You are on page 1of 68

Overview

LAN communications defined


A fundamental requirement of any LAN is a transmission channel. Once this channel has been put into place, the next step is to use it to allow stations to communicateto transmit data, exchange files and messages, and to monitor and manage the network. There are three basic configurations for the transmission of data: A point-to-point connection, where two computers or a computer and a peripheral device are directly attached to each other. A LAN, which is usually a shared data communications facility. Here, a number of stations can attach to the transmission channel but only one can successfully transmit at a time. A WAN (Wide Area Network) which represents communication between LANs over extended geographic distances. Often, the communications channels used for WAN activity are owned by a third party, such as a telephone company.

For all of the above configurations, the interface between the devices must either be the same, or appropriate hardware/software must be provided to convert the coding, formatting, framing and protocols between the different systems. The focus of this chapter is on how communications are achieved between stations on a LAN.

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Communications terminology
Asynchronous communications. Each data character is coded as a string of bits and characters are separated by start-character bit(s) and stop bit(s). Synchronous communications. No start and stop bits are used. Groups of bits are separated using a clocking mechanism. That is, the sending and receiving stations are in synch with each other. Error detection and correction. Techniques to permit a station to detect corrupted data and initiate a retransmission. Bandwidth. A measure of data throughput. The information transmission capacity of the transmission system, typically measured in Megabits per second (Mbps) in LAN environments. Packets/Frames/Datagrams. A package of data with header informationtypically, source and destination addresses, error correction information, sequence numbers and other information. Sent and received by stations on a LAN. Bit stream. A series of binary 0s and 1s, representing the message being communicated.

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Communications standards organizations


American National Standards Institute (ANSI)
ANSI is responsible for the development of both the FDDI (Fiber Distributed Data Interface) and the TP-PMD (Twisted-Pair- Physical Medium Dependent) LAN standards. Both of these technologies operate at 100 Mbps, FDDI over optical fiber cabling and TP-PMD over twistedpair cabling. They are discussed in greater detail in a later chapter.

Comite Consultatif Internationale de Telegraphique et Telephonique (CCITT)


More commonly known in English as the Consultative Committee on International Telegraphy and Telephony. The CCITT forms part of the International Telecommunications Union (ITU), based in Geneva, Switzerland. The ITU is a United Nations agency and all UN members belong to the ITU. The job of the CCITT is to study, recommend and standardize technical and operational issues for telecommunications. The activities of the CCITT can be divided into three areas: Study Groups Their focus is to set standards for telecommunications equipment, systems, networks and services.

CCITT, continued

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Plan Committees (World Plan and Regional Plan Committees) Their focus is to develop general plans for a harmonized evolution of networks and services.

Specialized Autonomous Groups Their focus is to produce handbooks, strategies and case studies for support mainly of developing countries.

The CCITT is more recently referred to as ITU-TSS (International Telecommunications Union-Telecommunications Standardization Section).

CCITT (ITU) recommendations


These recommendations have a non-binding statusno one is forced to follow them. However, there is an increasing awareness that following such recommendations simplifies interconnection and interoperability of devices on a worldwide basis. Two well-known series of standards produced by the CCITT include the V-series and the X-series. The V-series covers transmission over telephone networks and has been used to classify modem devices. The X-series covers Open Systems Interconnection (OSI) standards, discussed later in this chapter.

CCITT, continued

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Examples of V-series CCITT standards


V.22 V.22bis V.28 V.32 V.32bis V.34 V.35 V.42 V.42bis 1200 bps (bits per second) full-duplex modem standard. 2400 bps full-duplex modem standard. Defines circuits in RS-232 interface. Asynchronous and synchronous 4800 and 9600 bps standard. Asynchronous and synchronous standard up to 14400 bps. A proposed standard for 28 Kbps transmission rates. Defines high data rates over combined circuits. Defines error checking standards. Defines modem compression using Lempel-Ziv method.

Examples of X-series CCITT standards


X.25 (ISO 7776) X.200 (ISO 7498) X.400 (ISO 10021) X.500 (ISO 9594) X.700 (ISO 9595) Packet-switching network interface. OSI Reference Model. Message handling (e-mail). Directory Services. Common Management Information Protocol (CMIP).

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

International Organization for Standardization (ISO)


Commonly referred to as the International Standards Organization, ISO is the worlds most influential standards organization. Based in Geneva, ISO has developed a seven-layer reference model for computer networking known as the Reference Model of Open Systems Interconnection (less formally, the OSI model).

OSI Model
The OSI model is concerned with how systems exchange informationtheir interconnectionnot with the internal functions performed by a given system. This model uses a layered approach, where sets of functions are assigned to different layers. A description of the OSI model and the role it plays in the LAN environment is detailed later in this chapter.

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Institute of Electrical and Electronics Engineers (IEEE)


The IEEE is a United States-based organization responsible for the development of local area network architecture standards. It was founded in 1884 for the purpose of promoting the members, theories and practices in the fields of electrical, and later, electronic and computer engineering. The IEEE Computer Society Local Network Committee has developed several standards related to the LAN environment. They have produced, and continue to update, a set of standards defined under IEEE Project 802 (so named because it was formed in February, 1980).

IEEE Project 802


Project 802 is responsible for providing recommendations regarding how data should be transmitted from one network device to anothercorresponding to the lowest two layers of the OSI seven-layer model (the Physical and Data Link layers). Early on in its work on developing LAN standards, it became clear to members that a single standard, meeting all LAN requirements, would be impossibly complex. For this reason, Project 802 worked towards developing sets, or families, of standards. The objective was to encourage compatibility within a given family of standards, while permitting the different families to meet various market requirements. The role Project 802 plays in the LAN environment is detailed later in this chapter.

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Communications fundamentals
Protocols
Defined
A protocol is defined as:

A specific set of rules relating to the formatting and timing of data transmission between two devices.
Protocols are therefore, the rules that govern the communications between two computers. They represent a standard procedure that two data devices accept and use to communicate with each other. Computer communications protocols are much like diplomatic protocols which, for example, define the proper procedures for communications between two heads of state. They specify who talks to whom, at what point in time, what they can say to each other, and how they must say it. Communication protocols are defined within the context of a layered architecturea protocol stack such as the OSI seven-layer reference model. In a layered architecture, each layer builds a protocol data unit (PDU) that it sends to the peer, or equivalent, layer in the destination computer. Upper layers of a protocol stack build PDUs, then pass them to lower layers for further packaging.

Protocols, continued

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Function of a protocol
Protocols for data communications cover such areas as: Speed of communication. Electrical characteristics. Use of shared resources. Message length. Addressing. Error handling.

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Packets/Frames/Datagrams
Defined
A packet or datagram is a package of data that is transmitted between stations over a transmission channel. Packets are assembled by the protocol layer(s) in the sending station and disassembled by the corresponding protocol layer(s) in the receiving station. Once a packet reaches the bottom of the protocol stack, it is broken into one or more frames for transmission as a bit stream over the communications channel. The frame format is defined by the LAN technology used. A packet consists of two componentsthe data being exchanged (sometimes referred to as the payload) and headers. Headers include the source and destination addresses and control information. The data being exchanged can be: Data, such as the contents of files. Messages and commands, such as a request for service. Control codes for managing the communication session, such as codes to indicate communication errors and the need for retransmission.

10

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Layered architectures
Defined
Layering is a design approach specifying different functions and services at different levels in a protocol stack. The protocol stack itself defines how communication hardware and software interoperate at various levels. The Open Systems Interconnection seven-layer reference model is an example of such a protocol stack. Protocol stacks have the following characteristics: Lower layers provide services to upper layers. Each layer provides a set of services. Services are defined by protocols. Service access points (SAPs) are the connection points between layers.

11

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Hardware independence
Overview
A major problem in the early days of LAN computing was the lack of hardware and cabling independence. That is, the hardware and the cabling system were dependent on the type of LAN environment. The difficulty was that no one type of hardware and cabling was best suited for all situations. LAN buyers confirmed the need for these different environments by purchasing different systems for different organizational requirements. Unfortunately, few of these diverse systems were able to communicate with each other. Rather than focus on a single, general-purpose LAN to satisfy all requirements, standards committees work towards achieving hardware independence, defined as the ability of different components to communicate and work with each other.

Objectives
There are certain objectives that should be met in the development of open communications standards:

Connectivity
It should be possible to connect different hardware and software products to form a networking system.

12

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Hardware independence, continued

Modularity
It should be possible to use a relatively small set of general-purpose building blocks in a wide variety of network environments.

Ease of implementation
It should be possible to quickly and easily install in a variety of configurations to meet the needs of the users.

Ease of use
It should be possible for network users to use the communications facilities without knowledge of the network structure or implementations.

Reliability
It should provide error detection and correction functions.

Ease of modification
It should be possible for the network to evolve as user needs changes or as new technologies become available.

Much of the credit for hardware independence and ease of communication between devices goes to the International Organization for Standardization (ISO) and the Institute of Electrical and Electronics Engineers (IEEE). Their work in these areas is discussed in the following pages.

13

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

The Open Systems Interconnection (OSI) model


Overview
The primary objective of the OSI model is to provide a framework for the development of standards for computer-to-computer communications. Specifically, the model details the standards which allow for the flexible interconnection of systems using data communications facilities. A system can be defined as follows:

One or more computers and the associated software, peripherals, operators, physical processes and transfer means that forms an autonomous whole capable of processing and/or transferring information.
This broad definition of a system allows the OSI model to be applied to very simple systems as well as to complex ones. The model is meant to provide a generalized view of a layered architecture. The model, introduced in 1978, divides the communication process into a hierarchy of seven interdependent functional layers. Each layer has a built-in interface to the adjacent layer(s).

OSI overview, continued

14

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

FIGURE 3.1: T HE OSI MODEL

Layer 7 Layer 6 Layer 5 Layer 4 Layer 3 Layer 2 Layer 1

Application Presentation Session Transport Network Data Link Physical

15

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Defining the seven layers of the OSI model


Physical Layer
The physical layer is responsible for the transmission of bit streams across a particular physical transmission channel. This involves a connection between two devices allowing electrical signals to be exchanged between them.

Data Link Layer


The data link layer is responsible for providing reliable data transmission from one device to another and for shielding higher layers from concerns regarding the physical transmission channel. This layer is concerned with the error-free transmission of packets between network devices.

Network Layer
The network layer is concerned with routing data from one network device to another. It is responsible for establishing, maintaining and terminating the network connection between any number of devices and for transferring data along that connection. It is possible to have only one path for network connection or many possible routes to choose from when a connection is established between any two devices on a network.

16

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Defining the seven layers of the OSI model, continued

Transport Layer
The transport layer is responsible for providing data transfer between two users at an agreed-upon level of quality. After establishing a connection between two users, the transport layer is responsible for selecting a particular class of service to be used, monitoring the transmission for billing purposes, ensuring that the appropriate service quality is maintained, and for generating an alert if this quality has been compromised.

Session Layer
The session layer provides the services used to organize and synchronize a given dialog occurring between devices and to manage the data exchange. A major purpose of the session layer is to control when devices in communications with each other can send and receive data. Among other factors, this is based on whether the devices can send and receive data concurrently or alternately.

Presentation Layer
The presentation layer is responsible for the presentation of information in a way that is meaningful to the network devices. Included in the specifications are character code translations, data conversions, or data compression and expansion.

Application Layer
The application layer provides a means for similar or dissimilar application processes to exchange information. Included are services used to establish and terminate connections between devices, and services to monitor and manage the systems being interconnected as well as the various resources being employed.

17

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Purpose of the OSI model


The OSI model is concerned with the exchange of information between a pair of open systems. It is not concerned with the internal functions of the individual systems. The model is concerned with the capability of systems to cooperate in the exchange of information and in the ability to accomplish the tasks governing this exchange. The primary motive in the development of the OSI model was to provide a framework for standardization. Within the model, one or more protocol standards can be developed at each layer. The OSI model defines, in general terms, the functions to be performed at a particular layer. This model is meant to facilitate the standards-making process in two ways: The pace at which communications standards are developed is made faster with the model. The functions of each layer are well-defined, allowing standards to be developed independently and simultaneously for each layer. The introduction of new standards is simplified. The boundaries between layers are well-defined, therefore, a new standard in one layer need not affect any of the workings of the other layers.

18

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Using the OSI model


The hardware level
Layers 1 and 2 (Physical and Data Link) are referred to jointly as the hardware level. They provide the fundamental link between two devices on which other, more sophisticated, services are built. At this level, three protocols are in common useEthernet, Token-bus and Token-ring. These have been defined by the IEEE Project 802 and are further discussed later in this chapter.

The transport level


Layers 3 and 4 (Network and Transport) make up the transport level. This level is responsible for controlling network communications. Actual communications on a network involve only two types of devicesthe sending devices and the receiving devices. A temporary communications linka virtual connectionis made between these devices when they need to communicate. This virtual connection is different from the permanent physical connection each device has to the network. Software at this level establishes and manages the temporary connection between the sending device and the receiving device.

Using the OSI model, continued

19

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Transport-level protocols Several transport level protocols are commonly found in the LAN environment. Each of these protocols has its own characteristics, advantages and disadvantages. Two of the more commonly used LAN transport level protocols are the following:

IPX/SPX
Novells transport protocol, IPX/SPX (Internetwork Packet Exchange/ Sequenced Packet Exchange) is based on Xeroxs XNS (Xerox Network Systems). It was designed at a time when few LAN-specific transport protocol existed. Today it is a widely-used protocol in LAN environments.

NetBEUI
Developed by IBM and Microsoft, NetBEUI (NetBIOS Extended User Interface) was introduced in 1984, along with NetBIOS (Network Basic Input and Output System), its corresponding session layer protocol. Since both of these influential vendors declared that they would use NetBIOS/NetBEUI in their future networking products, many other vendors have adopted these protocols for their networking systems.

Both of these protocols enjoy a wide level of support in the LAN community. This, combined with the independence between the transport and the hardware levels, means that either of these protocols can be used to establish communications between stations on dissimilar LANs.

Using the OSI model, continued

20

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

The application-to-transport level


The application-to-network level is the point where an application running on a station can attach to the network joining that station to the others. Some applications, such as gateway communications between a LAN station and a mainframe system, are communications-intensive and require point-to-point communications services. A point-to-point connection is an uninterrupted connection between two devices. These applications usually attach to the network at Layer 5 (Session). The other application-to-network layer is Layer 6 (Presentation). Nearly all application programs attach to the network through this layer.

The application level


Layer 7 (Application) defines the communications interface for network applications software designed specifically to be used over a network. Network operating systems use the services defined at this level, as do many network utility programs, such as electronic mail systems. The network applications in turn, support various user applications. It should be noted that user applications, such as word processing, are not defined using the OSI model; only products used for network communications are defined.

21

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Applying the OSI model in the LAN environment


The OSI model was developed for computer networks in general, not specifically for the LAN environment. However, the first two layers of the OSI reference model play an important role in establishing LAN OSI Model LAN communications communicationsthe Physical layer and the Data Link layer. Both of ..................... these layers are clearly defined by Network applications Application software IEEE Project 802, discussed next. The OSI reference model is crucial in network-to-network communications internetworking. It allows for the development of standards to enable communications between two dissimilar networks. The role of the OSI reference model in internetworking is detailed in a later chapter. FIGURE 3.2: THE OSI MODEL AND LAN COMMUNICATIONS

.....................

Presentation

Session

Transport

Specialized Network communications software

Network

.....................
Logical Link Control Data Link

.....................
Physical

Media Access Control Physical Link Control

.....................

22

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

IEEE Project 802


Overview
IEEE Project 802 was initiated specifically for the LAN environment. The rationale of this group was to develop standards which would be widely accepted. This, in turn, would ensure a high-volume market, encouraging manufacturers to commit the necessary resources to developing standardized products. More importantly, it would allow the equipment from these manufacturers to communicate with each other. The original series of standards developed under Project 802 were subsequently adopted by ANSI in 1985 as American National Standards and by ISO in 1987 with the designation 8802. Project 802 has produced a set of standards for LAN communications. They are designed to be a subset of the OSI model. This means higher-layer protocols can be developed for various network services without the need to produce new LAN protocols to accompany them. The relationship between the OSI model and Project 802 follows: The physical layer of the various Project 802 standards correspond to the physical layer of the OSI model. The Data Link layer of the OSI model has been divided into two sublayers by Project 802Medium Access Control (MAC) and Logical Link Control (LLC). LAN architectures are subdivided in this manner because a set of common link control subfunctions can apply to all LANs, while the medium access control technique can differ for each one.
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

23

802 standards
The IEEE 802 is made up of many subcommittees. A brief overview of these committees follows.

IEEE 802.1 - High-Level Interface


The IEEE committee defining the relationship between the IEEE 802 standards and the ISO Open Systems Interconnection (OSI) reference model. It provides for LAN management and bridging standards.

IEEE 802.2 - Logical Link Control


A Data Link layer standard used with IEEE 802.3, 802.4 and 802.5 standards.

IEEE 802.3 - Carrier Sense Multiple Access with Collision Detection


A Physical layer standard specifying a linear bus LAN with a CSMA/CD access method commonly associated with Ethernet and Fast Ethernet.

IEEE 802.4 - Token-bus


A Physical layer standard specifying a token-passing access method on a bus topology. It is used by the Manufacturing Automation Protocol (MAP), developed by General Motors, and by ARCnet.

802 standards, continued

24

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

IEEE 802.5 - Token-ring


A Physical layer standard specifying a token-passing access method on a ring topology.

IEEE 802.6 - Metropolitan Area Network (MAN)


Describes a topology known as Distributed Queue Dual Bus (DQDB). This topology consists of two parallel runs of cable to link devices over a metropolitan (city-sized) area. The transmission medium is usually optical fiber and transmission speed in the range of 100 Mbps.

IEEE 802.7 - Broadband Technology


The IEEE technical advisory group for broadband LANs. This committee provides technical advice to other subcommittees on broadband networking techniques.

IEEE 802.8 - Fiber Optics


The IEEE technical advisory group for optical fiber LANs. This committee provides technical advice to other subcommittees on optical fiber networks as alternatives to existing copper-based networks.

IEEE 802.9 - Integrated Services LAN


The IEEE committee working on the integration of voice, data and video traffic over other 802 LANs.

802 standards, continued

25

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

IEEE 802.10 - LAN Security


The IEEE technical advisory group for security. This group is working on the definition of a standard security model that will operate over a variety of networks. It incorporates both authentication and encryption methods.

IEEE 802.11 - Wireless


The IEEE committee working on standards for wireless networks. This group is working on the standardization of media such as spread-spectrum radio, narrowband radio, infrared and transmission over power lines.

IEEE 802.12 - Demand Priority


The IEEE committee charged with the standard for 100 Mbps Ethernet using a Demand Priority access method, commonly referred to as 100VG-AnyLAN.

802 standards, continued

26

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

FIGURE 3.3: PROJECT 802 LAYERS AND SUBLAYERS

OSI layers

802.1 Bridging 802.2 Logical Link 802.3 Medium Access 802.4 Medium Access 802.5 Medium Access 802.12 Medium Access Data link

802.3 Physical

802.4 Physical

802.5 Physical

802.12 Physical

Physical

802.7 Broadband Advisory 802.8 Optical fiber Advisory

27

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Physical layer overview


The Physical layer is responsible for establishing, maintaining, and releasing physical connections between two network devices and for transmitting bits over the transmission channel. Included is: Encoding data into the correct form for transmission. Generating the signal. Controlling the timing of devices so that they are synchronized with the signal being transmitted and received.

IEEE Project 802 accommodates the three transmission media used at the Physical layer twisted-pair cable, coaxial cable and optical fiber cable. Its specifications, for a given LAN architecture, include: The type of cable. The type of transmission. The encoding method. The data rate.

28

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Data Link layer overview


Logical Link Control (LLC) sub-layer recommendations
Logical Link Control (LLC) specifies mechanisms for addressing stations across the transmission medium and for controlling the exchange of data between two devices. It includes provisions for establishing connections, for data transfer and for connection termination. The role of this sub-layer is to shield the higher-level layers from the low-level signaling specifications of each LAN architecture. Project 802 defines only a single standard at this levelit is a common element in all of the 802 standards. The logical link control sub-layer is responsible for the following: Initiating control signal interchange. Organizing data flow. Interpreting commands. Generating responses. Carrying out error control and recovery functions.

29

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Data Link layer overview, continued

Media Access Control (MAC) sub-layer recommendations


This sub-layer of the Data Link layer is responsible for defining the rules allowing network devices to share the transmission channel. It defines how the many devices sharing the single physical transmission channel gain orderly access to the medium. Four functions make up the media access control sub-layer standard:

Medium Access Management


The rules or procedures used by network devices to control the sharing of the transmission medium.

Framing
The addition of header and trailer information necessary to identify the beginning and end of a packet, to synchronize the sender with the receiver, to route the packet, and to provide for error detection.

Addressing
The determination of the appropriate network addresses to identify the devices involved in sending and receiving a message.

Error Detection
The checking done to ensure that a packet has been transmitted and received correctly.

30

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Data Link layer overview, continued

Although many access control methods exist, Project 802 has standardized three methods: CSMA/CD [introduced in IEEE 802.3] . Token-bus [introduced in IEEE 802.4] . Token-ring [introduced in IEEE 802.5].

Each of these methods is described on the following pages.

31

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

IEEE 802.3 CSMA/CD Media Access Control


Definition of CSMA/CD
The IEEE 802.3 standard specifies the CSMA/CD (Carrier Sense Multiple Access with Collision Detection) media access control method. CSMA/CD is the most commonly employed access method for LANs using a bus or tree topology. It is the media access control method used by Ethernet. CSMA/CD operates per the following steps: A station with a message to transmit listens to the transmission medium to see if another station is currently transmitting a message. If the transmission medium is quietno other station is transmittingthe transmission is sent. When two or more stations have a message to send, it is possible that they transmit at precisely the same time, resulting in a collision on the network. When a collision occurs, all receiving stations ignore the garbled transmission. The transmitting stations stop transmitting as soon as they detect a collision. Each of the transmitting stations waits a random period of time and attempts to transmit again.

Definition of CSMA/CD, continued

32

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Carrier sensing
Carrier sensing is the approach used by CSMA/CD for listening to the transmission mediumthe carrier to see if it is free. If it is, the encapsulated data frame is passed to the physical layer for transmission. If the carrier is busy, it continues to be monitored until it is free.

Collision detection
After transmission has begun, monitoring of the transmission medium continues. When two signals collide, their messages get mixed and become unreadable. If this happens, the affected stations stop transmitting and send out a jamming signal. This jamming signal ensures that all other stations on the network are aware a collision has occurred.

33

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

CSMA/CD functions
The IEEE CSMA/CD standard defines a model made up of six functions. Three of these functions are concerned with sending data and the three others are concerned with receiving data. The receiving functions operate in parallel with the sending functions.

Data encapsulation/decapsulation
The data encapsulation and decapsulation function is performed by the Media Access Control sublayer. This process is responsible for addressing and error-checking functions. Data encapsulation Data encapsulation is performed by the sending station. It is the act of adding informationaddresses and error control bytesto the beginning and end of the data unit to be transmitted. This is done after the data packet is received from the Logical Link Control sublayer. The information added to the packet is needed to perform the following tasks: Synchronize the receiving station with the signal. Delimit the beginning and end of the frame. Identify the addresses of both the sending and receiving stations. Detect transmission errors.

CSMA/CD functions, continued

34

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Data decapsulation Data decapsulation is performed by the receiving station. When a frame is received, the receiving station is responsible for performing the following tasks: Recognizing the destination address and determining if it matches the stations own address. Performing an error check. Removal of the control information that was added by the data encapsulation function in the sending station.

Media access management


The media access management function is also performed by the Media Access Control sublayer. In the sending station, the media access management function is responsible for determining whether the transmission medium is available. If the channel is available, transmission can begin. Additionally, the management function is responsible for determining what action should be taken when a collision is detected and when to try to retransmit. In the receiving station, the media access management function is responsible for performing validity checks on a frame before passing it to the data decapsulation function.

CSMA/CD functions, continued

35

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Data encoding/decoding
The data encoding/decoding function is performed by the Physical layer. This function is responsible for getting the electrical form of the data transmission onto the transmission medium. Data encoding Data encoding is performed by the sending station. It is responsible for translating the bits into the correct electrical signals to be sent across the transmission medium. With CSMA/CD, Manchester phase encoding is used to translate the bit stream into electrical signals. In addition, this function is responsible for listening to the transmission medium and for notifying the media access management function whether the medium is free or busy or if a collision has been detected. Data decoding Data decoding is performed by the receiving station. It is responsible for translating the electrical signal back into a bit stream.

36

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

CSMA/CD transmission frame


A transmission frame is defined as:

A group of bits in a specific format, with an indicator at each end to signal the beginning and end of the frame.
The defined format of a frame allows network equipment to recognize the meaning and purpose of the specific bits in the frame. A frame is usually a logical transmission unit containing control information for error checking and addressing purposes. The CSMA/CD (IEEE 802.3) frame format is shown below. FIGURE 3.4: CSMA/CD (IEEE 802.3) FRAME FORMAT

7 bytes

Preamble Start Frame Delimiter Destination Address

1 byte

2 or 6 bytes

2 or 6 bytes

Source Address

2 bytes

Length Count

Variable

Information Pad (optional) Frame Check Sequence

0 - n bytes

4 bytes

37

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

CSMA/CD transmission frame, continued

The CSMA/CD frame components are responsible for the following tasks:

Preamble
The preamble is responsible for providing the synchronization between the sending and receiving device. It is a series of 56 bits (7 bytes) of alternating 1s and 0s found at the beginning of the frame.

Start Frame Delimiter


The start frame delimiter follows the preamble. As its name implies, it indicates the start of the data frame. The start frame delimiter is 1 byte in lengthmade up of the following 8-bit sequence10101011.

Address Fields
Each of the address fieldsthe destination address and the source addresscan be either 2 bytes or 6 bytes in length. If universal addressing is used, the addresses must be 6 bytes each. But if local addressing is used they may be either 2 or 6 bytes long. Both destination and source addresses must be of the same length for all devices on a given network. The destination address field specifies the station(s) to which the data is to be sent. An address referring to a specified group of stations is known as a multicast group address and an address referring to all of the stations on the network is known as a broadcast address. The source address identifies the station making the transmission. CSMA/CD transmission frame, Chapter 3 - LAN Communications Standards continued 38 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Length Count
This is a 2-byte field indicating the length of the data field that follows. It is needed to determine the length of the data field in those cases when a pad field is used.

Information Field
The information field contains the actual data packet to be transmitted. Its length is variable.

Pad Field
A pad field is used to ensure that the frame meets a minimum length requirement. A frame must contain a minimum number of bytes in order for stations to detect collisions accurately.

Frame Check Sequence


The frame check field is used as an error-control mechanism. When the transmitting device assembles a frame, it performs a calculation on the bits in the frame. The algorithm used to perform this calculation always results in a 4-byte value. The sending device stores this value in the frame check sequence field.

When the destination device receives the frame, it performs the same calculation and compares the result to that in the frame check sequence field. If the two values are the same, the transmission is assumed to be correct. If the two values are different, the destination device can request a retransmission of the frame.

39

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

IEEE 802.3 naming convention


A variety of IEEE 802.3 implementations are available. To distinguish between them, a notation has been developed. The notation specifies three characteristics of the implementation: The data rate in Mbps. The signaling method used. The approximate maximum cable segment length in hundreds of m.

Some of these IEEE 802.3 implementations and their characteristics are as follows:

1Base-5
The IEEE standard for baseband Ethernet at 1 Mbps over twisted-pair cabling to a maximum distance of 500 m (1640 ft).

10Base-5
The IEEE standard for baseband Ethernet at 10 Mbps over coaxial trunk and AUI (Attachment Unit Interface) twisted-pair cable to a maximum distance of 500 m (1640 ft).

10Base-2
The IEEE standard for baseband Ethernet at 10 Mbps over thin coaxial cable to a maximum distance of 185 m (607 ft).

40

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

IEEE 802.3 naming convention, continued

10Broad-36
The IEEE standard for broadband Ethernet at 10 Mbps over broadband coaxial cable to a maximum distance of 3600 m (2.25 mi).

10Base-T
The IEEE standard for baseband Ethernet at 10 Mbps over unshielded twisted-pair following a star horizontal cabling topology, with a maximum distance of 100 m (328 ft) from the station to the hub.

10Base-F
The IEEE standard for baseband Ethernet at 10 Mbps over optical fiber to a maximum distance of 2 km (1.25 mi).

100Base-TX
The IEEE standard for baseband Ethernet at 100 Mbps over two twisted-pairs either 2-pair Category 5 UTP or 2-pair STP cabling.

100Base-T4
The IEEE standard for baseband Ethernet at 100 Mbps over four-pair UTP cablingeither Category 3, 4 or 5.

100Base-FX
The IEEE standard for baseband Ethernet at 100 Mbps over a two-fiber 62.5/125 m optical fiber cabling system.
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

41

IEEE 802.4 Token Bus Media Access Control


Definition of Token-bus
The IEEE 802.4 standard specifies the Token-bus media access control method. It is one of two token passing access methods. IEEE 802.4 is based on a physical bus or tree topology. The Token-bus approach requires a station to have possession of a token in order to transmit. The token is passed from station to station in a logical ring. IEEE 802.4 is the basis for LAN architectures often used in factory automation, such as MAP and ARCnet. Token-bus operates in the following manner: A station having data to transmit must first be in possession of the token. The token gives a device the right to transmit. When a station receives the token, it broadcasts its transmission for all stations to hear. The station is given a predetermined amount of time to send its message. When the station has transmitted all of its data unit, or it has run out of time, the token is passed to the next station. If a station runs out of time, it must wait until the next time it possesses the token to transmit the rest of the data.

Definition of Token-bus, continued

42

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Devices on the network acknowledge only those transmissions addressed to them. When a token is passed to the next device, the address field is changed. The token is always passed from station to station in order of decreasing addresses. When the lowest address is reached, the token is sent to the station with the highest network address. If a station receiving the token has no message to transmit, the token is immediately passed on to the next station in the hierarchy. Since possession of the token is needed for a station to transmit, there is no possibility of a collision. With no possibility of a collision, there is no minimum length requirement for data packets and only minimal control information is required for proper processing.

43

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Token-bus functions
The Token-bus standard addresses five key areas as part of the Media Access Control sublayer.

Interface to the Logical Link Control sublayer


The MAC sublayer receives data packets from the LLC sublayer and prepares them for transmission. It also receives incoming data packets and prepares them to be passed on to the LLC sublayer.

Token handling
This function makes provisions for: Passing tokens from station to station. Recognizing a token when it is received. Prioritizing data packets.

Ring maintenance
Ring maintenance functions include initialization of the logical ring during network start-up and modification of the logical ring as stations are connected to or disconnected from the network.

Token-bus functions, continued

44

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Fault detection and recovery


Faults must be detected and, when possible, corrected as soon as possible. Some possible faults occurring on a Token-bus network include: Multiple tokens. Lost tokens. Token pass failures. Stations with unresponsive receivers. Duplicate station addresses.

Sending and receiving data


In order to send or receive data, control information must be added to and removed from the data packet. Therefore, the MAC sublayer is responsible for preparing data packets and passing them to the Physical layer for transmission. At the receiving end, the packets must be taken from the Physical layer and stripped of control information.

45

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Token-bus transmission frame


The Token-bus frame format is shown below:
0 - n bytes Preamble

FIGURE 3.5: T OKEN- BUS FRAME FORMAT


1 byte Start Delimiter

1 byte

Frame Control

2 or 6 bytes

Destination Address

2 or 6 bytes

Source Address

0 - 819 bytes

Information Frame Check Sequence

4 bytes

1 byte

End Delimiter

46

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Token-bus transmission frame, continued

The Token-bus frame components are responsible for performing the following tasks:

Preamble
The preamble is responsible for providing the synchronization between the sending and receiving device. The length of this field and its contents depend on the modulation method being used and the speed of the network.

Start Delimiter
The start delimiter follows the preamble. As its name implies, it indicates the start of the data frame. The start frame delimiter is 1 byte in length and contains a signaling pattern that is always different from the datathe actual signaling pattern varies with the encoding scheme used.

Frame Control Field


This field identifies the type of frame being sentLogical Link Control data frames, token control frames, Media Access Control management data frames, or special-purpose data frames.

47

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Token-bus transmission frame, continued

Address Fields
Each of the address fieldsthe destination address and the source addresscan be either 2 bytes (16-bit addresses) or 6 bytes (48-bit addresses) in length. If universal addressing is used, the addresses must be 6 bytes each. But if local addressing is used they may be either 2 or 6 bytes long. Both destination and source addresses must be of the same length for all devices on a given network. The source address must be for an individual device. The destination address can be an individual address, a group address or a broadcast address.

Information Field
The information field contains the actual data packet to be transmitted. Its length is variable. It may contain a Logical Link protocol data unit, token control data, management data or special-purpose dataas indicated in the frame control field.

Frame Check Sequence


The frame check field is used as an error control mechanism. When the transmitting device assembles a frame, it performs a calculation on the bits in the frame. The algorithm used to perform this calculation always results in a 4-byte value. The sending device stores this value in the frame check sequence field. When the destination device receives the frame, it performs the same calculation and compares the result to that in the frame check sequence field. If the two values are the same, the transmission is assumed to be correct. If the two values are different, the destination device can request a retransmission of the frame.
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

48

Token-bus transmission frame, continued

End Delimiter
The end delimiter marks the end of the frame and shows the position of the frame check sequence field. Just as with the start delimiter, the signaling value is always different from the data.

49

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Token-bus options
While the general principle behind Token-bus is token passing over a bus or tree topology, the standard actually specifies three Physical layer optionsbroadband, carrierband and optical fiber.

Broadband Token-bus
The definition of broadband states that such a transmission technique allows multiple transmissions to occur simultaneously, with each transmission taking place at a different frequency on the cable. Broadband Token-bus is defined by the following characteristics: It uses 75 coaxial cable as the transmission mediumcoaxial cable is commonly used for broadband systems. It follows a tree topologythis is sometimes referred to as a directional bus. It supports data channels with the following bandwidths and transmission speeds: 1.5 MHz bandwidth with a transmission speed of 1 Mbps. 6 MHz bandwidth with a transmission speed of 5 Mbps. 12 MHz bandwidth with a transmission speed of 10 Mbps.

Token-bus options, continued

50

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Carrierband Token-bus
Carrierband signaling requires that the whole frequency spectrum of the cable be devoted to a single transmission path for the purpose of transmitting analog signals. For this reason, carrierband is also referred to as single-channel broadband. Carrierband Token-bus is defined by the following characteristics: It uses 75 coaxial cable as the transmission medium. It follows a traditional bus topology. Since there is only one data channel, electronics are simpler and less expensive than those used for broadband. Specifications exist for transmission speeds of 1, 5 and 10 Mbps.

Optical fiber Token-bus


The optical fiber specification is the most recent addition to the IEEE 802.4 standard. Optical fiber Token-bus is defined by the following characteristics: The transmission medium is 2 optical fibersone for transmit and one for receivethat supports a spectral width of 270 nanometers (nm) with a center wavelength between 800 and 910 nm. The optical fiber specification can be used with any topology that is logically a busphysically, it usually follows a star topology where all devices are connected to a central active or passive hub. Specifications exist for transmission speeds of 5, 10 and 20 Mbps.
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

51

IEEE 802.5 Token-ring Media Access Control


Definition of Token-ring
IEEE 802.5 is the second of the token passing access control methods. Token-ring is most commonly used in a network structure following both a logical and physical ring topology. The right to transmit is controlled by a token. The method of transmission is as follows: A token indicating the right to transmit is known as a free token. When a station receives a free token it changes the configuration of the token to that of a busy token. The busy token is included as part of each data unit transmitted. The station is allowed to transmit data units until a predetermined time is reached. The data unit travels from station to station around the ring. Each station receiving a data unit checks the address to see if it should process the information. If the data unit is intended for another station, it is passed on to the next station in the ring.

Definition of Token-ring, continued

52

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

The intended destination station, upon receiving and processing the data unit, sets three control bits in the data unit before sending it to the next station: The Address Recognized control bit allows the destination station to indicate that it identified the data unit as being addressed to it. The Packet Copied control bit shows that the destination station sent a copy of the data unit to the LLC sublayer for processing. The Error control bit shows that an error condition was detected. This control bit can be set by any station on the ring, not only by the destination station.

Once the data unit returns to the originating station, it is removed from the network. The station then sends a free token to the next station in the ring.

53

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Token-ring functions
Token-ring tokens use three control bits indicating if the data unit was processed or if any error conditions were detected. The different combinations of two of these bits, address recognized and packet copied, allow the source station to differentiate between different conditions. For example, it would be able to see if: The data unit was recognized by the destination station and processed. The data unit was recognized by the destination station but it was not able to process it. The data unit was not recognized by the destination station or the destination station is nonexistent or inactive.

Token-ring differs in two other areas with respect to method of operationits manner of fault management and an optional priority scheme.

Fault management
There are three serious error conditions affecting the operation of Token-ring: The loss of a token. A constantly busy token. The failure of a station on the ring.

In order to detect and then correct the first two of these conditions, Token-ring designates one of the stations on the network as an active monitor. All the remaining stations are designed as passive monitorsmonitoring the operation of the active monitor.

Token-ring functions, continued

54

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

The station designated as the active monitor performs the following duties: It continuously monitors the network. If no token is detected for a predetermined amount of time, the monitor assumes that the token has been lost and issues a new token. To check for a constantly busy token, the monitor sets a monitor bit in a busy token as it passes. If the busy token returns with the monitor bit still set, the monitor will know that the sending station did not remove the data unit from the network. The monitor then changes the data unit to a free token and passes it to the next device.

If the active monitor fails, the passive monitors use a contention procedure to determine which one of them becomes the new active monitor. The third serious error condition is that of a failed station. If a station fails, it may not be able to transmit, causing the ring to be broken. To accommodate for such an occurrence, a bypass switch in incorporated into each device. Closing this bypass switch removes the station from the ring and allows data units to circulate properly. When a star-wired topology is used, the bypass switches are found in the central hub. This makes physical failures in the ring easier to correct.

Token-ring functions, continued

55

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Optional priority scheme


Token-ring access control can be operated on either a nonpriority basis or a priority basis. When operating on a nonpriority basis, a station can transmit data units as soon as it receives a free token. When operating on a priority basis, three bits in each data unit are used to represent the current priority. A station receiving a free token follows a set procedure as follows: The priority value of the token is compared to the priority value of the data unit to be transmitted. If the priority value of the data unit is equal to or higher than that of the token, the data is sent. If the priority value of the data unit is lower, the data is not sent.

Each frame also has three reservation bits. These can be used by a station to reserve the token for its data transmission. The process to use the reservation bits is as follows: A station must have a data unit to transmit that has a priority greater than zero. When this station receives and retransmits a frame, it sets the reservation bits in the token to the same priority value of the data unit. When the original sending station removes the data unit and generates a free token it checks the reservation bits and the priorities of additional data units it has to send.

Token-ring functions, continued

56

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

If the reservation bits or the priority of the waiting data have a higher value than the current priority, this original sending station resets the current priority to the higher value. When a priority is reset to a higher value, the station saves the previous priority value and it is responsible for eventually restoring the token priority to that original lower value.

57

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Token-ring transmission frame


The Token-ring frame format is shown below.
1 byte Starting Delimiter

FIGURE 3.6: T OKEN-RING FRAME FORMAT


1 byte Access Control

1 byte

Frame Control

2 or 6 bytes

Destination Address

2 or 6 bytes

Source Address

Variable

Information Frame Check Sequence Ending Delimiter

4 bytes

1 byte

1 byte

Frame Status

58

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

Token-ring transmission frame, continued

The Token-ring frame components are responsible for performing the following tasks:

Starting Delimiter
The starting delimiter indicates the start of the data frame. It uses a unique signal pattern that does not correspond to either a 0 or 1 bit. These are known as nondata values and ensure that no data sequence will ever be mistaken for a delimiter.

Access Control Field


This field identifies whether the frame is a data frame or a token. It contains a bit used to identify a constantly busy token, a priority bit and reservations bits.

Frame Control Field


This field identifies the frame type and for certain types of control frames, the function it is to perform.

Address Fields
Each of the address fieldsthe destination address and the source addresscan be either 2 bytes (16-bit addresses) or 6 bytes (48-bit addresses) in length. If universal addressing is used, the addresses must be 6 bytes each. But if local addressing is used they may be either 2 or 6 bytes long. Both destination and source addresses must be of the same length for all devices on a given network. The source address must be for an individual device. The destination address can be an individual address, a group address or a broadcast address.
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

59

Token-ring transmission frame, continued

Information Field
The information field contains the actual data packet to be transmitted. This can be either a protocol data unit being passed from the logical link control sublayer or control information supplied by the media access control sublayer. Its length is variable anywhere from 0 to 17800 bytes in length.

Frame Check Sequence


The frame check field is used as an error control mechanism. When the transmitting device assembles a frame, it performs a calculation on the bits in the frame. The algorithm used to perform this calculation always results in a 4 byte value. The sending device stores this value in the frame check sequence field. When the destination device receives the frame, it performs the same calculation and compares the result to that in the frame check sequence field. If the two values are the same, the transmission is assumed to be correct. If the two values are different, the destination station can request a retransmission of the frame.

Ending Delimiter
This identifies the end of the frame by containing nondata values. It also contains bits used to identify whether or not it is the last frame in a multiframe transmission and if an error has been detected by any station.

Frame Status Field


The frame status field contains the address recognized and frame copied control bits.

60

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

CONTENTS

CHAPTER 3 - LAN COMMUNICATIONS STANDARDS

Overview .................................................................................. 1
LAN communications defined....................................................... 1 Communications terminology ....................................................... 2

Communications standards organizations ........................ 3


American National Standards Institute (ANSI) .......................... 3 Comite Consultatif Internationale de Telegraphique et Telephonique (CCITT) ...................................... 3 CCITT (ITU) recommendations ........................................................ 4
Examples of V-series CCITT standards ............................................................. 5 Examples of X-series CCITT standards ............................................................. 5

CONTENTS TABLE

OF

International Organization for Standardization (ISO) ............... 6 OSI Model ......................................................................................... 6 Institute of Electrical and Electronics Engineers (IEEE) .......... 7 IEEE Project 802 ............................................................................... 7

TABLE
61
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

OF

CONTENTS

CHAPTER 3 - LAN COMMUNICATIONS STANDARDS

Communications fundamentals ........................................... 8


Protocols ........................................................................................... 8 Defined .............................................................................................. 8 Function of a protocol ........................................................................ 9 Packets/Frames/Datagrams ......................................................... 10 Defined ............................................................................................ 10 Layered architectures ................................................................... 11 Defined ............................................................................................. 11 Hardware independence .............................................................. 12 Overview ......................................................................................... 12 Objectives ........................................................................................ 12
Connectivity ...................................................................................................... 12 Modularity ......................................................................................................... 13 Ease of implementation .................................................................................... 13 Ease of use ....................................................................................................... 13 Reliability .......................................................................................................... 13 Ease of modification ......................................................................................... 13

TABLE
62
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

OF

CONTENTS TABLE

OF

CONTENTS

CHAPTER 3 - LAN COMMUNICATIONS STANDARDS

The Open Systems Interconnection (OSI) model ............ 14


Overview .......................................................................................... 14 Defining the seven layers of the OSI model ............................. 16
Physical Layer .................................................................................................. 16 Data Link Layer................................................................................................. 16 Network Layer................................................................................................... 16 Transport Layer................................................................................................. 17 Session Layer ................................................................................................... 17 Presentation Layer ............................................................................................ 17 Application Layer .............................................................................................. 17

CONTENTS TABLE

OF

Purpose of the OSI model ............................................................ 18 Using the OSI model ..................................................................... 19 The hardware level .......................................................................... 19 The transport level .......................................................................... 19 Transport-level protocols............................................................... 20
IPX/SPX ............................................................................................................ 20 NetBEUI ............................................................................................................ 20

TABLE

OF

The application-to-transport level ................................................... 21 The application level ....................................................................... 21 Applying the OSI model in the LAN environment ................... 22

63

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

CONTENTS

CHAPTER 3 - LAN COMMUNICATIONS STANDARDS

IEEE Project 802 ................................................................... 23


Overview .......................................................................................... 23 802 standards ................................................................................. 24
IEEE 802.1 - High-Level Interface .................................................................... 24 IEEE 802.2 - Logical Link Control ..................................................................... 24 IEEE 802.3 - Carrier Sense Multiple Access with Collision Detection ............. 24 IEEE 802.4 - Token-bus .................................................................................... 24 IEEE 802.5 - Token-ring .................................................................................... 25 IEEE 802.6 - Metropolitan Area Network (MAN) .............................................. 25 IEEE 802.7 - Broadband Technology ................................................................ 25 IEEE 802.8 - Fiber Optics ................................................................................. 25 IEEE 802.9 - Integrated Services LAN ............................................................. 25 IEEE 802.10 - LAN Security ............................................................................. 26 IEEE 802.11 - Wireless ..................................................................................... 26 IEEE 802.12 - Demand Priority ......................................................................... 26

CONTENTS TABLE

OF

Physical layer overview ................................................................ 28 Data Link layer overview .............................................................. 29 Logical Link Control (LLC) sub-layer recommendations ................. 29 Media Access Control (MAC) sub-layer recommendations ............ 30
Medium Access Management ........................................................................... 30 Framing ............................................................................................................. 30 Addressing ........................................................................................................ 30 Error Detection.................................................................................................. 30

TABLE
64

OF

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

IEEE 802.3 CSMA/CD Media Access Control .................... 32

CONTENTS

CONTENTS TABLE

Definition of CSMA/CD ................................................................. 32 Carrier sensing ................................................................................ 33 Collision detection ........................................................................... 33 CSMA/CD functions ...................................................................... 34 Data encapsulation/decapsulation .................................................. 34 Data encapsulation........................................................................ 34 Data decapsulation........................................................................ 35 Media access management ............................................................. 35 Data encoding/decoding .................................................................. 36 Data encoding ............................................................................... 36 Data decoding ............................................................................... 36 CSMA/CD transmission frame .................................................... 37
Preamble ........................................................................................................... 38 Start Frame Delimiter ....................................................................................... 38 Address Fields .................................................................................................. 38 Length Count ..................................................................................................... 39 Information Field ............................................................................................... 39 Pad Field ........................................................................................................... 39 Frame Check Sequence ................................................................................... 39

CHAPTER 3 - LAN COMMUNICATIONS STANDARDS

OF

OF

IEEE 802.3 naming convention ................................................... 40


1Base-5 ............................................................................................................. 40 10Base-5 ........................................................................................................... 40 10Base-2 ........................................................................................................... 40 10Broad-36 ........................................................................................................ 41 10Base-T ........................................................................................................... 41 10Base-F ........................................................................................................... 41 100Base-TX ...................................................................................................... 41 100Base-T4 ....................................................................................................... 41 100Base-FX ...................................................................................................... 41
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

TABLE
65

CONTENTS

CHAPTER 3 - LAN COMMUNICATIONS STANDARDS

IEEE 802.4 Token Bus Media Access Control .................. 42


Definition of Token-bus ................................................................ 42 Token-bus functions ..................................................................... 44 Interface to the Logical Link Control sublayer ................................ 44 Token handling ................................................................................ 44 Ring maintenance ........................................................................... 44 Fault detection and recovery ........................................................... 45 Sending and receiving data ............................................................. 45 Token-bus transmission frame ................................................... 46
Preamble ........................................................................................................... 47 Start Delimiter ................................................................................................... 47 Frame Control Field .......................................................................................... 47 Address Fields .................................................................................................. 48 Information Field ............................................................................................... 48 Frame Check Sequence ................................................................................... 48 End Delimiter .................................................................................................... 49

CONTENTS TABLE

OF

TABLE

OF

Token-bus options ......................................................................... 50 Broadband Token-bus ..................................................................... 50 Carrierband Token-bus .................................................................... 51 Optical fiber Token-bus ................................................................... 51

66

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

CONTENTS

CHAPTER 3 - LAN COMMUNICATIONS STANDARDS

IEEE 802.5 Token-ring Media Access Control .................. 52


Definition of Token-ring ................................................................ 52 Token-ring functions ..................................................................... 54 Fault management .......................................................................... 54 Optional priority scheme ................................................................. 56 Token-ring transmission frame ................................................... 58
Starting Delimiter .............................................................................................. 59 Access Control Field......................................................................................... 59 Frame Control Field .......................................................................................... 59 Address Fields .................................................................................................. 59 Information Field ............................................................................................... 60 Frame Check Sequence ................................................................................... 60 Ending Delimiter................................................................................................ 60 Frame Status Field............................................................................................ 60

TABLE
67
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

OF

CONTENTS TABLE

OF

FIGURES FIGURES FIGURES FIGURES

CHAPTER 3 - LAN COMMUNICATIONS STANDARDS

Figure 3.1: Figure 3.2: Figure 3.3: Figure 3.4: Figure 3.5: Figure 3.6:

The OSI model .................................................... 15 The OSI model and LAN communications ....... 22 Project 802 layers and sublayers ..................... 27 CSMA/CD (IEEE 802.3) frame format .............. 37 Token-bus frame format ..................................... 46 Token-ring frame format ..................................... 58

68

Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design Manual - CD-ROM, Issue 1

You might also like