SlideShare une entreprise Scribd logo
1  sur  18
Télécharger pour lire hors ligne
ETHERNET
•Ethernet is the most widely-installed local area
network ( LAN) technology.
•Specified in a standard, IEEE 802.3, Ethernet was
originally developed by Xerox from an earlier
specification called Alohanet and then developed
further by Xerox, DEC, and Intel.
•An Ethernet LAN typically uses coaxial cable or
special grades of twisted pair wires.
•The most commonly installed Ethernet systems are
called 10BASE-T and provide transmission speeds up
to 10 Mbps
•The Fast Ethernet standard (IEEE 802.3u) has
been established for Ethernet networks that
need higher transmission speeds.
•This standard raises the Ethernet speed limit
from 10 Mbps to 100 Mbps with only minimal
changes to the existing cable structure.
•Fast Ethernet provides faster throughput for
video, multimedia, graphics, Internet surfing
and stronger error detection and correction.
•Gigabit Ethernet was developed to meet the need
for faster communication networks with
applications such as multimedia
•The most important differences between Gigabit
Ethernet and Fast Ethernet include the
additional support of full duplex operation in
the MAC layer and the data rates.
•10 Gigabit Ethernet is the fastest and
most recent of the Ethernet standards.
IEEE 802.3ae defines a version of Ethernet
with a nominal rate of 10Gbits/s that
makes it 10 times faster than Gigabit
Ethernet.
Ethernet,token ring
Ethernet,token ring
A Token Ring network is a local area network (LAN) in
which all computers are connected in a ring or star
topology and a bit- or token-passing scheme is used in
order to prevent the collision of data between two
computers that want to send messages at the same time.
The Token Ring protocol is the second most widely-used
protocol on local area networks after Ethernet. The
IBM Token Ring protocol led to a standard version,
specified as IEEE 802.5. Both protocols are used and
are very similar. The IEEE 802.5 Token Ring technology
provides for data transfer rates of either 4 or 16
megabits per second.
Very briefly, here is how it works:
•Empty information frames are continuously
circulated on the ring.
•When a computer has a message to send, it
inserts a token in an empty frame (this may
consist of simply changing a 0 to a 1 in the
token bit part of the frame) and inserts a
message and a destination identifier in the
frame.
•The frame is then examined by each successive
workstation. If the workstation sees that it is the
destination for the message, it copies the
message from the frame and changes the token
back to 0.
•When the frame gets back to the originator, it
sees that the token has been changed to 0 and
that the message has been copied and received.
It removes the message from the frame.
•The frame continues to circulate as an "empty"
frame, ready to be taken by a workstation when it
has a message to send.
•The token scheme can also be used with bus
topology LANs.
Ethernet,token ring
Ethernet,token ring
Ethernet,token ring
•Fiber channel is the general name of an
integrated set of standards being developed by
the American National Standards Institute (ANSI).
• The fiber channel standard defines a high-speed
data transfer interface that can be used to
connect workstations, mainframes, supercomputers,
storage devices, and displays.
•The fiber channel standard addresses the need for
very fast transfers (up to 1 gigabit per second)
of large amounts of information.
• Currently, fiber channel's main use is as an
interface to storage.
Ethernet,token ring
Ethernet,token ring
Ethernet,token ring

Contenu connexe

Tendances

IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11Keshav Maheshwari
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptshanthishyam
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaMukesh Chinta
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networksguesta81d4b
 
Carrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CACarrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CASoumen Santra
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)Hinal Lunagariya
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layerNaiyan Noor
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer ProtocolsMeenakshi Paul
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIPNaveen Kumar
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol Akhil .B
 
Public Switched Telephone Network
Public Switched Telephone NetworkPublic Switched Telephone Network
Public Switched Telephone NetworkHaither Mithath
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSDr. SELVAGANESAN S
 
MOBILE COMMUNICATION
MOBILE COMMUNICATIONMOBILE COMMUNICATION
MOBILE COMMUNICATIONjunnubabu
 

Tendances (20)

IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11IEEE standards 802.3.&802.11
IEEE standards 802.3.&802.11
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
Data link layer
Data link layer Data link layer
Data link layer
 
Physical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission MediaPhysical layer OSI Model & Transmission Media
Physical layer OSI Model & Transmission Media
 
Network Layer,Computer Networks
Network Layer,Computer NetworksNetwork Layer,Computer Networks
Network Layer,Computer Networks
 
Carrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CACarrier-sense multiple access with collision avoidance CSMA/CA
Carrier-sense multiple access with collision avoidance CSMA/CA
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
Mac layer
Mac  layerMac  layer
Mac layer
 
Chapter 4 data link layer
Chapter 4 data link layerChapter 4 data link layer
Chapter 4 data link layer
 
ETHERNET
ETHERNETETHERNET
ETHERNET
 
19 Network Layer Protocols
19 Network Layer Protocols19 Network Layer Protocols
19 Network Layer Protocols
 
HDLC, PPP and SLIP
HDLC, PPP and SLIPHDLC, PPP and SLIP
HDLC, PPP and SLIP
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
TCP- Transmission Control Protocol
TCP-  Transmission Control Protocol TCP-  Transmission Control Protocol
TCP- Transmission Control Protocol
 
Public Switched Telephone Network
Public Switched Telephone NetworkPublic Switched Telephone Network
Public Switched Telephone Network
 
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESSComputer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
Computer Networks Unit 2 UNIT II DATA-LINK LAYER & MEDIA ACCESS
 
MOBILE COMMUNICATION
MOBILE COMMUNICATIONMOBILE COMMUNICATION
MOBILE COMMUNICATION
 
HDLC
HDLCHDLC
HDLC
 
Data link layer
Data link layerData link layer
Data link layer
 
Mobile Transport layer
Mobile Transport layerMobile Transport layer
Mobile Transport layer
 

En vedette

Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentationViet Nguyen
 
Ieee 802.1 standards ether types
Ieee 802.1 standards   ether typesIeee 802.1 standards   ether types
Ieee 802.1 standards ether typesminhhv
 
Network selection techniques:SAW and TOPSIS
Network selection techniques:SAW and TOPSISNetwork selection techniques:SAW and TOPSIS
Network selection techniques:SAW and TOPSISYashwant Dagar
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standardslyndyv
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsbhavanatmithun
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Mohammed Abuibaid
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5Pnkj_Sharma
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)Tutun Juhana
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksPradeep Kumar TS
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission MediaSyed Ahmed Zaki
 

En vedette (20)

Ethernet - Networking presentation
Ethernet - Networking presentationEthernet - Networking presentation
Ethernet - Networking presentation
 
Ieee 802.1 standards ether types
Ieee 802.1 standards   ether typesIeee 802.1 standards   ether types
Ieee 802.1 standards ether types
 
Network selection techniques:SAW and TOPSIS
Network selection techniques:SAW and TOPSISNetwork selection techniques:SAW and TOPSIS
Network selection techniques:SAW and TOPSIS
 
WLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDSWLAN AND IEEE STANDARDS
WLAN AND IEEE STANDARDS
 
IEEE WLAN standards
IEEE WLAN standardsIEEE WLAN standards
IEEE WLAN standards
 
Csma
CsmaCsma
Csma
 
Csmaca
CsmacaCsmaca
Csmaca
 
Token ring
Token ringToken ring
Token ring
 
Iso osi and tcp-ip reference models
Iso osi and tcp-ip reference modelsIso osi and tcp-ip reference models
Iso osi and tcp-ip reference models
 
Token ring
Token ringToken ring
Token ring
 
Token ring 802.5
Token ring 802.5Token ring 802.5
Token ring 802.5
 
Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)Carrier Sense Multiple Access (CSMA)
Carrier Sense Multiple Access (CSMA)
 
Osi model
Osi modelOsi model
Osi model
 
Csma
CsmaCsma
Csma
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
OSI Reference Model and TCP/IP (Lecture #3 ET3003 Sem1 2014/2015)
 
IEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer NetworksIEEE 802 Standard for Computer Networks
IEEE 802 Standard for Computer Networks
 
CSMA/CD
CSMA/CDCSMA/CD
CSMA/CD
 
Presentation on Transmission Media
Presentation on Transmission MediaPresentation on Transmission Media
Presentation on Transmission Media
 
Ipv4 ppt
Ipv4 pptIpv4 ppt
Ipv4 ppt
 

Similaire à Ethernet,token ring (20)

IEEE standard
IEEE standardIEEE standard
IEEE standard
 
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & TechniciansAdvanced TCP/IP-based Industrial Networking for Engineers & Technicians
Advanced TCP/IP-based Industrial Networking for Engineers & Technicians
 
5 IEEE standards
5  IEEE standards5  IEEE standards
5 IEEE standards
 
Local Area Network – Wired LAN
Local Area Network – Wired LANLocal Area Network – Wired LAN
Local Area Network – Wired LAN
 
Best fit topology - lo1 part iv
Best fit topology - lo1 part ivBest fit topology - lo1 part iv
Best fit topology - lo1 part iv
 
IEEE Standards
IEEE StandardsIEEE Standards
IEEE Standards
 
Lan basic
Lan basicLan basic
Lan basic
 
Ieee 802 standard
Ieee 802 standardIeee 802 standard
Ieee 802 standard
 
Network protocols
Network protocolsNetwork protocols
Network protocols
 
Cct203 lesson 10
Cct203 lesson 10Cct203 lesson 10
Cct203 lesson 10
 
I017554954
I017554954I017554954
I017554954
 
QSpiders - Dod Model
QSpiders - Dod ModelQSpiders - Dod Model
QSpiders - Dod Model
 
Introduction to network security and lan technology
Introduction to network security and lan technologyIntroduction to network security and lan technology
Introduction to network security and lan technology
 
somaya akter 1834902142
somaya akter 1834902142somaya akter 1834902142
somaya akter 1834902142
 
WIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALAWIRELESS INTERNET BY SAIKIRAN PANJALA
WIRELESS INTERNET BY SAIKIRAN PANJALA
 
IEEE presentation
IEEE presentationIEEE presentation
IEEE presentation
 
Ethernet
EthernetEthernet
Ethernet
 
Ethernet - LAN
Ethernet - LANEthernet - LAN
Ethernet - LAN
 
Types of interfaces in a Cisco Router
Types of interfaces in a Cisco RouterTypes of interfaces in a Cisco Router
Types of interfaces in a Cisco Router
 
Hardware8
Hardware8Hardware8
Hardware8
 

Plus de Hareem Naz

How to make your wife happy
How to make your wife happyHow to make your wife happy
How to make your wife happyHareem Naz
 
How to make your wife happy
How to make your wife happyHow to make your wife happy
How to make your wife happyHareem Naz
 
How to make your wife happy
How to make your wife happyHow to make your wife happy
How to make your wife happyHareem Naz
 
How to make your wife happy
How to make your wife happyHow to make your wife happy
How to make your wife happyHareem Naz
 
Message towards success
Message towards successMessage towards success
Message towards successHareem Naz
 
Message towards success
Message towards successMessage towards success
Message towards successHareem Naz
 
Message towards success
Message towards successMessage towards success
Message towards successHareem Naz
 
Message towards success
Message towards successMessage towards success
Message towards successHareem Naz
 
Message towards success
Message towards successMessage towards success
Message towards successHareem Naz
 
Message towards success
Message towards successMessage towards success
Message towards successHareem Naz
 
Message towards success
Message towards successMessage towards success
Message towards successHareem Naz
 
Islamic quotes
Islamic quotesIslamic quotes
Islamic quotesHareem Naz
 
Islam is a peaceful religion
Islam is a peaceful religionIslam is a peaceful religion
Islam is a peaceful religionHareem Naz
 
Islamic quotes
Islamic quotesIslamic quotes
Islamic quotesHareem Naz
 

Plus de Hareem Naz (20)

How to make your wife happy
How to make your wife happyHow to make your wife happy
How to make your wife happy
 
How to make your wife happy
How to make your wife happyHow to make your wife happy
How to make your wife happy
 
How to make your wife happy
How to make your wife happyHow to make your wife happy
How to make your wife happy
 
How to make your wife happy
How to make your wife happyHow to make your wife happy
How to make your wife happy
 
State diagram
State diagramState diagram
State diagram
 
State diagram
State diagramState diagram
State diagram
 
State diagram
State diagramState diagram
State diagram
 
Use case
Use caseUse case
Use case
 
Message towards success
Message towards successMessage towards success
Message towards success
 
Message towards success
Message towards successMessage towards success
Message towards success
 
Message towards success
Message towards successMessage towards success
Message towards success
 
Message towards success
Message towards successMessage towards success
Message towards success
 
Message towards success
Message towards successMessage towards success
Message towards success
 
Message towards success
Message towards successMessage towards success
Message towards success
 
Message towards success
Message towards successMessage towards success
Message towards success
 
Message
MessageMessage
Message
 
Islamic quotes
Islamic quotesIslamic quotes
Islamic quotes
 
Islam is a peaceful religion
Islam is a peaceful religionIslam is a peaceful religion
Islam is a peaceful religion
 
Message
MessageMessage
Message
 
Islamic quotes
Islamic quotesIslamic quotes
Islamic quotes
 

Dernier

Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecTrupti Shiralkar, CISSP
 
Graphics Primitives and CG Display Devices
Graphics Primitives and CG Display DevicesGraphics Primitives and CG Display Devices
Graphics Primitives and CG Display DevicesDIPIKA83
 
How to Write a Good Scientific Paper.pdf
How to Write a Good Scientific Paper.pdfHow to Write a Good Scientific Paper.pdf
How to Write a Good Scientific Paper.pdfRedhwan Qasem Shaddad
 
Gender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 ProjectGender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 Projectreemakb03
 
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....santhyamuthu1
 
A Seminar on Electric Vehicle Software Simulation
A Seminar on Electric Vehicle Software SimulationA Seminar on Electric Vehicle Software Simulation
A Seminar on Electric Vehicle Software SimulationMohsinKhanA
 
Design of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptxDesign of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptxYogeshKumarKJMIT
 
Vertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptx
Vertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptxVertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptx
Vertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptxLMW Machine Tool Division
 
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...Sean Meyn
 
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS Bahzad5
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Amil baba
 
EPE3163_Hydro power stations_Unit2_Lect2.pptx
EPE3163_Hydro power stations_Unit2_Lect2.pptxEPE3163_Hydro power stations_Unit2_Lect2.pptx
EPE3163_Hydro power stations_Unit2_Lect2.pptxJoseeMusabyimana
 
UNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptxUNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptxrealme6igamerr
 
Phase noise transfer functions.pptx
Phase noise transfer      functions.pptxPhase noise transfer      functions.pptx
Phase noise transfer functions.pptxSaiGouthamSunkara
 
IT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptxIT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptxSAJITHABANUS
 
Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Bahzad5
 

Dernier (20)

Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSecGuardians and Glitches: Navigating the Duality of Gen AI in AppSec
Guardians and Glitches: Navigating the Duality of Gen AI in AppSec
 
Graphics Primitives and CG Display Devices
Graphics Primitives and CG Display DevicesGraphics Primitives and CG Display Devices
Graphics Primitives and CG Display Devices
 
How to Write a Good Scientific Paper.pdf
How to Write a Good Scientific Paper.pdfHow to Write a Good Scientific Paper.pdf
How to Write a Good Scientific Paper.pdf
 
Gender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 ProjectGender Bias in Engineer, Honors 203 Project
Gender Bias in Engineer, Honors 203 Project
 
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
SATELITE COMMUNICATION UNIT 1 CEC352 REGULATION 2021 PPT BASICS OF SATELITE ....
 
A Seminar on Electric Vehicle Software Simulation
A Seminar on Electric Vehicle Software SimulationA Seminar on Electric Vehicle Software Simulation
A Seminar on Electric Vehicle Software Simulation
 
Design of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptxDesign of Clutches and Brakes in Design of Machine Elements.pptx
Design of Clutches and Brakes in Design of Machine Elements.pptx
 
Vertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptx
Vertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptxVertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptx
Vertical- Machining - Center - VMC -LMW-Machine-Tool-Division.pptx
 
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
Quasi-Stochastic Approximation: Algorithm Design Principles with Applications...
 
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS GENERAL CONDITIONS  FOR  CONTRACTS OF CIVIL ENGINEERING WORKS
GENERAL CONDITIONS FOR CONTRACTS OF CIVIL ENGINEERING WORKS
 
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
Popular-NO1 Kala Jadu Expert Specialist In Germany Kala Jadu Expert Specialis...
 
計劃趕得上變化
計劃趕得上變化計劃趕得上變化
計劃趕得上變化
 
Lecture 4 .pdf
Lecture 4                              .pdfLecture 4                              .pdf
Lecture 4 .pdf
 
EPE3163_Hydro power stations_Unit2_Lect2.pptx
EPE3163_Hydro power stations_Unit2_Lect2.pptxEPE3163_Hydro power stations_Unit2_Lect2.pptx
EPE3163_Hydro power stations_Unit2_Lect2.pptx
 
UNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptxUNIT4_ESD_wfffffggggggggggggith_ARM.pptx
UNIT4_ESD_wfffffggggggggggggith_ARM.pptx
 
Lecture 2 .pdf
Lecture 2                           .pdfLecture 2                           .pdf
Lecture 2 .pdf
 
Phase noise transfer functions.pptx
Phase noise transfer      functions.pptxPhase noise transfer      functions.pptx
Phase noise transfer functions.pptx
 
IT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptxIT3401-WEB ESSENTIALS PRESENTATIONS.pptx
IT3401-WEB ESSENTIALS PRESENTATIONS.pptx
 
Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)Lecture 1: Basics of trigonometry (surveying)
Lecture 1: Basics of trigonometry (surveying)
 
Présentation IIRB 2024 Marine Cordonnier.pdf
Présentation IIRB 2024 Marine Cordonnier.pdfPrésentation IIRB 2024 Marine Cordonnier.pdf
Présentation IIRB 2024 Marine Cordonnier.pdf
 

Ethernet,token ring

  • 2. •Ethernet is the most widely-installed local area network ( LAN) technology. •Specified in a standard, IEEE 802.3, Ethernet was originally developed by Xerox from an earlier specification called Alohanet and then developed further by Xerox, DEC, and Intel. •An Ethernet LAN typically uses coaxial cable or special grades of twisted pair wires. •The most commonly installed Ethernet systems are called 10BASE-T and provide transmission speeds up to 10 Mbps
  • 3. •The Fast Ethernet standard (IEEE 802.3u) has been established for Ethernet networks that need higher transmission speeds. •This standard raises the Ethernet speed limit from 10 Mbps to 100 Mbps with only minimal changes to the existing cable structure. •Fast Ethernet provides faster throughput for video, multimedia, graphics, Internet surfing and stronger error detection and correction.
  • 4. •Gigabit Ethernet was developed to meet the need for faster communication networks with applications such as multimedia •The most important differences between Gigabit Ethernet and Fast Ethernet include the additional support of full duplex operation in the MAC layer and the data rates.
  • 5. •10 Gigabit Ethernet is the fastest and most recent of the Ethernet standards. IEEE 802.3ae defines a version of Ethernet with a nominal rate of 10Gbits/s that makes it 10 times faster than Gigabit Ethernet.
  • 8. A Token Ring network is a local area network (LAN) in which all computers are connected in a ring or star topology and a bit- or token-passing scheme is used in order to prevent the collision of data between two computers that want to send messages at the same time. The Token Ring protocol is the second most widely-used protocol on local area networks after Ethernet. The IBM Token Ring protocol led to a standard version, specified as IEEE 802.5. Both protocols are used and are very similar. The IEEE 802.5 Token Ring technology provides for data transfer rates of either 4 or 16 megabits per second.
  • 9. Very briefly, here is how it works: •Empty information frames are continuously circulated on the ring. •When a computer has a message to send, it inserts a token in an empty frame (this may consist of simply changing a 0 to a 1 in the token bit part of the frame) and inserts a message and a destination identifier in the frame.
  • 10. •The frame is then examined by each successive workstation. If the workstation sees that it is the destination for the message, it copies the message from the frame and changes the token back to 0. •When the frame gets back to the originator, it sees that the token has been changed to 0 and that the message has been copied and received. It removes the message from the frame.
  • 11. •The frame continues to circulate as an "empty" frame, ready to be taken by a workstation when it has a message to send. •The token scheme can also be used with bus topology LANs.
  • 15. •Fiber channel is the general name of an integrated set of standards being developed by the American National Standards Institute (ANSI). • The fiber channel standard defines a high-speed data transfer interface that can be used to connect workstations, mainframes, supercomputers, storage devices, and displays. •The fiber channel standard addresses the need for very fast transfers (up to 1 gigabit per second) of large amounts of information. • Currently, fiber channel's main use is as an interface to storage.