You are on page 1of 19

Network standards

A set of network standards developed by the


IEEE. They include:
IEEE 802.1
IEEE 802.2
IEEE 802.3
IEEE 802.4
IEEE 802.5
IEEE 802.6
IEEE 802.1
IEEE 802.1 : Standards related to network
management.
Network management refers to the broad
subject of managing computer networks.
There exists a wide variety of software and
hardware products that help network system
administrators manage a network.
Network management covers a wide area,
including:
Security: Ensuring that the network is protected from
unauthorized users.
Performance: Eliminating bottlenecks in the network.

Reliability: Making sure the network is available to


users and responding to hardware and software
malfunctions.
IEEE 802.2
IEEE 802.2: General standard for the data link layer in the
OSI Reference Model.
The IEEE divides this layer into two sublayers:
The logical link control (LLC) layer and
The media access control (MAC) layer.

The Media Access Control Layer is one of two sublayers


that make up the Data Link Layer of the OSI model.
The MAC layer varies for different network types and is
defined by standards IEEE 802.3 through IEEE 802.5.
The MAC layer is responsible for moving data packets to
and from one Network Interface Card (NIC) to another
across a shared channel.
The MAC sublayer uses MAC protocols to ensure that
signals sent from different stations across the same
channel don't collide.
IEEE 802.4

IEEE 802.4: Defines the MAC layer for bus networks


that use a token-passing mechanism (token bus
networks).
Token bus networks
A type of local-area network (LAN) that has a bus
topology and uses a token -passing mechanism to
regulate traffic on the bus.
A token bus network is very similar to a token ring
network, the main difference being that the endpoints
of the bus do not meet to form a physical ring.
Token bus networks are defined by the IEEE 802.4
standard.
IEEE 802.5 and IEEE 802.6

IEEE 802.5
IEEE 802.5: Defines the MAC layer
for token-ring networks.
IEEE 802.6
IEEE 802.6: Standard for
Metropolitan Area Networks (MANs).
LOCAL AND WIDE AREA NETWORKS
LAN Technologies
LAN (Local Area Network) refers to a
group of computers interconnected into a
network so that they are able to
communicate, exchange information and
share resources (e.g. printers, application
programs, database etc).
In other words, the same computer
resources can be used by multiple users
in the network, regardless of the physical
location of the resources.
Media Access Control methods

There are different types of Media


Access Control methods in a LAN:
Ethernet
Token ring
Fast ethernet
FDDI
Ethernet
Ethernet is a 10Mbps LAN that uses the Carrier Sense
Multiple Access with Collision Detection (CSMA/CD)
protocol to control access network.
When an endstation (network device) transmits data,
every endstation on the LAN receives it.
Each endstation checks the data packet to see whether
the destination address matches its own address.
If the addresses match, the endstation accepts and
processes the packet.
If they do not match, it disregards the packet. If two
endstations transmit data simultaneously, a collision
occurs and the result is a composite, garbled message.
All endstations on the network, including the transmitting
endstations, detect the collision and ignore the message.
Each endstation that wants to transmit waits a random
amount of time and then attempts to transmit again
Token Ring
It is a method operating in a ring topology.
Devices on a Token Ring network get access to the
media through token passing.
Token and data pass to each station on the ring. The
devices pass the token around the ring until one of the
computer who wants to transmit data , takes the token
and replaces it with a frame.
Each device passes the frame to the next device, until
the frame reaches its destination.
As the frame passes to the intended recipient, the
recipient sets certain bits in the frame to indicate that it
received the frame.
The original sender of the frame strips the frame data
off the ring and issues a new token
NETWORK ACCESS METHODS
CSMA/CD
This stands for "carrier-sense multiple access with collision
detection.
It is a method used on ethernet networks whereby all
computers on the network check the cable for traffic before
attempting to transmit a packet.
Each device senses whether the line is idle and therefore
available to be used
If more than 1 transmits at the same time then there will be a
collision and both computers will wait a random amount of
time and retransmit.
Collision
A collision is the result of two devices on the
same Ethernet network attempting to
transmit data at exactly the same time
The network detects the "collision" of the two
transmitted packets and discards them both
Collisions are a natural occurrence on
Ethernets.
NETWORK ACCESS METHODS

CSMA/CA
Stands for "carrier-sense multiple access with
collision avoidance".
In CSMA/CA, as soon as a node receives a packet
that is to be sent, it checks to be sure the channel is
clear (no other node is transmitting at the time).
If the channel is clear, then the packet is sent.
NETWORK ACCESS METHODS

If the channel is not clear, the node waits for a randomly


chosen period of time, and then checks again to see if the
channel is clear.
This period of time is called the backoff factor, and is
counted down by a backoff counter. If the channel is
clear when the backoff counter reaches zero, the
node transmits the packet.
If the channel is not clear when the backoff counter reaches
zero, the backoff factor is set again, and the process is
repeated.
NETWORK ACCESS METHODS
TOKEN PASSING
Token passing uses a token, or series of bits, to grant a
device permission to transmit over the network
Token passing is the access method used by token ring
networks.
With this method, a packet called a token is passed around
the network.
A computer that wishes to transmit must wait until it can take
control of the token, allowing only one computer to transmit
at a time.
When its transmission is complete, the device passes the
token along to the next device in the topology.
NETWORK ACCESS METHODS

DEMAND PRIORITY
The repeaters, bridges, routers or hubs search the network
for requests that are waiting to be sent.
If 2 or more requests are received by the network hardware
at once, the data with the highest priority is sent
Priority for different data types can be controlled by the
administrator.
A real advantage is that computers can receive and transmit
at the same time with this access method .
Fast Ethernet
This is an extension of 10Mbps Ethernet
standard and supports speed upto
100Mbps.
The access method used is CSMA/CD.
For physical connections Star wiring
topology is used.
Fast Ethernet is becoming very popular as
an upgradation from 10Mbps Ethernet
LAN to Fast Ethernet LAN is quite easy.
FDDI (Fiber Distributed Data
Interface):

FDDI provides data speed at 100Mbps


which is faster than Token Ring and
Ethernet LANs . FDDI comprise two
independent, counter-rotating rings : a
primary ring and a secondary ring.
Data flows in opposite directions on the
rings.
The counter-rotating ring architecture
prevents data loss in the event of a link
failure, a node failure
This technology is usually implemented
for a backbone network.
Carrier sense multiple access networks collision
detection (CSMA/CD)
This stands for "carrier-sense multiple access with collision
detection.
It is a method used on ethernet networks whereby all
computers on the network check the cable for traffic before
attempting to transmit a packet.
Each device senses whether the line is idle and therefore
available to be used
If more than 1 transmits at the same time then there will be a
collision and both computers will wait a random amount of
time and retransmit.
If the channel is not clear, the node waits for a randomly
chosen period of time, and then checks again to see if the
channel is clear.
This period of time is called the backoff factor, and is counted
down by a backoff counter. If the channel is clear when the
backoff counter reaches zero, the node transmits the packet.
If the channel is not clear when the backoff counter reaches
zero, the backoff factor is set again, and the process is
repeated.

You might also like