IEEE802.a
IEEE802.a
IEEE802.a
3
There are a number of versions of IEEE 802.3 protocol. The most popular ones are.
IEEE 802.3: This was the original standard given for 10BASE-5. It used a thick single coaxial cable into which a
connection can be tapped by drilling into the cable to the core. Here, 10 is the maximum throughput, i.e. 10
Mbps, BASE denoted use of baseband transmission, and 5 refers to the maximum segment length of 500m.
IEEE 802.3a: This gave the standard for thin coax (10BASE-2), which is a thinner variety where the segments
of coaxial cables are connected by BNC connectors. The 2 refers to the maximum segment length of about 200m
(185m to be precise).
IEEE 802.3i: This gave the standard for twisted pair (10BASE-T) that uses unshielded twisted pair (UTP)
copper wires as physical layer medium. The further variations were given by IEEE 802.3u for 100BASE-TX,
100BASE-T4 and 100BASE-FX.
IEEE 802.3i: This gave the standard for Ethernet over Fiber (10BASE-F) that uses fiber optic cables as medium
of transmission
Preamble: It is a 7 bytes starting field that provides alert and timing pulse for transmission.
Start of Frame Delimiter: It is a 1 byte field that contains an alternating pattern of ones and zeros ending with
two ones.
Destination Address: It is a 6 byte field containing physical address of destination stations.
Source Address: It is a 6 byte field containing the physical address of the sending station.
Length: It a 7 bytes field that stores the number of bytes in the data field.
Data: This is a variable sized field carries the data from the upper layers. The maximum size of data field is 1500
bytes.
Padding: This is added to the data to bring its length to the minimum requirement of 46 bytes.
CRC: CRC stands for cyclic redundancy check. It contains the error detection information.
Decreased Efficiency at High Loads: If the number of devices in the network rises, then the
collision incidences are more frequent, hence pulling down the efficiency and the throughput of
large networks.
Not Suitable for Real-Time Applications: Due to the fact that it is a collision-based system, IEEE
802. 3 is not good for real-time operation requirements such as video conferencing and live
streaming, playing games, and so on.
Limited Priority Support: Many networks do not have a mechanism of identifying which of the
data packets is more important than others. This is particularly the case where several packages of
data have to get to a specific destination before other nonurgent packages like videos or voice do.
Token Bus (IEEE 802.4) Network
Token Bus (IEEE 802.4) is a standard for implementing token ring over the virtual ring in LANs.
The physical media has a bus or a tree topology and uses coaxial cables. A virtual ring is created
with the nodes/stations and the token is passed from one node to the next in a sequence along
this virtual ring. Each node knows the address of its preceding station and its succeeding station.
A station can only transmit data when it has the token. The working principle of the token bus is
similar to Token Ring.
High Efficiency Under Heavy Load: Token Bus networks are specifically ideal for high-traffic
networks, as collisions are completely eliminated notwithstanding the size of the network.
Prioritization of Stations: Standard: IEEE 802. 4 It makes some stations have charge over others
so as to ensure that the important jobs are processed first. This is important, especially in
industrial applications or the overall network, when some or certainly certain data has to be
updated in real time, for instance.
Real-Time Traffic Support: This is because it allows real-time data transfer since the token
allows only those who have authorized access to the network; it is therefore ideal in the industrial
area that needs frequent data transfer.
Less Flexibility: Logical ring also suggests that for opposing Ethernet networks, adding or
removing the stations in the network is complicated.
Obsolete in Modern Networks: Today the token bus networks are not widely used due to
Ethernet and are very easily substitutive by others faster, cheaper, and simpler networks.
Transmission – Unidirectional
Start frame delimiter (SFD) – Alerts each station for the arrival of token(or data frame) or start
of the frame. It is used to synchronize clocks.
Access control (AC) –
Priority bits and reservation bits help in implementing priority. Priority bits = reservation bits = 3. Eg:-
server is given priority = 7 and client is given priority = 0.
Token bit is used to indicate presence of token frame. If token bit = 1 –> token frame and if token bit = 0
–> not a token frame.
Monitor bit helps in solving orphan packet problem. It is covered by CRC as monitor are powerful
machines which can recalculate CRC when modifying monitor bit. If monitor bit = 1 –> stamped by
monitor and if monitor bit = 0 –> not yet stamped by monitor.
Frame control (FC) – First 2 bits indicates whether the frame contains data or control
information. In control frames, this byte specifies the type of control information.
Destination address (DA) and Source address (SA) – consist of two 6-byte fields which is used
to indicate MAC address of source and destination.
Data – Data length can vary from 0 to maximum token holding time (THT) according to token
reservation strategy adopted. Token ring imposes no lower bound on size of data i.e. an advantage
over Ethernet.
Cyclic redundancy check (CRC) – 32 bit CRC which is used to check for errors in the frame,
i.e., whether the frame is corrupted or not. If the frame is corrupted, then its discarded.
End delimiter (ED) – It is used to mark the end of frame. In Ethernet, length field is used for this
purpose. It also contains bits to indicate a damaged frame and identify the frame that is the last in
a logical sequence.
It makes use of 2 copies of AC bits are used as a error detection mechanism (100% redundancy)
as CRC does not cover FS byte so that destination does not have to recalculate CRC when
modifying AC bits.
No Collision: Like in Token Bus, Token Ring does not have collision data in the network
because only one station sends data in the network at a particular period of time.
Support for Large Data Transfers: Other vile standards which he pointed that regulated the
size of fields in the data frames differed from the IEEE 802. 5 is for variable size data frames
which makes its use useful in instances that involve large data frames such as file transfer or a
video stream.
Real-Time and Interactive Applications: Because there is no limit in data field size and very
efficient network topology, Token Ring most suits for real-time applications like video
conferencing, online games, and client-server activities.
Moderate Complexity: Relative to the other network, the token ring can be considered as
moderate complex because, in order for the communication between the stations to occur
properly, modems are needed. This is time-consuming and expensive, hence contributing to the
total cost of developing the network.
Dependency on Token: Of course, the entire network is associated with the functionality of the
token. The problem with this setup is that if the token has been lost or becomes corrupted, the
network halts and would take time before sorting, which in the process creates downtimes.
Less Popular in Modern Networks: Token Ring networks are comparatively costly and
elaborate than the Ethernet networks and hence are not so widely used as the latter. Ethernet
dominates current-day networks because of the simplicity of the technology and the fact that it is
cheaper than the token ring.
Topology used in
Topology used in IEEE Topology used in IEEE 802.5
IEEE 802.4 is Bus
802.3 is Bus Topology. is Ring Topology.
or Tree Topology.
Minimum frame required is It can handle short It supports both short and
64 bytes. minimum frames. large frames.
Modems are
Like IEEE 802.4, modems
Modems are not required. required in this
are also required in it.
standard.
IEEE 802.3 IEEE 802.4 IEEE 802.5