Professional Documents
Culture Documents
Fiber distributed data interface (FDDI), which is an optical data communication standard used
for long distance networks provides communication with fiber optic lines up to 200 kilometers at
a speed of 100 megabit per second (Mbps). FDDI has dual primary and secondary
communication rings. The primary ring works alongside the network, and the secondary ring
remains idle and available for backup.
FDDI was later extended to FDDI-2 for long distance voice and multimedia communication.
Organizations use this medium for voice and video conferences, online lectures, news and other
multimedia.
FDDI networks, which are designed for geographically large-scaled organizations that support
thousands of end users, operates in the OSI model's physical and media access control (MAC
layers).
The American National Standards Committee (ANSC) formally standardized FDDI as the best
linking medium for local area networks (LAN), which use FDDI for long-distance
communication.
FDDI also is used by single and multi-mode fiber optic, which have different communication
mechanisms. Multi-mode fiber optic uses a lead generation device, whereas single-mode fiber
optic uses laser for data transmission only.
Fiber Distributed Data Interface (FDDI) is a set of ANSI and ISO standards for transmission of
data in local area network (LAN) over fiber optic cables. It is applicable in large LANs that can
extend up to 200 kilometers in diameter.
Features
FDDI uses optical fiber as its physical medium.
It operates in the physical and medium access control (MAC layer) of the Open Systems
Interconnection (OSI) network model.
It provides high data rate of 100 Mbps and can support thousands of users.
It is used in LANs up to 200 kilometers for long distance voice and multimedia
communication.
It uses ring based token passing mechanism and is derived from IEEE 802.4 token bus
standard.
It contains two token rings, a primary ring for data and token transmission and a
secondary ring that provides backup if the primary ring fails.
FDDI technology can also be used as a backbone for a wide area network (WAN).
The following diagram shows FDDI −
Frame Format
The frame format of FDDI is similar to that of token bus as shown in the following diagram −
-*-
FDDI stands for Fiber Distributed Data Interface. It is a high-speed, high-bandwidth network
based on optical transmissions. It is most often used as a network backbone, for connecting
high-end computers (mainframes, minicomputers, and peripherals), and for LANs connecting
high-performance engineering, graphics, and other workstations that demand a rapid transfer of
large amounts of data. It can transport data at a rate of 100 Megabits per second and can support
up to 500 stations on a single network. FDDI was designed to run through fiber cables,
transmitting light pulses to convey information between stations, but it can also run on copper
using electrical signals. It is relatively expensive to implement, although the mixing of fiber-
optic with copper cabling can hold down the cost.
FDDI is highly reliable because FDDI networks consist of two counter-rotating rings. A
secondary ring provides an alternate data path in the event a fault occurring on the primary ring.
FDDI stations incorporate this secondary ring into the data path to route traffic around the fault.
FDDI based on a ring topology with token passing. It is an advanced technology, in the form of
the token ring over optical fiber. FDDI developed for two primary reasons: to support and help
extend the capabilities of older LANs, such as Ethernet and Token Ring, and to provide a
reliable infrastructure for businesses, moving even mission-critical applications to networks.
History of FDDI
FDDI is an ANSI (American National Standards Institute) networking standard, and ANSI
began working on the FDDI -Standard in 1982. The FDDI specification released in 1986. ANSI
chose the ring as network topology for FDDI. The most critical elements of FDDI were defined
in 1989 (as ANSI X3T9.5) and parts have been adopted by the ISO (International Standards
Organizations) as well. FDDI also considered as a successor of IEEE 802.5 standards (token
ring). FDDI has higher capacity than token rings. FDOI comprises two bottom layers in the
ISO’s Open System Interconnection (OSI) model namely, Layer 1 (Physical layer) and Layer 2
(Data Link layer). Physical layers are PMD, PHY.
The current version of the FDDI standard defines in ANSI X3T12. To ensure interoperability,
the vendors tested their products at the ANTC (Advanced Network Test Center) and EANTC
(European ANTC). It ensures that many vendors support FODI with their products. Products
from different vendors can easily mix in an FDDI network. It is the most significant advantage
of FDDI.
Although FDDI is not really a WAN technology (its ring are limited to a maximum length of
100 kilometers or 62 miles), the ground it can cover does make it suitable for use as a backbone,
connecting a number of smaller LANs, and it can provide the core of a network as extensive as
a Metropolitan Area Network (MAN). In that sense, FDDI is more than LAN but less than
WAN. Also, because FDDI transfers information extremely quickly (l00 Mbps), it is often used
to connect high-end devices such as mainframes, minicomputers, and peripherals, or to connect
high-performance devices within a LAN. Engineering or video or graphics workstations, for
instance, benefit from FODI because they need much bandwidth, to transfer large amounts of
data at satisfactorily high steeds. FDDI can easily be incorporated into existing networks
because it works even with other network topologies (due to the LLC protocol that is also used
by Ethernet and Token Ring).
FDDI Features
Cabling Requirement
Optical fiber is the transmission medium of FDDI networks-but copper media also can be used
for standard office connections offering the same transmission rates. In contrast to copper
media, fiber provides the best possible protection against physical network tapping and offers
immunity to electromagnetic interference. As its name indicates, FDDI developed around the
idea of using optical fiber cable. It is, in fact, the type of cable used, especially when the high-
speed transmission needed over relatively long distances (2000 to 10,000 meters, or roughly 1
to 6 miles). However, over shorter distances (about 100 meters, or 330 feet), FDDI can also be
implemented on less expensive copper cable.
PMD defines specifications for the physical layer of a network standard, namely, the media and
interface connectors used. As FDDI supports both fiber and copper media, two separate
specifications are defined. They are the Fiber PMD (for optical fiber media) and TP-PMD (for
copper media, specifically for twisted-pair). Other two significant PMDs are SMF-PMD (Single
Mode Fiber-PMD), defines the demands on single mode fibers permitting distances of 40 to 60
km (in contrast to multimode fibers permitting distances of maximum 2 km).
LCF-PMD (Low-Cost Fiber-PMD) was developed to get a low-price, fiber-based alternative
with restrictions to the maximum distance between nodes at the same time. The duplex SC
connector introduced by LCF-PMD mainly adopted by the full power budget version of Fiber
PMD.
The Fiber PMD-ANSI X3T9.5/48-48 describes the physical layer that uses fiber and optical
components. It defines the following characteristics and parameters of the optical fiber cables
allowed for FDDI.
• The wavelength of light (nominal wavelength is 1,300 nm)
• Attenuation and bandwidth
• Maximum bit-error rate
• Dispersion of optical media
• The numerical aperture (sine’s of aperture angle for total internal reflection, the nominal
aperture is 0.275)
• Intensity of light
• The jitter of the pulse
• Allowed power between two stations
62.5/125 and 85/125 micrometers graded index fibers defined as transmission media.
50/125 and 100/140 micrometers graded index fibers are also accepted.
The PHY document describes the physical processes on the medium (example data encoding). It
defines:
• Data encoding/ decoding.
• Clock synchronization (as FDDI rings can grow rather big, there is no central clock
frequency).
• TVX (Valid Transmission Time).
• Line states (Quiet – no signal on the line, Idle – normal line state, Halt and Master use when
transmitting configuration data).
• Control symbols (Start delimiter send when the data transmission starts and ending delimiter
tells when the FDDI frame should terminate.
• Data symbols (hexadecimal symbols 0 to F).
• Violation symbols (example the symbol v means that an illegal signal is on the line).
The maximum number of Phys per FDDI ring is 1000. A Dual Attachment Station (OAS) has
two PHYs connected directly to the double ring, whereas a SAS (Single Attached Station) has
an additional PHY in the concentrator. As each station needs two PHYs, the network can
accommodate a maximum of 500 stations.
The MAC (Medium Access Control) layer of the FDDI specified within the data link layer. It
uses the token passing method as medium access method and allows each station accessing the
ring in precisely defined intervals. The IEEE 802.2 standard applied in the LLC (Logical Link
Control) layer. Due to the LLC protocol, FDDI smoothly integrates network topologies such as
Ethernet (IEEE 802.3) and Token Ring (IEEE 802.5).
The MAC layer comprises address identification generating and checking the FCS (Frame
Check Sequence) checksum. Beside it specifies transmitting, repeating, and deleting MAC
frames just as providing MAC services to the LLC layer. Additionally, the MAC layer specifies
how to handle synchronous and asynchronous data traffic. The critical difference between the
IEEE 802.5 protocol and the FDDI are as follows.
• A station is waiting for a token abort the token transmission in FDDI. However, in IEEE 802.5
(Token ring) protocol, it naturally complements the selected bit in the token. It is due to the high
data rate of FDDI.
• An FDDI station releases the token as soon as the last frame is released (early release in IEEE
802.5), as waiting for the transmitted frame (standard IEEE 802.5) to return inefficient in a
high-speed environment.
Station management provides the control necessary at the node level to manage the functions of
various FDDI layers. Individual network control and safety mechanisms used for controlling
and managing activities on the ring and the connection of every station. Furthermore, it allows
reconfiguring the ring in case of malfunction or line-disruption. The SMT function permanently
monitors the FDDI ring. It coordinates the configuration during network start-up and produces
status accounts on the ring’s and station’s states. The SMT manages the Phys, MACs, and
PMDs of each station. Besides, SMT is responsible for counters, parameters, and statistics.
The functionality of the SMT can divide into CMT (Connection management) and RMT (ring
management). The CMT again is divided into:
ECM (Entity Coordination Management): Coordinating the activities of all PHYs and
controlling the optional optical bypass function.
PCM (Physical Connection Management): Inserting and removing stations, initializing, and
coordinating physical connections between local and neighboring ports.
CFM (Configuration Management): Responsible for configuring MAC and PHY of an FDDI
station.
Further, each port of an FDDI station has a CEM (Configuration Element Management).
The RMT manages the MAC components, such as changing a MAC address to a unique address
and removing a MAC with a duplicate address from the ring. Further, the RMT monitors the
FDDI ring and manages adequate procedures in case of ring disruption.
FDDI Topology
The FDDI network topology may view at two distinct levels.
• The physical level
• The logical level
Physical topology describes the arrangement and interconnection of nodes with physical
connections. The logical topology describes the paths through the network between MAC
entities. An FDDI network forms one of the two following physical topologies:
• A dual ring of trees.
• A subset of a dual ring of trees.
FDDI uses a dual ring topology. The dual ring topology uses two counter-rotating rings known
as the primary and secondary ring. The primary ring is similar to the main ring path in token-
ring terminology. The secondary ring is similar to the backup ring path of a token-ring. Each
ring consists of a single fiber path, which is equivalent to a pair of copper conductors. FDDI
topology permits many attachment units (stations, concentrators, and bridges) to attach in
various ways. From a wiring point of view, FDDI is similar to a fiber optic token-ring network;
however, there are differences between the token-ring and FDDI techniques. A device can be
attached directly to the ring without requiring a concentrator such as the Multi-station Access
Unit (MAU) on a token-ring. A device can be attached to either one or both of the primary and
secondary rings.
Station Types
To differentiate between devices that attach to one ring or both rings, FDDI defines two classes
of devices. A Class A device attaches to both the rings directly. It may be a station and is called
a Class A station or a Dual Attachment Station (OAS). It can also be a concentrator, and in this
case, it is called a Dual Attachment Concentrator (OAC).
A Class B device is a station attaches to only one of the rings, directly or through a
concentrator. Concentrators are active devices that act as wiring hubs. A Class B station called
as Single Attachment Station (SAS). It can also be a concentrator, and it is called a Single
Attachment Concentrator (SAC). During regular ring operation, the primary ring is active while
the secondary ring is idle. In the wake of a failure on the primary ring, the secondary ring
become active when a class A station or a Dual Attachment Concentrator wraps the primary
ring to the secondary ring, establishing a single ring. This functionality is mandatory to
maintain the reliability of the LAN. Figure(a) illustrates the dual ring topology.
The FDDI dual ring configuration consists of Dual Attachment Stations (OAS). A dual attached
station on the ring has at least two ports, an A port, where the primary ring comes in, and the
secondary ring goes out, and a B port where the secondary ring comes in, and the primary goes
out. Each station has both ports (A and B) attached to the rings. The cabling between the
stations has to be all fiber or shielded twisted-pair (STP).
Dual Homing
To attain better fault tolerant, a particular topology known as dual homing use. A concentrator
that is not part of the main ring may be dual attached via one or two other concentrators to
provide higher availability. When connected in this manner, a concentrator described as a Dual
Homing Concentrator (DHC). Similarly, a Dual Attachment Station can be connected to one or
two concentrators using both A and B ports to provide high availability. The station connected
in this manner is considered a Dual Homing Station (DHS). In both cases, only port B is active,
and the connection to port A remains in standby mode. If the connection to port B fails, port A
become active without any impact on the users of the Dual-Homed station or concentrator.
Figure (b) illustrates the dual homing technique.
Operation of FDDI
FDDI topology and operation are similar to Token Ring. The sequence in which stations gain
access to the medium is predetermined. A station generates a particular bit sequence called a
Token that controls the right to transmit. The Token is continually passed around the network
from one node to the next. Each station has the chance to transmit data when a token passes. A
station can decide how many frames it transmits using an algorithm that permits bandwidth
allocation. FDDI also allows a station to transmit many frames without releasing the token.
When a station has some data to send, it captures the token, sends the information in the form of
well-formatted FDDI frames, and then releases the token. The header of these frames includes
the address of the station(s) that copy the frame. All nodes read the frame as it passes around the
ring to determine if they are the recipients of the frame. If they are, they extract the data and
retransmit the frame to the next station on the ring. When the frame returns to the originating
station, the originating station removes the frame. The token-access control scheme thus allows
all stations to share the network bandwidth in an orderly and efficient manner.
Generally, in an FDDI network, one ring (known as the primary ring) carries the tokens and
data frames, and the secondary ring remains idle and uses as a backup for fault tolerance or
insurance. Because the secondary ring is available if needed, whenever a nonfunctioning node
causes a break in the primary ring, traffic ‘Q’ a “wrap” around the problem causing node and
continue to carrying data, only in the opposite direction and on the secondary ring. That way,
even if a node goes down, the network continues to function. Of course, it is also possible for
two nodes to fail. When this happens, the wrap at both locations effectively segments the one
ring into two separate, non-communicating rings. To avoid this potentially dangerous problem,
FDDI networks can rely on concentrators. These concentrators resemble hubs or MAU in that
multiple nodes plugs into them. They are also able to isolate any failed nodes while keeping the
network traffic flowing. Sometimes, both rings use for data transfer. In this case, the data travels
in one direction (clockwise) on one ring and in the other direction (counterclockwise) on the
other ring. Using both rings to carry data makes the number of frames twice that of the standard
rate. Hence, the speed of the network can double, from 100 Mbps to 200 Mbps.
Frame Format
An FDDI frame is very similar to that defined by the traditional token ring, but there are only
eight fields. The Token and frame format for the FDDI shown in Figure (a) and (b),
respectively. The Control token structure is very much similar to the Token ring case.
Eight fields make up the FDDI frame. They are:
As you can see, the data token in FDDI is very similar to the token ring data token we saw
earlier. The access control byte or octet is missing.
Start Delimiter: The Start Delimiter of a token is an indicator of the start of the token. It
consists of the symbols ‘J’ and ‘K,’ and these symbols not be seen anywhere else but at the start
of a frame or token.
Frame Control: The frame control gives information about the type of the token. A value of
hexadecimal 80 in the frame control field denotes a Non-restricted Token, while a frame control
of hexadecimal CO is a restricted token.
Destination Address: It is a 12-symbol code that indicates the identity of the station to which
the frame is to send. Each station has a unique 12-symbol address that identifies it. When a
station receives a frame, it compares the OA of that frame to its address if the two match, the
station copy the contents of the frame into its buffers.
The destination address can be an individual address or a group address that depends on its first.
If the first bit set to (1), the address is a group address. If it set to (0), the address is an
individual address. Group addresses can be used to address a frame to multiple destination
stations. A broadcast address is a particular type of group address, which applies to all of the
stations on the network.
Source Address: This field indicates the address of the station that created the frame. In FDDI,
when a station creates a frame, the frame is passed from one station to the next until it returns to
the originating station. The originating station removes the frame from the physical medium.
Data: This field carries the actual information to be conveyed. Every frame is mostly built
around this field and is merely a mechanism for getting the info from one station to another. The
type of information contained in the data field determined from the Frame Control of the field
of the frame.
Cyclic Redundancy Check (CRC): CRC is used to verify whether the incoming frame
contains any bit errors. The FCS is generated by the station that sourced the frame, using the
bits of the FC, OA, SA, DATA and CRC fields. The CRC generated such that, should any of the
bits in those fields be altered, then the receiving station notice that there is a problem and
discard the frame.
Ending Delimiter: This field consists of two ‘T’ symbols. These ‘T’ symbols indicate that the
token is complete. Any data sequence that does not end with these ‘T’ symbols is not
considered a token.
Frame Status: The Frame Status consists of three indicators, which may have one of two
values set and reset. The three indicators are Error (JE’), Address recognized (or Acknowledge)
(‘N), and Copy (‘C).
FDDI Token Passing
Token passing on an FDDI network works much the way it does on a Token Ring network, that
is, nodes pass a token around the ring, and only the node with the token is allowed to transmit a
frame. There is a twist to this. However, that is related to FDDI fault tolerance. When a node on
the ring detects a problem, it is not idle. Instead; it generates a control frame known as a beacon
and sends it on to the network. As neighboring nodes detect the beacon, they too begin to
transmit beacons, and so it goes around the ring. When the node that started the process,
eventually receives its beacon back usually after the network has switched to the secondary
ring, it then assumes that the problem has been isolated or resolved, generates a new token, and
starts the ball rolling once again.
An FDDI network, as already mentioned, cannot include rings longer than 100 kilometers apart.
Another restriction on an FDDI network is that it cannot support more than SOD (nodes per
ring. Although the overall network topology must conform to a logical ring, the network does
not have to look like a circle. It can include stars connected to hubs or concentrators, and it can
even include trees collections of hubs connected in a hierarchy. As long as the stars and trees
connect in a logical ring, the FDDI network does not face any problem.
Existing networks like Ethernet and Token Ring networks can integrate via workgroup switches
or routers into an FDDI backbone. Fileservers should be connected directly to the FDDI
backbone to reduce data load and to provide reasonable access time for the user. The
availability of FDDI adapters for twisted-pair allows smooth migration of existing cabling to
FOOL High-End PC workstations with applications like CAD, CIM, CAM, DTP, or image
processing can be connected directly to the FDDI ring via FDDI network interface cards and
concentrators.