Professional Documents
Culture Documents
TECHNOLOGY Protocol
LAN Technology :
LAN TECHNOLOGY : Protocol Ethernet Protocol
Network protocol that was developed Macintosh LocalTalk is a particular implementation of the
computers. physical layer of the AppleTalk networking
system from Apple Computer.
Using CSMA/CA (Carrier Sense Multiple Access with
Collision Avoidance), where a computer signals its LocalTalk specifies a system of shielded
intent to transmit before it actually does so. twisted pair cabling, plugged into self-
terminating transceivers, running at a rate of
230.4 kbit/s.
LAN TECHNOLOGY LAN TECHNOLOGY
self-terminating transceivers
LOCALTALK PROTOCOL LOCALTALK PROTOCOL
Developed by IBM in the mid-1980s A single electronic token moves around the ring from
one computer to the next.
Access method involves token-passing
If a computer does not have information to transmit, it
The computers are connected so that the signal travels simply passes the token on to the next workstation.
around the network from one computer to another in a
logical ring.
If a computer wishes to transmit and receives an
empty token, it attaches data to the token.
LAN TECHNOLOGY LAN TECHNOLOGY
Protocol Token Ring Protocol Token Ring
The token then proceeds around the ring until it comes Token ring local area network (LAN) technology
to the computer for which the data is meant- the data was conceived in the late 1960s by Olof
is captured by the receiving computer Söderblom, then working for IBM [1]).
The Token Ring protocol requires a star-wired ring US Patents were awarded in 1981[1] and Token-
using twisted pair or fiber optic cable. Ring was developed and promoted by IBM in the
early 1980s and standardized as IEEE 802.5 by
the Institute of Electrical and Electronics
It can operate at transmission speeds of 4 Mbps or 16 Engineers.
Mbps.
Uses a dual ring physical topology. Transmission Fiber distributed data interface (FDDI)
normally occurs on one of the rings; if a break provides a standard for data transmission in a
occurs, the system keeps information moving by local area network that can extend in range up
automatically using portions of the second ring to to 200 kilometers (124 miles).
create a new complete ring.
Although FDDI protocol is a token ring
A major advantage of FDDI is speed. It operates over network, it does not use the IEEE 802.5 token
fiber optic cable at 100 Mbps. ring protocol as its basis; instead, its protocol
is derived from the IEEE 802.4 token bus
timed token protocol.
LAN TECHNOLOGY LAN TECHNOLOGY
Protocol FDDI Protocol FDDI
In addition to covering large geographical The Fiber Distributed Data Interface (FDDI) specifies
areas, FDDI local area networks can support a 100-Mbps token-passing, dual-ring LAN using fiber-
thousands of users.
optic cable.
Cat 3: Cat 5:
Used for data networks using frequencies up to 16 Provided performance of up to 100 MHz, and was
MHz. Historically popular for 10 Mbit/s Ethernet frequently used on 100 Mbit/s ethernet networks.
networks. May be unsuitable for 1000BASE-T gigabit
ethernet.
Cat 4:
Provided performance of up to 20 MHz, and was
frequently used on 16 Mbit/s token ring networks.
Why?
Consists of a center glass core surrounded by several Able to transmit signals over much longer distances than
layers of protective materials coaxial and twisted pair.
A NOS is not the same as the networking tools provided The two major types of network operating systems are :
by some existing OS, Windows XP for instance.
• Peer-to-Peer
An NOS is an OS that has been specifically written to • Client/Server
keep networks running at optimal performance.
In a peer-to-peer network, also called a workgroup, The computers in a workgroup are considered
computers directly communicate with each other peers because they are all equal and share
and do not require a server to manage network resources among each other.
resources.
Each user decides which data on his or her
A peer-to-peer network is most appropriate when computer will be shared with the network.
fewer than ten computers are located in the same
general area. By sharing common resources, users can print from
a single printer, access information in shared
folders, and work on a single file without
transferring it to a floppy disk
In a peer-to-peer network, all computers are considered Designed primarily for small to medium local area networks
equal; they all have the same abilities to use the resources
available on the network
AppleShare and Windows for Workgroups are examples of
programs that can function as peer-to-peer network
Allow users to share resources and files located on their
computers and to access shared resources found on other operating systems.
computers
Advantages
Disadvantages
Allow the network to centralize functions and applications
Decentralized - No central repository for files and in one or more dedicated file servers
applications.
The file servers become the heart of the system,
Security - Does not provide the security available on a providing access to resources and providing security.
client/server network.
Logical topologies are bound to network protocols and The Ethernet protocol is a common logical bus topology
describe how data is moved across the network. protocol