Contributed by: Anubhooti Malhotra Himani Sharma BCA-2(A) The Institution of Electrical and Electronics Engineers (IEEE) has developed several standards for LANs. These standards are collectively known as IEEE 802 or Project 802. The IEEE project 802 divides data link layer into two sub layers: Logical link control (LLC) and Medium access control (MAC). LLC provides one single data link control protocol for all IEEE LANs. This single LLC protocol can provide interconnectivity between different LANs as it makes the MAC sub layer transparent. On the other hand MAC provides different protocols for the different LANs. 802.1 Network management and Internetworking . 802.2 Logical Link Control (LLC). 802.3 Ethernet or CSMA/CD. 802.4 Token Bus. 802.5 Token Ring. 802.6 Metropolitan Area Networks (MAN) or Distributed Queue Dual Bus (DQDB). 802.7 Band pass Technical Advisory Group. 802.8 Fibre Optic Technical Advisory Group. 802.9 Integrated Data and Voice Network. 802.10 Security Working Group. 802.11 Wireless LAN. 802.12 Demand priority 802.13 802.14 Cable Modems 802.15 Wireless PAN 802.15.1 Bluetooth certification 802.15.4 ZigBee certification 802.16 Broadband Wireless Access(WiMax certification) 802.16e (Mobile) Broadband Wireless Access 802.16.1 Local Multipoint Distribution Service 802.17 Resilient Package Ring 802.18 Radio Regulatory TAG 802.19 Coexistence TAG 802.20 Mobile Broadband Wireless Access 802.21Media Independent Handoff 802.22 Wireless Regional Area Network 802.23 Wireless ISDN System IEEE 802.3 supports a LAN standard originally developed by Xerox and later extended by a joint venture between Digital Equipment Corporation, Intel Corporation, and Xerox. This was called Ethernet. IEEE 802.3 defines two categories: baseband and broadband. The word base specifies a digital signal. The word broad specifies an analog signal. IEEE divides the baseband category into five different standards: 10Base5, 10Base2, 10Base-T, 1Base5, and 100Base-T. The first num (10, 1, 100) indicates the data rate in Mbps. The last number or letter (5, 2, 1, or T) indicates the maximum cable length or the type of cable. Carrier Sense Multiple Access with Collision Detection Whenever multiple users have unregulated access to a single line, there is a danger of signals overlapping and destroying each other. Such overlaps, which turns the signals into unusable noise, are called collisions. As traffic increases on a multiple access link, so do collisions. A LAN therefore needs a mechanism to coordinate traffic, minimize the number of collisions that occur, and maximize the number of frames that are delivered successfully. In CSMA system, any workstation wishing to transmit must first listen for existing traffic on the line. A device listens by checking for a voltage. If no voltage is detected, the line is considered idle and the transmission is initiated. CSMA cuts down on the number of collisions but does not eliminate them. Collisions can still occur. If another station has transmitted too recently for its signal to have reached the listening station, the listener assumes the line is idle and introduces its own signal onto the line. The final step is the addition of collision detection (CD). In CSMA/CD the station wishing to transmit first listens to make certain the link is free, then transmits its data, then listens again. During the data transmission, the station checks the line for the extremely high voltages that indicate a collision. If a collision is detected, the station quits the current transmission and waits a predetermined amount of time for the line to clear, then sends its data again. Each station on an Ethernet network (such as a PC, workstation, or printer) has its own network interface card (NIC). The NIC usually fits inside the station and provides the station with a six byte physical address. The number on the NIC is unique. The baseband system use Manchester digital encoding. There is one broadband system, 10Broad36. Ethernet LANs can support data rates between 1 and 100 Mbps. Preamble: The first field of the 802.3 frame, the preamble, contains seven bytes of alternating 0s and 1s that alert the receiving system to the coming frame and enable it to synchronize its input timing. Start frame delimiter (SFD): The second field of the 802.3 frame signals the beginning of the frame. The SFD tells the receiver that everything that follows is data, starting with the addresses. Destination Address (DA): The destination address (DA) field is allotted six bytes and contains the physical address of the packet’s next destination. Source Address (SA): The source address (SA) field is also allotted six bytes and contains the physical address of the last device to forward the packet. Length/type of PDU: These next two bytes indicate the number of bytes in the coming PDU. 802.2 frame (PDU): This field of the 802.3 frame contains the entire 802.2 frame as modular, removable unit. CRC: The last field in the 802.3 frame contains the error detection information in this case a CRC-32. The first of the physical standards defined in the IEEE 802.3 model is called 10Base5, thick Ethernet, or Thicknet. The nickname derives from the size of the cable, which is roughly the size of garden hose and too stiff to bend with your hands. 10Base5 is a bus topology LAN that uses baseband signalling and has maximum segment length of 500 meters. The second Ethernet implementation defined by the IEEE 802 series is called 10Base2 or thin Ethernet. Thin Ethernet provides an inexpensive alternative to 10Base5 Ethernet, with the same data rate. The advantages of thin Ethernet are reduced cost and ease of installation. It also uses a bus topology. o The most popular standard defined in the IEEE 802.3 series is 10Base-T, a star topology LAN using unshielded twisted pair (UTP) cable instead of coaxial cable. o It supports a data rate of 10 Mbps and has a maximum length of 100 meters. Star LAN is an AT & T product used infrequently today because of its slow speed. At only 1 Mbps, it is 10 times slower than the three standards discussed above. What is interesting about Star LAN is its range, which can be increased by a mechanism called Daisy Chaining. Like 10Base-T, star LAN uses twisted pair cable to connect stations to a central intelligent hub. Local area networks have a direct application in a factory automation and process control, where the nodes are computers controlling the manufacturing process. In this type of application, real time processing with minimum delay is needed. Processing must occur at the speed as the objects moving along the assembly line. Furthur….. Ethernet Is not suitable protocol for this purpose because the number of collisions is not predictable and the delay in sending data from the control centre to the computers along the assembly line is not a fixed value. Token Bus combines the features of Ethernet and Token Ring. It combines the physical configuration of Ethernet and collision free feature of Token Ring. Token Bus is a physical bus that operates as a logical ring using tokens. Stations are logically organized into a ring. A token is passed among stations. If a station wants to send data, it must wait and capture the token. However, like Ethernet, stations communicate via a common bus. Token Bus is limited to factory automation and process control and has no commercial application in data communication. Also, the details of the operation are very involved. When a station passes the token, it sends a token to its logical neighbour irrespective of where that station is physically located on the cable. MAC SUB LAYER When the ring is initialized, stations are inserted into it in order of station address, from highest to lowest. Token passing is done from high to low address. Whenever a station acquires the token, it can transmit frames for a specific amount of time. If a station has no data, it passes the token immediately upon receiving it. The Token Bus defines four priority classes, 0, 2, 4, and 6 for traffic, with 0 the lowest and 6 the highest. Each station is internally divided into four substations, one at each priority level i.e. 0, 2, 4 and 6. ring. As input comes into the MAC sub layer from above, the data are checked for priority and routed to one of the four substations. Thus each station maintains its own queue of frames to be transmitted. When a token comes into the station over the cable, it is passed internally to the priority 6 substation, which can begin transmitting its frames, if it has any. When it is done or when its time expires, the token is passed to the priority 4 substation, which can then transmit frames until its timer expires. After this the token is then passed internally to priority 2 substation. This process continues until either the priority 0 substation has sent all its frames or its time expires. After this the token is passed to the next station in the ring. FRAME FORMAT The various fields present in the frame format are: Preamble: This field is 1 byte long. It is used for synchronization. Start Delimiter: This one byte field marks the beginning of frame. Frame Control: This one byte field specifies the type of frame. It distinguishes data frame from control frames. For data frames it carries frame’s priority. Destination Address: It specifies 2 to 6 bytes destination address. Source Address: It specifies 2 to 6 bytes source address. Data: This field may be up to 8182 bytes long when 2 bytes address are used & up to 8174 bytes long when 6 bytes address is used. Checksum: This 4 byte field detects transmission errors. End Delimiter: This one byte field marks the end of frame. Token Ring resolves this uncertainty by requiring that stations take turns sending data. Each station may transmit only during its turn and may send only one frame during each turn. The mechanism that coordinates this rotation is called Token passing. A token is a simple placeholder frame that is passed from station to station around the ring. Token Ring resolves this uncertainty by requiring that stations take turns sending data. Each station may transmit only during its turn and may send only one frame during each turn. The mechanism that coordinates this rotation is called Token passing. A token is a simple placeholder frame that is passed from station to station around the ring. ADDRESSING Token ring uses a 6-byte address which is imprinted on the NIC card similar to Ethernet addresses. ELECTRICAL SPECIFICATION Signaling: Token ring uses differential Manchestar encoding. Data rate: token ring supports data rates of upto 16 Mbps. References Castelli, Matthew (2002). Network Consultants Handbook. Cisco Press. ISBN 1-58705-039-0. Gallo, Michael; Hancock, William M. (2001). Networking Explained. Digital Press. ISBN 1-55558-252-4. External links IEEE 802.5 Web Site Get the IEEE 802.5 standard Troubleshooting Cisco Router Token Ring Interfaces Futureobservatory.org discussion of IBM's failure in token ring technology 802 Committee website IEEE 802 Standards