Sei sulla pagina 1di 21

IEEE

 IEEE means Institute of Electronic and Electrical


Engineers.
 IEEE is the world’s largest professional
association dedicated to advancing technological
innovation and excellence for the benefit of humanity.
 IEEE and its members inspire a global community
through IEEE's highly cited publications, conferences,
technology standards, and professional and
educational activities.
 IEEE creates an environment where members
collaborate on world changing technologies – from computing
and sustainable energy systems, to aerospace, communications,
robotics, healthcare, and more.

 The strategic plan of IEEE is driven by an envisioned


future that realizes the full potential of the role of IEEE in
advancing technology for humanity.

 IEEE is international non profit professional


organization for the advancement of technology related to
electricity.

 The IEEE Brand Identity Toolkit explains the basic


usage rules for all corporate identity elements and how to
utilize them to create powerful and consistent communications
pieces.
Awards and recognitions

For over a century, the IEEE has sponsored various


programs to honored achievements in education,
industry, research and service. These awards and
recognitions each have a unique mission and criteria,
and offer the opportunity to honor distinguished
colleagues, dedicated teachers, and corporate leaders
who have made a lasting impact on humanity,
technology, and the profession.
IEEE STANDARDS

 In 1985 computer society of IEEE gave a set of


standards for intercommunication of equipments given
by various manufacturers.

 The project initiated was named as project 802. The


project doesn’t modify the original standards given by OSI
model or Internet model.1
IEEE SUBDIVISION

The IEEE has subdivided the data link layer into two
sublayers:

 Logical Link Control(LLC)


 Medium Access Control(MAC)
OSI MODEL PROJECT 802

UPPER LAYERS UPPER LAYERS

LOGICAL LINK
CONTROL(LLC)
DATA LINK
Ethernet Token Bus Token Ring
LAYER
MAC MAC MAC

Ethernet Token Bus Token Ring


PHYSICAL PHYSICAL PHYSICAL PHYSICAL
LAYER LAYER LAYER LAYER
IEEE STANDARDS

LOGICAL LINK CONTROL(LLC)


 IEEE 802.2 LLC is the upper sublayer of the data link layer.
 The LLC provide one single data link control protocol for all IEEE LANs.
 It defined flow control, error control & part of framing duties.

MEDIUM ACCESS CONTROL(MAC)

 IEEE 802.2 MAC is the lower sublayer of the data link layer.
 It contains the synchronization, flag, flow and error control
specifications necessary to move information from one place to another, as
well as the physical address of the next station to receive and route a
packet.
Subdivision of IEEE Project 802

IEEE 802.3 Ethernet


IEEE 802.4 Token Bus
IEEE 802.5 Token Ring
IEEE 802.6 MAN
CSMA/CD

•CSMA/CD (Carrier Sense Multiple Access / Collision


Detection) is the protocol used in Ethernet networks to
ensure that only one network node is transmitting on the
network wire at any one time.
•Carrier Sense means that every Ethernet device listens to
the Ethernet wire before it attempts to transmit. If the
Ethernet device senses that another device is transmitting, it
will wait to transmit.
•Multiple Access means that more than one Ethernet device
can be sensing (listening and waiting to transmit) at a time.
•Collision Detection means that when multiple Ethernet
devices accidentally transmit at the same time, they are able
to detect this error.
•Carrier Sense Multiple Access with Collision Detection is the basis
for the Ethernet standard, and this provides specific rules for
allowing stations to communicate over the same transmission medium.
There are a number of steps involved in communicating with CSMA/CD.
Stations must listen for a carrier on the wire. If no carrier is
detected, stations can begin transmitting. While transmitting, the
station continues to listen on the wire to ensure successful
communications. If two stations attempt to transmit information at
the same time, the transmissions overlap and cause a collision.
If a collision occurs, the transmitting station recognizes the
interference on the network and transmits a bit sequence called
jam. The jam helps to ensure that the other transmitting station
recognizes that a collision has occurred. After a random delay, the
stations attempt to retransmit the information and the process
begins again.
How Collisions Occur under CSMA/CD
•Imagine a very simple Ethernet network with only
two nodes.
•Each node, independently, decides to send an
Ethernet frame to the other node.
•Both nodes listen to the Ethernet wire and sense that
no carrier is present.
•Both nodes transmit simultaneously, causing a
collision.
•Both nodes detect the collision and each node waits a
random amount of time before transmitting again.
•Collisions are normal on an Ethernet network. A small
amount of collisions are expected in the protocol design.
•If too many nodes are transmitting on an Ethernet
network the number of collisions can rise to an
unacceptable level. This can reduce the amount of
available bandwidth on an Ethernet network because so
much bandwidth is lost in retransmission.
•Ethernet switches greatly reduce the already minor
difficulties experienced with the CSMA/CD protocol.
TOKEN RING

•Token ring local area network (LAN) technology is a


local area network protocol which resides at the data
link layer (DLL) of the OSI model.
• It uses a special three-byte frame called a token that
travels around the ring.
• Token ring frames travel completely around the loop
Active and standby monitors
Every station in a token ring network is either an active
monitor (AM) or standby monitor (SM) station.
However, there can be only one active monitor on a ring
at a time. The active monitor is chosen through an
election or monitor contention process.
The monitor contention process is initiated when a loss
of signal on the ring is detected. an active monitor
station is not detected by other stations on the ring. a
particular timer on an end station expires such as the
case when a station hasn't seen a token frame in the past
7 seconds.
When any of the above conditions take place and a station
decides that a new monitor is needed, it will transmit a
"claim token" frame, announcing that it wants to become
the new monitor. If that token returns back to the sender,
it is OK for it to become the monitor. If some other station
tries to become the monitor at the same time then the
station with the highest MAC address will win the
election process. Every other station becomes a standby
monitor. All stations must be capable of becoming an
active monitor station if necessary.
The active monitor performs a number of ring
administration functions. The first function is to operate
as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire.
Another function of the AM is to insert a 24-bit delay
into the ring, to ensure that there is always sufficient
buffering in the ring for the token to circulate. A third
function for the AM is to ensure that exactly one token
circulates whenever there is no frame being transmitted,
and to detect a broken ring. Lastly, the AM is
responsible for removing circulating frames from the
ring.
Token ring insertion process
Token ring stations must go through a 5-phase ring
insertion process before being allowed to participate in
the ring network. If any of these phases fail, the token
ring station will not insert into the ring and the token ring
driver may report an error.
Phase 0 (Lobe Check) — A station first performs a lobe
media check. A station is wrapped at the MSAU and is
able to send 2000 test frames down its transmit pair
which will loop back to its receive pair. The station
checks to ensure it can receive these frames without
error.
Phase 1 (Physical Insertion) — A station then sends a
5 volt signal to the MSAU to open the relay.

Phase 2 (Address Verification) — A station then


transmits MAC frames with its own MAC address in the
destination address field of a token ring frame. When
the frame returns and if the address copied , the station
must participate in the periodic (every 7 seconds) ring
poll process. This is where stations identify themselves
on the network as part of the MAC management
functions.
Phase 3 (Participation in ring poll) — A station learns
the address of its Nearest Active Upstream Neighbour
(NAUN) and makes its address known to its nearest
downstream neighbour, leading to the creation of the
ring map. Station waits until it receives an AMP or SMP
frame with the ARI and FCI bits set to 0. When it does,
the station flips both bits (ARI and FCI) to 1, if enough
resources are available, and queues an SMP frame for
transmission. If no such frames are received within 18
seconds, then the station reports a failure to open and
de-inserts from the ring. If the station successfully
participates in a ring poll, it proceeds into the final
phase of insertion, request initialization.
Phase 4 (Request Initialization) — Finally a station
sends out a special request to a parameter server to
obtain configuration information. This frame is sent to
a special functional address, typically a token ring
bridge, which may hold timer and ring number
information with which to tell the new station about.

Potrebbero piacerti anche