Sie sind auf Seite 1von 26

Lecture-5

Token Ring, FDDI, Bridge, Switch


Token Ring
IBM's version of Token Ring was introduced
in 1984 for the entire range of IBM
computers and computing environments
including:
• Personal computers.
• Midrange computers.
• Mainframe computers and the Systems
Network Architecture (SNA) environment
(SNA is IBM's networking architecture).
Token Ring
Token Ring Features
• Star-wired ring topology
• Token-passing access method
• Shielded and unshielded twisted-pair (IBM
Types 1, 2, and 3) cabling
• Transfer rates of 4 and 16 Mbps
• Baseband transmission
• 802.5 specifications
Token Ring Format
How Token Ring Networking
Works
• When the first Token Ring computer comes
online, the network generates a token.
• The token is a predetermined formation of bits (a
stream of data) that permits a computer to put
data on the cables.
• The token travels around the ring polling each
computer until one of the computers signals that
it wants to transmit data and takes control of the
token.

• The destination computer copies the frame into
its receive buffer and marks the frame in the
frame status field to indicate that the information
was received.
• The frame continues around the ring until it
arrives at the sending computer, where the
transmission is acknowledged as successful.
• The sending computer then removes the frame
from the ring and transmits a new token back on
the ring.
• Only one token at a time can be active on
the network, and the token can travel in
only one direction around the ring.
• a computer cannot force its way on to the
network as it can in a CSMA/CD
environment. If the token is available, the
computer can use it to send data.
• Each computer acts as a unidirectional
repeater, regenerates the token, and
passes it along.
Recognizing a Computer
When a new computer comes online on the
network, the Token Ring system initializes
it so that it can become part of the ring.
This initialization includes:
• Checking for duplicate addresses.
• Notifying other computers on the network
of its existence.
Hardware Components
• Hub, which houses the actual ring. A
Token Ring network can have multiple
hubs
• STP or UTP cabling with connectors that
connects the computers to the hubs;
• patch cables can further extend the
connections.
• Fiber-optic cable is especially well suited
to Token Ring networks.
The Hub

In a Token Ring network, the hub is known


by several names that all mean the same
thing. These include:
• MAU (Multistation Access Unit).
• MSAU (MultiStation Access Unit).
• SMAU ( Smart Multistation Access Unit).
FDDI
• FDDI is frequently used as a backbone
technology, and to connect high-speed
computers in a LAN.
• FDDI has four specifications:
– Media Access Control (MAC) - defines how the
medium is accessed
– Physical Layer Protocol (PHY) - defines data
encoding/decoding procedures
– Physical Layer Medium (PMD) - defines the
characteristics of the transmission medium,
– Station Management (SMT) - defines the FDDI
station configuration
FDDI Standards
FDDI signaling
• FDDI uses an encoding scheme called
4B/5B.
• Every 4 bits of data are sent as a 5 bit
code. The signal sources in FDDI
transceivers are LEDs or lasers.
FDDI media
• FDDI specifies a 100 Mbps, token-passing, dual-
ring LAN that uses a fiber-optic transmission
medium.
• Optical fiber offers several advantages over
traditional copper wiring, including such
advantages as:
– security - Fiber does not emit electrical signals that
can be tapped.
– reliability - Fiber is immune to electrical interference.
– speed - Optical fiber has much higher throughput
potential than copper cable.
FDDI MODE
• FDDI defines the two specified types of fiber:
single-mode (also mono-mode); and multi-mode
• Modes can be thought of as bundles of light rays
entering the fiber at a particular angle.
• Single-mode fiber allows only one mode of light
to propagate through the fiber, while multi-mode
fiber allows multiple modes of light to propagate
through the fiber.

• Single-mode fiber is capable of higher
bandwidth, and greater cable run distances, than
multi-mode fiber.
• Because of these characteristics, single-mode
fiber is often used for inter-building connectivity
while multi-mode fiber is often used for intra-
building connectivity.
• Multi-mode fiber uses LEDs as the light-
generating devices, while single-mode fiber
generally uses lasers.
Bridge
Bridges can be used to
• Expand the length of a segment.
• Provide for an increased number of computers
on the network.
• Reduce traffic bottlenecks resulting from an
excessive number of attached computers.
• Split an overloaded network into two separate
networks, reducing the amount of traffic on each
segment and making each network more
efficient.
• Link unlike physical media such as twisted-pair
and coaxial Ethernet.
How Bridge Works
Bridges work at the MAC sublayer and are
sometimes referred to as MAC-layer
bridges. A MAC-layer bridge:
• Listens to all traffic.
• Checks the source and destination
addresses of each packet.
• Builds a routing table, as information
becomes available.

• Forwards packets in the following manner:
– If the destination is not listed in the routing
table, the bridge forwards the packets to all
segments.
– If the destination is listed in the routing table,
the bridge forwards the packets to that
segment (unless it is the same segment as
the source).
Implementing a bridge
A bridge can be either a separate, stand-alone
piece of equipment (an external bridge) or it can
be installed in a server.
If the network operating system (NOS) supports it,
one or more network interface cards (NICs),
making an internal bridge, can be installed.
Network administrators like to use bridges
because they are:
• Simple to install and transparent to users.
• Flexible and adaptable.
• Relatively inexpensive.
Switch
Switch
• A switch is a layer 2 device just as a
bridge is. In fact a switch is called a multi-
port bridge, just like a hub is called a multi-
port repeater.
• The difference between the hub and
switch is that switches make decisions
based on MAC addresses and hubs don't
make decisions at all.
Purpose of a switch
To concentrate connectivity, while making data
transmission more efficient.
For now, think of the switch as something that is
able to combine the connectivity of a hub with
the traffic regulation of a bridge on each port.
It switches packets from incoming ports
(interfaces) to outgoing ports, while providing
each port with full bandwidth (the transmission
speed of data on the network backbone).