Unit 2: LAN Configurations Lesson 2-5: Other Network Architectures At a Glance This lesson covers the basic characteristics of Token Ring, FDDI, ARCNet and LocalTalk architecture. What You Will Learn After completing this lesson, you will be able to: • Describe the characteristics of Token Ring architecture. • Describe the characteristics of FDDI architecture. • Describe the characteristics of ARCNet architecture. • Describe the characteristics of LocalTalk architecture. • Design a Token Ring network • Select appropriate network architecture when given a set of specifications. ST0025803A 239 Lesson 2-5: Other Network Architectures Tech Talk 240 • Active MonitorThe computer device on a Token Ring network whose responsibility is to ensure that the network is functioning properly. • ARCNetA Token Ring network that runs over tine twisted pair RJ62/U cable at speeds of either 2.5 or 4 Mbs. • Beacon FrameA specialized frame, or signal, used in both Token Ring and FDDI networks. Beacon frames are used to indicate network malfunctions, such as a break in the ring. • Claim FrameA specialized frame, o r signal, used in both Token Ring and FDDI networks that indicates that a new computer device on the ring has been designated the active monitor. • Fiber Distributed Data Interface (FDDI) ArchitectureA high speed, dual ring, token passing access network that uses fiber optic cable. • Medium Interface Connector (MIC)1. An IBM designed connector, used for Type 1 and Type 2 cabling, that may be connected to another like connector. Two connectors are attached simply by flipping one of them over. 2. An interface used in FDDI networks, to connect fiber optical cable to a computer device or another fiber optical cable segment. The MIC is also used to terminate fiber optical cable. • Ring WrapThe joining of the primary and secondary FDDI rings in the event of a break in the primary ring. This process allows the network to heal itself and continue to operate. • Timed Token FrameSpecialized data packet used in FDDI networks that gives permission to a computer device to transmit data. The rotation time around the ring is timed making it possible to determine when a device should have token access. • Token FrameSpecialized data packet used in Token Ring networks to give permission to computer devices to transmit data. • Token Ring ArchitectureAn IBM, IEEE 802.5 physical star, logical ring topology technology that uses a token passing access method for transmitting data. ST0025803A Internetworking Fundamentals Unit 2: LAN Configurations Token Ring Architecture Token Ring architecture, introduced in the mid 80s by IBM and defined by the IEEE 802.5 standard, is a physical star, logical ring topology. In Token Ring networks, computer devices are connected logically in a ring with each device connected separately to a specialized Token Ring hub called a multistation access unit (MAU). The function of this hub is to ensure that the packets of data are transmitted around the ring and have the ability to bypass a device in case of failure on one of the ports. Token ring hubs have two additional ports called Ring In and Ring Out that are used for connecting MAUs together. Token Ring Multistation Access Unit (MAU) Ring In Ring Out Traditional Token Ring networks transmit signals at a speed of either 4 or 16 Mbs using a token that is passed from computer to computer around a network. [Recent Token Ring technology with speeds of 100 and 128 Mbs is called fast Token Ring networks. These networks operate like traditional Token Ring networks]. In order to send data, a computer device must capture the token. The token, which is continuously transmitted around the ring, is a 24-bit frame with three fields, a Start Delimiter (SD), an Access Control (AC), and an Ending Delimiter (ED). Token Frame Format SD AC ED The access field carries a signal, either a 0 or 1, that tells the computer device whether or not it is available to carry data. If available, the access control signal is a 0, and the computer device captures the token frame, inserts the information being transmitted in between the access field and the ending delimiter, and then sends the entire frame. ST0025803A 241 Lesson 2-5: Other Network Architectures When workstation A transmits to workstation C, workstation A grabs a free token and changes the AC to a 1 indicating that the token is no longer available for use and encapsulates its data within the token frame Workstation A Captures the Free Token D Free Token A C B The token with its encapsulated data travels around the network from one computer to the next, where each device accepts the frame and checks the destination address. If the hardware addresses match, the device processes the data; if it does not match the data is retransmitted to the next device until the token reaches its intended destination. 242 ST0025803A Internetworking Fundamentals Unit 2: LAN Configurations Data Encapsulated in Token Frame D A C Data B The destination device accepts the frame and copies the data, verifies receipt, and returns the token frame to the network where it continues around the ring until it reaches the original sending device. The sending device recaptures the token that contains information that the frame was received and also contains error control information. After stripping the original data from the frame, the sending device returns the available token to the network and the process continues. ST0025803A 243 Lesson 2-5: Other Network Architectures Workstation C Accepts Data and Sends it Back to A to be Stripped D Data Data A Free Token C Data B Four (4) Mbs Token Rings only allow one token on the ring at a time, sixteen (16) Mbs Token Rings have a mechanism called Early Token Release, which allows a free token to be released before it has been completely received by the source station. Token Ring networks are not as susceptible to signal degradation as other network types, since each device acts like a repeater, regenerating the signal before transmitting it to the next device. Token Ring networks fail more gracefully than Ethernet networks when they are overloaded. Since they are so reliable, diagnostic and troubleshooting measures are often built into the hardware. Also, priority can be assigned in Token Ring networks. Although they work quite well, Token Ring networks are currently being phased out for several reasons. They have very complicated protocols, which makes them both difficult to troubleshoot and more expensive than other technology. Token Ring is basically IBM, so there are compatibility issues with equipment from other manufacturers who also are not as interested in new Token Ring technology since the market isn’t as profitable as the Ethernet market. Additionally, 4 Mbs networks are considered slow when compared with 10Mbps Ethernet networks. 244 ST0025803A Internetworking Fundamentals Unit 2: LAN Configurations Token Ring Frame Format Token Ring frame format begins with the 8 bit Start Delimiter followed by the 8 bit Access Control. The next field, is a Frame Control field, which indicates whether the frame contains Media Access Control information for all network devices or only data for a single destination device. This field is followed by the Destination Address field (either 16 or 48 bits), the Source Address field (either 16 or 48 bits), the Data field (has no determined size), the Frame Check Sequence field (32 bits), the End Delimiter field (8 bits), and finally the 8 bit Frame Status field. [Note: current Ethernet LANs use the 48bit source and destination addressing scheme.] Token Ring Frame Format 8 8 bits bits SD AC 8 bits 16 or 48 bits 16 or 48 bits Frame Destination Source Control Address Address >0 bits Data Field 32 bits FCS 8 bits ED Detecting Errors through Beaconing One computer device on a Token Ring network, usually the first device recognized when the LAN comes up, is designated the active monitor. It is the responsibility of the active monitor (AM) to ensure that the network is functioning properly. Every seven seconds the active monitor (AM) station sends a signal/frame, which checks for malfunctioning devices and problems such as errors in delivery of frames. Each successive device on the ring receives and forwards the active monitor present frame. If a device does not receive the active monitor (AM) present frame, it sends a message/frame on to the network indicating that there is a malfunction, and the Token Ring tries to self-correct the problem. If the active monitor (AM) malfunctions, its nearest active upstream neighbor (NAUN) becomes the new active monitor (AM) and sends out a Claim Token notifying all other devices of the change in active monitor status. ST0025803A 245 Lesson 2-5: Other Network Architectures Token Ring Components Cabling The specified cable in the IEEE 802.5 Token Ring standard is 150 ohm STP. IBM Token Ring networks use UTP, STP, and fiber optic cable types. The chart below indicates the IBM cable types, their description, and common uses. IBM Cable Type Description Type 1 Two-pair 22 AWG STP wire used for conduits and outside walls Type 2 Two-pair 22 AWG STP wire for data and fourpair 26 AWG wire, outside the shield, used for telephone (voice). Commonly used for trunk cable. Type 3 Four-pair 22 or 24 AWG UTP wire, which requires a media filter for use in Token Ring networks. Susceptible to EMI since it is unshielded wire. Also can’t be used for 16 Mbs Token Ring networks. Type 5 100/140 micron two strand fiber optic cable, which is used for the main ring of Token Ring networks. Type 6 26 AWG flexible STP wire used for patch or extension cables. Type 8 Single copper core 26 AWG STP specifically designed for use under carpets. Type 9 Single pair Plenum grade 26 AWG STP fire resistant wire. Used in walls and ceilings. Token Ring Network Interface Adapter Cards Token Ring Network Adapter Cards, specialized interfaces used to connect devices on Token Ring networks are available for both 4 Mbs and 16 Mbs Token Ring networks. A 16 Mbs Token Ring NIC can be used on a 4 Mbs network; however a 16 Mbs network must use 16 Mbs adapter cards. 246 ST0025803A Internetworking Fundamentals Unit 2: LAN Configurations Multistation Access Units Multistation Access Units (SMAU), are specialized hubs (sometimes called concentrators) made specifically for Token Ring networks. These hubs have an internal wiring arrangement that allows the computers to be connected in a continuous ring. MAUs have the ability to bypass failed computer devices connected to the ring. One way a MAU knows that a device has failed is through a specialized signal that goes by the nickname Heartbeat. It is a small signal sent by the MAU to the NIC every once in a while to tell the NIC that it is still connected. Heartbeat is also used by 10BaseT NICs to tell the hub that they are still connected. Some hubs will automatically disconnect a port if there is no heartbeat signal present to keep the port alive. Typical MAUs connect eight or more computer devices and, according to standards, up to 12 MAUs can be interconnected. Adapter and Patch Cables A Token Ring adapter cable typically has a nine-pin connector at one end that attaches to the back of the NIC and a special IBM data connector that connects to the MAU at the other end. Adapter cables may also have telephone-jack-type cable connectors. Patch cables are Type 6 IBM cables that come in standard lengths of 8, 30, 75, or 150 feet. They are used to extend the distance of a computer device from the MAU, or to attach two MAUs. Media Filters A media filter is used to connect a Token Ring adapter card to an RJ-11 or RJ-45 wall jack. A media filter is required when Type 3 telephone cable is used or when a NIC card with a DB-9 interface is connected to the hub. The media filter converts different signals and reduces noise interference. Connectors Many different types of connectors are supported within a Token Ring network. The type of connector specifies the type of cabling that is acceptable. If UTP cabling is used, both the cable and connectors must have the same category rating. Token Ring connectors include the following: • DB-9 ConnectorUsed for STP cable. May be used for a trunk connection or device connection. Most commonly found on the back of a Token Ring NIC card. A DB-9 must have a media filter attached if used with UTP cable. ST0025803A 247 Lesson 2-5: Other Network Architectures DB-9 and IBM Data Connector DB-9 Connector NIC STP Cable IBM Data Connector STP Type 1 and UTP Category 5 copper cable may be used for the ring device connections. IBM Data Connector 248 • RJ-45An 8-pin standard telephone-jack-type connection used to connect UTP or STP cables. • RJ-11A 4-pin telephone-jack connector used for Type 3 cable connections. ST0025803A Internetworking Fundamentals Unit 2: LAN Configurations • Straight Tip (ST)Connector used with fiber cable . Two connectors are required per port, one transmits and one receives. Straight Tip Connector Check Your Understanding ♦ What are the advantages of a Token Ring Network? ♦ What is a token? ♦ What is a MAU? ST0025803A 249 Lesson 2-5: Other Network Architectures Fiber Distributed Data Interface (FDDI) Fiber Distributed Data Interface (FDDI) is a high speed (100 Mbs), fiber optic LAN technology that uses the token passing method to access the network. The American National Standards Institute (ANSI) developed standards for FDDI networks (X3T9.5) that address the Physical and Media Access Control sub-layers of the OSI model. It assumes the use of IEEE 802.2 Logical Link Control sublayer standard above the MAC sublayer. FDDI uses physical star, logical ring topology. FDDI is a dual ring topology that is commonly used between LANs in metropolitan area networks to provide high speed connections. Like Token Ring, FDDI uses a token frame to pass data from one station to the next around a ring until it returns to the source device; however, an additional clocking field is added to the beginning of the token. This field is added because FDDI transmissions are synchronous and require a clocking mechanism. Voice and video transmissions are examples of data that require synchronization. When a free token is available, a computer device is allowed to transmit its data. Unlike Token Ring, which can transmit only one frame at a time, with FDDI the computer device can transmit as many frames as possible until a predefined time limit is reached. When the device either has no more frames to send or the time limit is reached, it stops transmitting data and immediately releases an available token. In Token Ring, the free token was not released until after the sending device received the frame it sent indicating receipt and/or errors. Because the token is transmitted as soon as a computer device is finished transmitting frames, it is possible for a device on the ring to transmit new frames while other frames are still circulating around the ring. It is therefore possible for multiple frames from multiple devices to be on the network simultaneously. FDDI networks are commonly used to connect LANs where either EMI or distance are problems. Computer devices can be as far apart as 2 kilometers and FDDI networks can support up to 1000 devices per LAN. 250 ST0025803A Internetworking Fundamentals Unit 2: LAN Configurations FDDI Rings FDDI Dual Rings Primary ring Secondary ring The dual rings are classified as primary or secondary. Devices on FDDI networks may be connected to both primary and secondary rings or only the primary ring. If there is a malfunction on the primary ring, the secondary ring automatically wraps to the first ring forming a complete ring once again. This is referred to as “ring wrap” and is an automatic function of FDDI. A type of claim token frame is used in FDDI networks to detect errors in transmission or timing. A device connected to both the primary and secondary rings is classified as a dual-attached station or Class A station. A single-attached or Class B station, is attached to only the primary ring. Typically, a Class A station would be a hub and a Class B, a computer workstation. The Class B device would connect to the primary ring and through that connect to the hub. ST0025803A 251 Lesson 2-5: Other Network Architectures FDDI Frame Format In addition to the four token fields FDDI networks include the following fields as shown in the diagram below: FDDI Frame Format LLC-PDU SSAP DSAP Frame Information Address Address Control MAC Frame Starting Preamble Frame Delimiter 8 octets 252 1 octet Frame Control 1 octet Dest. Source. Frame End MAC MAC Information Check Frame Address Address Sequence Delimiter 2 or 6 octets 2 or 6 octets 0-4478 octets 4 octets Frame Status .5 octet 1.5 octets • Preamble: this field, which consists of all 1s, is used as a clocking mechanism and indicates the beginning of a frame. • Start Delimiter: designates the physical start of the FDDI frame. • Frame control: indicates the length of the address and the transmission type (synchronous/asynchronous and data/network information). • Destination Address field. • Source Address field. • Data: application and upper layer protocol data. • CRC: error checking frame. • End Delimiter: signifies the end of the data frame. • Frame Status field: offers further error checking. ST0025803A Internetworking Fundamentals Unit 2: LAN Configurations FDDI Media Cabling Fiber optic cable is specified as the standard for FDDI and may be single or multi-mode fiber. Single mode fiber optic cable uses laser technology and can transmit up to a maximum of 20 km without using repeaters. Multimode fiber is less expensive. Instead of laser technology, it employs LED, light emitting diode technology, and can transmit signals of to a maximum distance of 2 km. Dual Attachment Concentrator (DAC) A dual attachment concentrator is a hub used in FDDI networks that are capable of attaching to dual counter rotating rings. DACs have additional ports, called trunk ports, used to connect to additional concentrators or other FDDI computer devices. FDDI Network Adapter Cards The transceiver in FDDI networks is built into the FDDI NIC. It is a laser transceiver used to convert digital data to light impulses and vice versa. FDDI Connectors The connectors used in FDDI networks are Media Interface Connectors (MIC). There are several types of MICs. They are typically color coded to assist in allowing only desirable port connections. During installation and troubleshooting when cable connections are often moved, it is important to keep the color-coded key attached to the MIC connector. Check Your Understanding ♦ What are differences between FDDI and Token Ring networks? ST0025803A 253 Lesson 2-5: Other Network Architectures LocalTalk Since its introduction in 1984, Apple Computer has included a built-in network interface on every Macintosh. LocalTalk is a low-speed network that was designed to work in small workgroups with a few devices. The network transmits data at 230 kilobits per second, about 40 times slower than the slowest Ethernet network. Although much slower that Ethernet, LocalTalk is about four times faster than 56Kbps modems, which makes it viable for small offices with 5 – 10 users. In contrast to Ethernet use of CSMA/CD, LocalTalk uses the CSMA/CA access method. The CA (carrier avoidance) portion sends a signal on the wire to reserve the line for use. All other stations back off for a predetermined amount of time until the line is free again. LocalTalk Connector module 8-pin plug LocalTalk cable The original version of LocalTalk from Apple used a shielded 2-wire cable to transmit data. The system used a bus topology in a fashion similar to 10BASE2. Although LocalTalk is easy to install and use, it is very slow and does not support more than 253 devices and is limited to a maximum of 32 devices per daisy chain. LocalTalk Addressing LocalTalk provides three levels of addressing: node, network, and socket. Node ID You'll remember that one of the requirements of a data link layer protocol is to move data from device-to-device on a single LAN. To do so, each device on the network requires a unique address. On Ethernet and Token Ring network interface cards, this address is located in some form of nonvolatile memory. For the Macintosh, Apple chose a different approach. Instead of storing a unique network address into every Macintosh 254 ST0025803A Internetworking Fundamentals Unit 2: LAN Configurations computer, an address is dynamically assigned each time the computer is turned on. Apple calls this address a Node ID. The Node ID is a Data Link layer address that uniquely identifies each device on a single network. The Node ID is 8 bits and ranges from 0 to 255. Node IDs 0, 254, and 255 are reserved resulting in a possible 253 addresses per network. Network ID The Network ID is a Network layer address that uniquely identifies each network on an internetwork. The Network ID is 16 bits and ranges from 0 to 65,535. This allows a maximum of 65,536 networks each with 253 devices for a total of 16,580,608 devices. DIN type connectors for STP cabling and LocalTalk can now use UTP with RJ-45 connectors. The Datagram Delivery Protocol (DDP) is LocalTalk's Network layer protocol. DDP provides connectionless, best-effort data delivery and provides no acknowledgement sent to the receiver. Check Your Understanding ♦ Compare the speed of LocalTalk with Ethernet: ♦ How is LocalTalk addressing different from Ethernet and Token Ring? ARCNet Attached Resource Computer network was developed in the late 70s for small LANs as a token passing media access control network topology that transmits data at speeds 2.5 Mbs. Tokens in ARCNet networks are passed according the MAC address rather than in succession from one computer to the next computer device. ARCNet is fast becoming obsolete and many vendors no longer sell this technology, though it is sometimes still found in some small offices. Topology is either bus, star, or a combination. If bus topology is used, the maximum distance per segment is 305 meters. With the addition of an active hub that repeats the signals, the maximum distance between the computer device and the hub is 610 meters when using BNC connectors and coaxial cable and 244 meters when using twisted pair and RJ-11 or RJ-45 connectors. ST0025803A 255 Lesson 2-5: Other Network Architectures ARCNet Media ARCNet networks use coaxial, UTP, STP, and fiber optic cable although the standard cable is 93-ohm, RG-62A/U coaxial. Hybrid Architectures Incorporating more than one type of architecture when connecting and expanding LANs is not uncommon. A specialized bridge, called a translational bridge, must be used when interconnecting LANs using different data link layer protocols and different physical network media (for example, Token Ring to FDDI). It must be able to convert the frame format of one media type into the frame format of another media type. Translating Bridge FDDI T r a n s la t io n a l B r id g e Token R in g 256 ST0025803A Internetworking Fundamentals Unit 2: LAN Configurations Try It Out Ethernet or Token Ring? Materials Needed • None Write a one-page scenario about a fictitious company that is trying to decide whether it should use an Ethernet or IBM Token Ring network? Your scenario should include the following information: • Type of company • Number of employees • Network access requirements • Network reliability needs • Physical layout requirements • Type of equipment • Type and amount of data to be transmitted Should this company use an Ethernet or IBM Token Ring network? Write a one page analysis of your choice. Include in your analysis your reasons for the choice. Defend as many aspects of your choice as possible. Rubric: Suggested Evaluation Criteria and Weightings Criteria % On time delivery of assignment 10 Quality of product, including spelling, grammar, and overall appearance 20 Complete scenario 25 Thorough and accurate analysis and defense of network choice 45 TOTAL Your Score 100 ST0025803A 257 Lesson 2-5: Other Network Architectures Stretch Yourself Token Ring/FDDI Project Materials Needed • None Use your imagination and develop your own Token Ring or FDDI project. Interview an information specialist whose company uses a Token Ring or FDDI network and write a summary of your interview; write a research paper; create lyrics for a hip-hop, rap, blues, or hard rock Token Ring song; create a Token Ring or FDDI poster; build a diorama or produce a video about Token Ring networks; create a Token Ring FAQ web page; develop a power point Token Ring presentation; prepare a marketing presentation for Token Ring or FDDI networks; or, use your own idea. Make arrangements with your teacher for approval of your project and for your specific requirements. This may be either a group or an individual’s project. Agree upon a due date. Agree upon the final product. Rubric: Suggested Evaluation Criteria and Weightings Criteria % On time delivery of assignment 10 Overall appearance/presentation of final product 20 Originality and creativity 20 Accuracy of Token Ring network technical information 20 Other (teacher/student criteria for chosen project) 30 TOTAL 258 Your Score 100 ST0025803A Internetworking Fundamentals Unit 2: LAN Configurations Network Wizards Token Ring Case Study Materials Needed • None In this case study, you will have the opportunity to design a Token Ring network that meets certain specifications. The second largest video company, Blue Mood Video, is installing their first network. They have decided to install Token Ring to network their point of sale terminals for their large store. They have not decided if they need 4 or 16 Mbs. There are 5 sales terminals, 2 servers, and 2 printers. They want to connect to the Internet. STP cable was left installed by the last occupant. You have been hired to recommend the network speed and to design the network. Prepare a summary that addresses all of the network specifications and design questions. Include a one-page summary of the reasons for your choice and a diagram of the proposed network. Add this information to your portfolio. Network Specifications • The sales terminals need to respond quickly to handle the high volume of sales. • They would like to use the currently installed cable, but are not sure if it will meet their needs. • The network needs to last and not need to be replaced in the near future. • Add the servers and printers to appropriate locations within the store. • List all of the necessary equipment. • Create a diagram to show your network and all of the devices. Label devices and give them MAC addresses ST0025803A 259 Lesson 2-5: Other Network Architectures Design Questions ♦ What transmission speed did you choose? ♦ Why did you choose the ring speed? ♦ Why? ♦ What cable type did you choose? ♦ Why? ♦ What type of connector(s) did you choose to use? ♦ Why? ♦ What device did you choose to use in the center of the network? ♦ Why? Rubric: Suggested Evaluation Criteria and Weightings Criteria % On time delivery of assignment 10 Accurately addressed all network specifications. 15 Accurately addressed all design questions 15 Information placed in portfolio 10 One-page summary 20 Diagram of network 20 List of necessary equipment 10 TOTAL 260 Your Score 100 ST0025803A Internetworking Fundamentals Unit 2: LAN Configurations Summary In this unit, you learned the following: • Describe the characteristics of Token Ring architecture. • Describe the characteristics of FDDI architecture. • Describe the characteristics of ARCNet architecture. • Describe the characteristics of LocalTalk architecture. • Design a Token Ring network to specifications. • Select appropriate network architecture when given a set of specifications. ST0025803A 261 Lesson 2-5: Other Network Architectures Review Questions Name_______________________ Lesson 2-5: Other Networking Architectures Part A 1. Token Ring networks operate at a. 10, 100 or 1000 Mbps b. 4, 16, 100 or 128 Mbps c. 1 Gbps d. 10, 16 or 1000 Mbps e. 4 or 10 Mbps 2. A device may use the token frame to send data if a. The Start Delimiter is 0 b. The End Delimiter is 1 c. The hardware addresses match d. The Access Control signal is 0 e. The Start Delimiter is 1 3. The Token Ring token frame size is a. 16 bits b. 24 bits c. 32 bits d. 48 bits e. 64 bits 262 ST0025803A Internetworking Fundamentals Unit 2: LAN Configurations 4. After copying data from the token frame, a receiving device a. Releases the token b. Reads error control information from the frame c. Uses the token frame to send new data d. Destroys the token frame e. Send the frame back to the sending device 5. Token Ring networks a. Fail more often than Ethernet networks b. Fail more gracefully than Ethernet networks c. Never fail d. Cannot accept priority assignments e. Must use fiber optic cabling 6. To detect and correct errors a. Every device on a Token Ring network is an active monitor b. Each device on a Token Ring network diagnoses its own errors c. Each device gives control to its nearest active upstream neighbor d. One device is designated as the active monitor e. All devices send out a Claim Token 7. A MAU a. Connects Token Ring devices into a ring b. Turn off the ring when any connected device fails c. Route power to connected devices d. Switch traffic to neighboring networks e. Cannot connect to other MAUs ST0025803A 263 Lesson 2-5: Other Network Architectures Part B 1. FDDI operates at a. 10 Mbps b. 4 or 16 Mbps c. 100 Mbps d. 1000 Mbps e. 4.5 Mbps 2. To transport streaming media data, FDDI a. Opens a switched circuit b. Can synchronize data with a clocking field c. Can only transmit one frame when the token has been captured d. Uses fiber optic cabling 3. When an FDDI sending device has captured a token a. It can only transmit one frame b. It can transmit as many frames as it wants c. It can only transmit error diagnostics d. It can transmit frames until a time limit expires e. It releases the token 4. A secondary ring in FDDI a. Automatically steps in if the primary ring fails b. Allows priority communication to select devices c. Doubles communication speed d. Connects to Token Ring networks 264 ST0025803A Internetworking Fundamentals Unit 2: LAN Configurations Part C 1. Which computer manufacturer uses LocalTalk? a. IBM b. Digital Equipment Corporation c. Intel Corporation d. Motorola e. Apple Computer 2. LocalTalk operates at a. 230 Kbps b. 1 Mbps c. 10 Mbps d. 100 Mbps e. 1 Gbps 3. LocalTalk Node Id’s are assigned a. By the manufacturer b. By the user c. By the computer when the device is powered up d. By the computer when the device is installed e. By the server 4. LocalTalk connects using a. Fiber optic cable b. Coaxial cable c. Twisted pair cable d. Microwave radio e. Photonic switches ST0025803A 265 Lesson 2-5: Other Network Architectures Part D 1. ARCNet operates at a. 230 Kbps b. 1 Mbps c. 2.5 Mbps d. 10 Mbps e. 1 Gbps 2. ARCNet tokens are passed by a. nearest active upstream neighbor b. nearest active downstream neighbor c. Random walk d. MAC address e. NAUN computer device 3. ARCNet connects using a. Twisted pair or coaxial cable b. Fiber optic cable c. Infrared light d. Microwave radio 266 ST0025803A Internetworking Fundamentals Unit 2: LAN Configurations Scoring Rubric: Suggested Evaluation Criteria and Weightings Criteria % Part A: Describe the characteristics of Token Ring architecture. 25 Part B: Describe the characteristics of FDDI architecture. 25 Part C: Describe the characteristics of ARCNet architecture. 25 Part D Describe the characteristics of LocalTalk architecture. 25 TOTAL 100 Try It Out: Select an appropriate network architecture when given a set of specifications. 100 Stretch Yourself: Characteristics of either Token Ring, FDDI, or other architecture 100 Network Wizards: Design a Token Ring network to specifications. 100 FINAL TOTAL 400 Your Score Resources Aschermann, Robert (1998). MCSE Networking Essentials for Dummies. IDG Books Worldwide, Inc. Foster City, California. Bert, Glen (1998). MCSE Networking Essentials: Next Generation Training Second Edition. New Riders Publishing, Indianapolis, Indiana. Carol, J. T. & Love, R.D. (1995). Dedicated Token Ring. In The Token Ring Consortium Report [Online]. University of New Hamphsire InterOperability Labs. Available: www.iol.unh.edu/consortiums/tokenring/MACs_n_PHYs/Fall95/Special_Feature.ht ml. [1999, April 30]. Casad, Joe. et al. (1997). MSCE TestPrep Networking Essentials. New Riders Publishing, Indianapolis, Indiana. Chellis, James; Perkins, Charles; & Strebe, Matthew (1997). MCSE Networking Essentials Study Guide. Sybex Inc. Alameda, California. ST0025803A 267 Lesson 2-5: Other Network Architectures CMP Media, Inc. (1999). FDDI fundamentals. In Data Communications Tech Tutorials [Online]. Available: www.data.com/Tutorials/FDDI_Fundamentals [1999, April 20]. Computing and Communications Services Office, University of Illinois at Urbana-Champaign (1999). Network Administrator’s Survival Handbook. Available: www.ntx2.cso.uiuc.edu/nas/network_adminstrator.htm [1999, May 13]. Derfler, Jr., Frank J., & Freed, L. (1998). How Networks Work, Fourth Edition. Macmillan Computer Publishing/Que Corporation, Indianapolis, Indiana. Hayden, Matt. (1998). Sam's Teach Yourself Networking in 24 Hours. Sam's Publishing, Indianapolis, Indiana. Lantronix. (1999). Ethernet Tutorial. In Technology Tutorials [Online]. Available: www.lantronix.com/technology/tutorials [1999, April 20]. Lindsay, S., Rosenblum, D. & Walleigh, W. (1998). Token Ring Switching. In Technology [Online]. 3Com Corporation. Available: www.3com.com/nsc/500603.ntml [1999, April 30]. Lowe, Doug. (1998). Networking for Dummies. Third Edition. IDG Books Worldwide, Inc., Foster City, California. Microsoft Corporation (1998). Dictionary of Computer Terms, Microsoft Press, Redmond, Washington. Nortel Networks (1998). Internetworking Fundamentals: Student Guide Bay Networks Inc. Billerica, Massachusetts. Nortel Networks (1999). NetKnowledge: Internetworking Fundamentals. Nortel Networks, Billerica, Massachusetts. Palmer , Michael J. (1998) Hands-On Networking Essentials with Projects, Course Technology, Inc. Cambridge, Massachusetts. 268 ST0025803A Internetworking Fundamentals