elimination where the network must be broken into several small pieces and each piece troubleshot individually until the problem is found and corrected. If an intermittant problem is encountered, it may be nearly impossible to find and correct it.

C. Comparison Ethernet and token ring technology

I have said that neither of these architectures has a clear advantage over the other. Ethernet uses the bus topology with data transfer rates of 10 Mbps. All nodes are connected to a single long cable. Any connected node can send and receive a signal along the cable. However before the node can send any data, it must listen to the network to see if it is in use. The source node will not release the data to the destination node until the network is clear. If two or more nodes send data at one time, a collision will transpire. Whenever this happens, the original data is dropped and resent by the source node.

Ethernet uses the carrier sense multiple access/collision detection (CSMA/CD) at the physical and link layer to detect collisions on the network. The frame structure for carrying data begins with alternating binary numbers that signals the destination node the frame is on its way. Following the preamble is the destination and source address for the data. The next section contains a two-byte field that is used to identify the data type. Then you have section that contains the actual data follow by the frame check sequence (FCS) field. The FCS contains cyclic redundancy check (CRC) value. The CRC is designed by the sending device and recalculated by the receiving node to check for damages that might have transpired during transit.

With Token Ring, IBM created the Token Passing Ring Network and is the second most commonly implemented LAN, second only to Ethernet. Token Ring uses the bus topology with data transfer rates of 4 Mbps and 16Mbps . Token Ring networks use token passing to send data across the network. The computers are grouped together and connected in a loop. The computer requesting to send data will need to obtain permission before transmitting any data. When the node obtains control of the network, like Ethernet, the data will be transmitted in a frame. The frame circles the network passing from one computer to the next until it reaches source of the transmission.

The frame format for the tokens noted above was obtained from www2.rad.com. It provides us with a breakdown of the token. The header, or start delimiter, alerts nodes of

the tokens arrival. Next, the access control byte contains the priority and reservation field for access to the network. This is also where node would check to see if the data has been abandon on the ring for what could be an endless amount of time. The next section of the token is the control information. This area contains both the source and destination address. Finally, the last section of the token contains the End Delimiter, which signals the end of the frame. Token Ring networks use a dedicated node and fault management mechanism for monitoring frames that are circling around the network without returning to its place of origin. This monitoring device will remove such frames and enhance performance of the network.

Thus, in comparing the two architectures one needs to know where such infrequent long delays are tolerable and where they are not. They most likely are quite tolerable in the ordinary office environment where no catastrophe will result from the delay-just annoyance. Here, we would expect ETHERNET to be quite popular. On the other hand if the LAN were being used in a factory environment to support process control or some type of automation an occasional long delay may well be catastrophic. Here, we would expect Token Ring to be the preferred architecture.

D. Conclusion After all my research, reading and pondering, I have come to the conclusion that I have merely scratched the surface of the both Ethernet and Token Ring networks. Both topologies have a lot to offer an organization. The Ethernet bus is a simpler topology with less room. However, the Token Ring provides an organization with a network that has the ability to protect itself against failure. My personal preference is to employ a network that has less room, Ethernet, so that it is not concerned with protecting itself, Token Ring.

E. Reference I. II. http://en.wikipedia.org/wiki/Ethernet. Taken by 12 Feb 2013. http://docwiki.cisco.com/wiki/Ethernet_Technologies. Taken by 12 Feb 2013. III. http://docwiki.cisco.com/wiki/Token_Ring/IEEE_802.5. Taken by 16 Feb 2013. IV. http://www.networkworld.com/news/2007/102607-arguments-ethernettoken-ring.html. Jim Duffy, Network World. Taken by 21 Feb 2013. V. http://www.telebyteusa.com/primer/ch8.htm. Local Area Network (LAN). Taken by 21 Feb 2013. Taken by 21 Feb 2013. VI. http://www.studymode.com/essays/Ethernet-Vs-Token-Ring-72053.html. Taken by 25 Feb 2013.

Das könnte Ihnen auch gefallen