Professional Documents
Culture Documents
Presentation
This layer translates the data so it can be sent along the network. It is
(Layer 6)
sometimes called the syntax layer.
Session This layer establishes, manages and terminates connections between applications.
The session layer sets up, coordinates, and terminates connections at each end. It
(Layer 5)
deals with session and connection coordination.
Transport This layer provides transparent transfer of data between end systems, or hosts, and
(Layer 4) is responsible for end-to-end error recovery and flow control. It ensures complete
data transfer.
This layer provides routing technologies, creating paths, known as virtual circuits,
Network for transmitting data from computer to computer. Routing and forwarding are
(Layer 3) functions of this layer, as well as addressing, internetworking, error handling,
congestion control and packet sequencing.
At this layer, data packets are encoded and decoded into bits. The data link layer is
Data Link divided into two sub layers: The Media Access Control (MAC) layer and the
Logical
Link Control (LLC) layer. The MAC layer controls how a computer on the
(Layer 2)
network gains access to the data and permission to transmit it. The LLC layer
controls frame synchronization, flow control and error checking.
Physical This layer conveys the bit stream - electrical impulse, light or radio signal -- through the
network
at the electrical and mechanical level. It provides the hardware means of sending and
(Layer 1)
receiving data on a carrier, including defining cables, cards and physical aspects. Fast
Ethernet, RS232, and ATM are protocols with physical layer components.
Token Ring Process
• Phase 0 (Lobe Check) —The station checks to ensure it can receive these frames without error.
• Phase 1 (Physical Insertion) — A station then sends a 5 volt signal to the MSAU to open the
relay.
• Phase 2 (Address Verification) — A station then transmits MAC frames with its own MAC
address in the destination address field of a token ring frame. When the frame returns and if
the address copied , the station must participate in the periodic (every 7 seconds) ring poll
process. This is where stations identify themselves on the network as part of the MAC
management functions.
• Phase 3 (Participation in ring poll) — A station learns the address of its Nearest Active
Upstream Neighbor (NAUN) and makes its address known to its nearest downstream
neighbor, leading to the creation of the ring map. Station waits until it receives an AMP or
SMP frame with the ARI and FCI bits set to 0. When it does, the station flips both bits (ARI
and FCI) to 1, if enough resources are available, and queues an SMP frame for transmission. If
no such frames are received within 18 seconds, then the station reports a failure to open and
de-inserts from the ring. If the station successfully participates in a ring poll, it proceeds into
the final phase of insertion, request initialization.
• Phase 4 (Request Initialization) — Finally a station sends out a special request to a parameter
server to obtain configuration information. This frame is sent to a special functional address,
typically a token ring bridge, which may hold timer and ring number information with which
to tell the new station abort
How the procedure works.
Simpler than a token ring, the procedure for coaxial
is as following:
• Main procedure, it states and asks
• Asks: is the frame ready for transmission.
• Is medium idle? If not, wait until it becomes ready and wait the interframe
period
• Starts transmitting.
• Asks: did a collision occur? If so, it goes to collision detected procedure.
• Resets retransmission counters and end frame transmission.
• If a collision is detected it:
• Continues the transmission until minimum packet time is reached to ensure
that all receivers detect the collision.
• Counts how many times it retransmitted
• Asks: was the maximum number of transmission attempts reached? If so, abort
transmission.
• Calculates and wait random back off period based on number of collision
• Re-enters main procedure at stage 1.
How long the card waits
between retransmission
The card counts how many collisions occurred.
Then, back-off algorithms determine when the
colliding stations retransmit.