-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 11
Overview
LAN communications definedA fundamental requirement of any LAN
is a transmission channel. Once this channel hasbeen put into
place, the next step is to use it to allow stations to
communicateto transmitdata, exchange files and messages, and to
monitor and manage the network.There are three basic configurations
for the transmission of data:
A point-to-point connection, where two computers or a computer
and a peripheraldevice are directly attached to each other.
A LAN, which is usually a shared data communications facility.
Here, a number ofstations can attach to the transmission channel
but only one can successfullytransmit at a time.
A WAN (Wide Area Network) which represents communication between
LANs overextended geographic distances. Often, the communications
channels used forWAN activity are owned by a third party, such as a
telephone company.
For all of the above configurations, the interface between the
devices must either be thesame, or appropriate hardware/software
must be provided to convert the coding, formatting,framing and
protocols between the different systems.The focus of this chapter
is on how communications are achieved between stations on aLAN.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 12
Communications terminology Asynchronous communications.
Each data character is coded as a string of bits and characters
are separated bystart-character bit(s) and stop bit(s).
Synchronous communications.No start and stop bits are used.
Groups of bits are separated using a clockingmechanism. That is,
the sending and receiving stations are in synch with eachother.
Error detection and correction.Techniques to permit a station to
detect corrupted data and initiate aretransmission.
Bandwidth.A measure of data throughput. The information
transmission capacity of thetransmission system, typically measured
in Megabits per second (Mbps) in LANenvironments.
Packets/Frames/Datagrams.A package of data with header
informationtypically, source and destinationaddresses, error
correction information, sequence numbers and other information.Sent
and received by stations on a LAN.
Bit stream.A series of binary 0s and 1s, representing the
message being communicated.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 13
CCITT, continued
Communications standards organizations
American National Standards Institute (ANSI)ANSI is responsible
for the development of both the FDDI (Fiber Distributed Data
Interface)and the TP-PMD (Twisted-Pair- Physical Medium Dependent)
LAN standards. Both of thesetechnologies operate at 100 Mbps, FDDI
over optical fiber cabling and TP-PMD over twisted-pair cabling.
They are discussed in greater detail in a later chapter.
Comite Consultatif Internationale de Telegraphique
etTelephonique (CCITT)More commonly known in English as the
Consultative Committee on International Telegraphyand Telephony.The
CCITT forms part of the International Telecommunications Union
(ITU), based inGeneva, Switzerland. The ITU is a United Nations
agency and all UN members belong to theITU.The job of the CCITT is
to study, recommend and standardize technical and operationalissues
for telecommunications. The activities of the CCITT can be divided
into three areas:
Study GroupsTheir focus is to set standards for
telecommunications equipment, systems,networks and services.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 14
Plan Committees (World Plan and Regional Plan Committees)Their
focus is to develop general plans for a harmonized evolution of
networks andservices.
Specialized Autonomous GroupsTheir focus is to produce
handbooks, strategies and case studies for supportmainly of
developing countries.
The CCITT is more recently referred to as ITU-TSS (International
TelecommunicationsUnion-Telecommunications Standardization
Section).
CCITT (ITU) recommendationsThese recommendations have a
non-binding statusno one is forced to follow them.However, there is
an increasing awareness that following such
recommendationssimplifies interconnection and interoperability of
devices on a worldwide basis.Two well-known series of standards
produced by the CCITT include the V-series and theX-series. The
V-series covers transmission over telephone networks and has been
used toclassify modem devices. The X-series covers Open Systems
Interconnection (OSI)standards, discussed later in this
chapter.
CCITT, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 15
Examples of V-series CCITT standards V.22 1200 bps (bits per
second) full-duplex modem standard. V.22bis 2400 bps full-duplex
modem standard. V.28 Defines circuits in RS-232 interface. V.32
Asynchronous and synchronous 4800 and 9600 bps standard. V.32bis
Asynchronous and synchronous standard up to 14400 bps. V.34 A
proposed standard for 28 Kbps transmission rates. V.35 Defines high
data rates over combined circuits. V.42 Defines error checking
standards. V.42bis Defines modem compression using Lempel-Ziv
method.
Examples of X-series CCITT standards X.25 (ISO 7776)
Packet-switching network interface. X.200 (ISO 7498) OSI Reference
Model. X.400 (ISO 10021) Message handling (e-mail). X.500 (ISO
9594) Directory Services. X.700 (ISO 9595) Common Management
Information Protocol (CMIP).
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 16
International Organization for Standardization (ISO)Commonly
referred to as the International Standards Organization, ISO is the
worlds mostinfluential standards organization. Based in Geneva, ISO
has developed a seven-layerreference model for computer networking
known as the Reference Model of Open SystemsInterconnection (less
formally, the OSI model).
OSI ModelThe OSI model is concerned with how systems exchange
informationtheirinterconnectionnot with the internal functions
performed by a given system. This modeluses a layered approach,
where sets of functions are assigned to different layers.A
description of the OSI model and the role it plays in the LAN
environment is detailedlater in this chapter.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 17
Institute of Electrical and Electronics Engineers (IEEE)The IEEE
is a United States-based organization responsible for the
development of localarea network architecture standards. It was
founded in 1884 for the purpose of promoting themembers, theories
and practices in the fields of electrical, and later, electronic
and computerengineering.The IEEE Computer Society Local Network
Committee has developed several standardsrelated to the LAN
environment. They have produced, and continue to update, a set
ofstandards defined under IEEE Project 802 (so named because it was
formed in February,1980).
IEEE Project 802Project 802 is responsible for providing
recommendations regarding how data should betransmitted from one
network device to anothercorresponding to the lowest two layers
ofthe OSI seven-layer model (the Physical and Data Link
layers).Early on in its work on developing LAN standards, it became
clear to members that asingle standard, meeting all LAN
requirements, would be impossibly complex. For thisreason, Project
802 worked towards developing sets, or families, of standards.
Theobjective was to encourage compatibility within a given family
of standards, whilepermitting the different families to meet
various market requirements.The role Project 802 plays in the LAN
environment is detailed later in this chapter.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 18
Communications fundamentals
Protocols
DefinedA protocol is defined as:
A specific set of rules relating to the formatting and timing of
datatransmission between two devices.
Protocols are therefore, the rules that govern the
communications between two computers.They represent a standard
procedure that two data devices accept and use tocommunicate with
each other.
Computer communications protocols are much like diplomatic
protocols which, forexample, define the proper procedures for
communications between two heads of state.They specify who talks to
whom, at what point in time, what they can say to each other,and
how they must say it.Communication protocols are defined within the
context of a layered architectureaprotocol stack such as the OSI
seven-layer reference model. In a layered architecture,each layer
builds a protocol data unit (PDU) that it sends to the peer, or
equivalent, layerin the destination computer. Upper layers of a
protocol stack build PDUs, then pass themto lower layers for
further packaging.
Protocols, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 19
Function of a protocolProtocols for data communications cover
such areas as:
Speed of communication. Electrical characteristics. Use of
shared resources. Message length. Addressing. Error handling.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 110
Packets/Frames/Datagrams
DefinedA packet or datagram is a package of data that is
transmitted between stations over atransmission channel. Packets
are assembled by the protocol layer(s) in the sendingstation and
disassembled by the corresponding protocol layer(s) in the
receiving station.Once a packet reaches the bottom of the protocol
stack, it is broken into one or moreframes for transmission as a
bit stream over the communications channel. The frameformat is
defined by the LAN technology used.A packet consists of two
componentsthe data being exchanged (sometimes referred toas the
payload) and headers. Headers include the source and destination
addresses andcontrol information. The data being exchanged can
be:
Data, such as the contents of files. Messages and commands, such
as a request for service. Control codes for managing the
communication session, such as codes to indicate
communication errors and the need for retransmission.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 111
Layered architectures
DefinedLayering is a design approach specifying different
functions and services at different levelsin a protocol stack. The
protocol stack itself defines how communication hardware
andsoftware interoperate at various levels. The Open Systems
Interconnection seven-layerreference model is an example of such a
protocol stack.Protocol stacks have the following
characteristics:
Lower layers provide services to upper layers. Each layer
provides a set of services. Services are defined by protocols.
Service access points (SAPs) are the connection points between
layers.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 112
Hardware independence
OverviewA major problem in the early days of LAN computing was
the lack of hardware and cablingindependence. That is, the hardware
and the cabling system were dependent on the typeof LAN
environment.The difficulty was that no one type of hardware and
cabling was best suited for allsituations. LAN buyers confirmed the
need for these different environments by purchasingdifferent
systems for different organizational requirements. Unfortunately,
few of thesediverse systems were able to communicate with each
other.Rather than focus on a single, general-purpose LAN to satisfy
all requirements, standardscommittees work towards achieving
hardware independence, defined as the ability ofdifferent
components to communicate and work with each other.
ObjectivesThere are certain objectives that should be met in the
development of opencommunications standards:
Connectivity It should be possible to connect different hardware
and software products to form a
networking system.
Hardware independence,continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 113
Modularity It should be possible to use a relatively small set
of general-purpose building
blocks in a wide variety of network environments.
Ease of implementation It should be possible to quickly and
easily install in a variety of configurations to
meet the needs of the users.
Ease of use It should be possible for network users to use the
communications facilities without
knowledge of the network structure or implementations.
Reliability It should provide error detection and correction
functions.
Ease of modification It should be possible for the network to
evolve as user needs changes or as new
technologies become available.Much of the credit for hardware
independence and ease of communication betweendevices goes to the
International Organization for Standardization (ISO) and the
Instituteof Electrical and Electronics Engineers (IEEE). Their work
in these areas is discussed inthe following pages.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 114
The Open Systems Interconnection (OSI) model
OverviewThe primary objective of the OSI model is to provide a
framework for the development ofstandards for computer-to-computer
communications. Specifically, the model details thestandards which
allow for the flexible interconnection of systems using data
communicationsfacilities. A system can be defined as follows:
One or more computers and the associated software,
peripherals,operators, physical processes and transfer means that
forms anautonomous whole capable of processing and/or
transferringinformation.
This broad definition of a system allows the OSI model to be
applied to very simple systemsas well as to complex ones.The model
is meant to provide a generalized view of a layered architecture.
The model,introduced in 1978, divides the communication process
into a hierarchy of seveninterdependent functional layers. Each
layer has a built-in interface to the adjacent layer(s).
OSI overview, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 115
FIGURE 3.1: THE OSI MODEL
Physical
Data Link
Network
Transport
Session
Presentation
Application
Layer 1
Layer 2
Layer 3
Layer 4
Layer 5
Layer 6
Layer 7
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 116
Defining the seven layers of the OSI model
Physical LayerThe physical layer is responsible for the
transmission of bit streams across a particularphysical
transmission channel. This involves a connection between two
devices allowingelectrical signals to be exchanged between
them.
Data Link LayerThe data link layer is responsible for providing
reliable data transmission from one deviceto another and for
shielding higher layers from concerns regarding the
physicaltransmission channel. This layer is concerned with the
error-free transmission of packetsbetween network devices.
Network LayerThe network layer is concerned with routing data
from one network device to another. It isresponsible for
establishing, maintaining and terminating the network connection
betweenany number of devices and for transferring data along that
connection. It is possible tohave only one path for network
connection or many possible routes to choose from when aconnection
is established between any two devices on a network.
Defining the seven layers of theOSI model, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 117
Transport LayerThe transport layer is responsible for providing
data transfer between two users at anagreed-upon level of quality.
After establishing a connection between two users, thetransport
layer is responsible for selecting a particular class of service to
be used,monitoring the transmission for billing purposes, ensuring
that the appropriate servicequality is maintained, and for
generating an alert if this quality has been compromised.
Session LayerThe session layer provides the services used to
organize and synchronize a given dialogoccurring between devices
and to manage the data exchange. A major purpose of thesession
layer is to control when devices in communications with each other
can send andreceive data. Among other factors, this is based on
whether the devices can send andreceive data concurrently or
alternately.
Presentation LayerThe presentation layer is responsible for the
presentation of information in a way that ismeaningful to the
network devices. Included in the specifications are character
codetranslations, data conversions, or data compression and
expansion.
Application LayerThe application layer provides a means for
similar or dissimilar application processes toexchange information.
Included are services used to establish and terminate
connectionsbetween devices, and services to monitor and manage the
systems being interconnectedas well as the various resources being
employed.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 118
Purpose of the OSI modelThe OSI model is concerned with the
exchange of information between a pair of opensystems. It is not
concerned with the internal functions of the individual systems.The
model is concerned with the capability of systems to cooperate in
the exchange ofinformation and in the ability to accomplish the
tasks governing this exchange.The primary motive in the development
of the OSI model was to provide a framework forstandardization.
Within the model, one or more protocol standards can be developed
at eachlayer. The OSI model defines, in general terms, the
functions to be performed at a particularlayer.This model is meant
to facilitate the standards-making process in two ways:
The pace at which communications standards are developed is made
faster withthe model. The functions of each layer are well-defined,
allowing standards to bedeveloped independently and simultaneously
for each layer.
The introduction of new standards is simplified. The boundaries
between layers arewell-defined, therefore, a new standard in one
layer need not affect any of theworkings of the other layers.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 119
Using the OSI model
The hardware levelLayers 1 and 2 (Physical and Data Link) are
referred to jointly as the hardware level. Theyprovide the
fundamental link between two devices on which other, more
sophisticated,services are built.At this level, three protocols are
in common useEthernet, Token-bus and Token-ring.These have been
defined by the IEEE Project 802 and are further discussed later in
thischapter.
The transport levelLayers 3 and 4 (Network and Transport) make
up the transport level. This level isresponsible for controlling
network communications.Actual communications on a network involve
only two types of devicesthe sendingdevices and the receiving
devices. A temporary communications linka virtualconnectionis made
between these devices when they need to communicate. This
virtualconnection is different from the permanent physical
connection each device has to thenetwork.Software at this level
establishes and manages the temporary connection between thesending
device and the receiving device.
Using the OSI model, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 120
Transport-level protocolsSeveral transport level protocols are
commonly found in the LAN environment. Each ofthese protocols has
its own characteristics, advantages and disadvantages. Two of
themore commonly used LAN transport level protocols are the
following:
IPX/SPXNovells transport protocol, IPX/SPX (Internetwork Packet
Exchange/ Sequenced PacketExchange) is based on Xeroxs XNS (Xerox
Network Systems). It was designed at a timewhen few LAN-specific
transport protocol existed. Today it is a widely-used protocol
inLAN environments.
NetBEUIDeveloped by IBM and Microsoft, NetBEUI (NetBIOS Extended
User Interface) wasintroduced in 1984, along with NetBIOS (Network
Basic Input and Output System), itscorresponding session layer
protocol. Since both of these influential vendors declared thatthey
would use NetBIOS/NetBEUI in their future networking products, many
other vendorshave adopted these protocols for their networking
systems.
Both of these protocols enjoy a wide level of support in the LAN
community. This,combined with the independence between the
transport and the hardware levels, meansthat either of these
protocols can be used to establish communications between
stationson dissimilar LANs.
Using the OSI model, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 121
The application-to-transport levelThe application-to-network
level is the point where an application running on a station
canattach to the network joining that station to the others.Some
applications, such as gateway communications between a LAN station
and amainframe system, are communications-intensive and require
point-to-pointcommunications services. A point-to-point connection
is an uninterrupted connectionbetween two devices. These
applications usually attach to the network at Layer 5(Session).The
other application-to-network layer is Layer 6 (Presentation).
Nearly all applicationprograms attach to the network through this
layer.
The application levelLayer 7 (Application) defines the
communications interface for network applicationssoftware designed
specifically to be used over a network. Network operating systems
usethe services defined at this level, as do many network utility
programs, such as electronicmail systems. The network applications
in turn, support various user applications.It should be noted that
user applications, such as word processing, are not defined
usingthe OSI model; only products used for network communications
are defined.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 122
Applying the OSI model in the LAN environmentThe OSI model was
developed for computer networks in general, not specifically for
the LANenvironment. However, the first two layers of the OSI
reference model play an important rolein establishing
LANcommunicationsthe Physical layerand the Data Link layer. Both
ofthese layers are clearly defined byIEEE Project 802, discussed
next.The OSI reference model is crucial
innetwork-to-networkcommunications internetworking. Itallows for
the development ofstandards to enable communicationsbetween two
dissimilar networks.The role of the OSI reference modelin
internetworking is detailed in alater chapter.
FIGURE 3.2:THE OSI MODEL ANDLAN COMMUNICATIONS
.....................
.....................
.....................
.....................
.....................
Application
Presentation
Session
Transport
Network
Data Link
Physical
Network applicationssoftware
SpecializedNetwork
communicationssoftware
Media Access Control
Physical Link Control
Logical Link Control
OSI Model LAN communications
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 123
IEEE Project 802
OverviewIEEE Project 802 was initiated specifically for the LAN
environment. The rationale of thisgroup was to develop standards
which would be widely accepted. This, in turn, would ensurea
high-volume market, encouraging manufacturers to commit the
necessary resources todeveloping standardized products. More
importantly, it would allow the equipment from thesemanufacturers
to communicate with each other.The original series of standards
developed under Project 802 were subsequently adopted byANSI in
1985 as American National Standards and by ISO in 1987 with the
designation 8802.Project 802 has produced a set of standards for
LAN communications. They are designed tobe a subset of the OSI
model. This means higher-layer protocols can be developed for
variousnetwork services without the need to produce new LAN
protocols to accompany them.The relationship between the OSI model
and Project 802 follows:
The physical layer of the various Project 802 standards
correspond to the physicallayer of the OSI model.
The Data Link layer of the OSI model has been divided into two
sublayers byProject 802Medium Access Control (MAC) and Logical Link
Control (LLC).LAN architectures are subdivided in this manner
because a set of common linkcontrol subfunctions can apply to all
LANs, while the medium access controltechnique can differ for each
one.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 124
802 standardsThe IEEE 802 is made up of many subcommittees. A
brief overview of these committeesfollows.
IEEE 802.1 - High-Level Interface The IEEE committee defining
the relationship between the IEEE 802 standards
and the ISO Open Systems Interconnection (OSI) reference model.
It provides forLAN management and bridging standards.
IEEE 802.2 - Logical Link Control A Data Link layer standard
used with IEEE 802.3, 802.4 and 802.5 standards.
IEEE 802.3 - Carrier Sense Multiple Access with Collision
Detection A Physical layer standard specifying a linear bus LAN
with a CSMA/CD access
method commonly associated with Ethernet and Fast Ethernet.
IEEE 802.4 - Token-bus A Physical layer standard specifying a
token-passing access method on a bus
topology. It is used by the Manufacturing Automation Protocol
(MAP), developed byGeneral Motors, and by ARCnet.
802 standards, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 125
IEEE 802.5 - Token-ring A Physical layer standard specifying a
token-passing access method on a ring
topology.
IEEE 802.6 - Metropolitan Area Network (MAN) Describes a
topology known as Distributed Queue Dual Bus (DQDB). This
topology consists of two parallel runs of cable to link devices
over a metropolitan(city-sized) area. The transmission medium is
usually optical fiber and transmissionspeed in the range of 100
Mbps.
IEEE 802.7 - Broadband Technology The IEEE technical advisory
group for broadband LANs. This committee provides
technical advice to other subcommittees on broadband networking
techniques.
IEEE 802.8 - Fiber Optics The IEEE technical advisory group for
optical fiber LANs. This committee provides
technical advice to other subcommittees on optical fiber
networks as alternatives toexisting copper-based networks.
IEEE 802.9 - Integrated Services LAN The IEEE committee working
on the integration of voice, data and video traffic over
other 802 LANs.
802 standards, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 126
IEEE 802.10 - LAN Security The IEEE technical advisory group for
security. This group is working on the
definition of a standard security model that will operate over a
variety of networks.It incorporates both authentication and
encryption methods.
IEEE 802.11 - Wireless The IEEE committee working on standards
for wireless networks. This group is
working on the standardization of media such as spread-spectrum
radio,narrowband radio, infrared and transmission over power
lines.
IEEE 802.12 - Demand Priority The IEEE committee charged with
the standard for 100 Mbps Ethernet using a
Demand Priority access method, commonly referred to as
100VG-AnyLAN.
802 standards, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 127
FIGURE 3.3: PROJECT 802 LAYERS AND SUBLAYERS
802.3MediumAccess
802.3Physical
802.4MediumAccess
802.4Physical
802.5MediumAccess
802.5Physical
802.1 Bridging
802.2 Logical Link
802.7 Broadband Advisory
802.8 Optical fiber Advisory
OSI layers
Data link
Physical
802.12MediumAccess
802.12Physical
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 128
Physical layer overviewThe Physical layer is responsible for
establishing, maintaining, and releasing physicalconnections
between two network devices and for transmitting bits over the
transmissionchannel. Included is:
Encoding data into the correct form for transmission. Generating
the signal. Controlling the timing of devices so that they are
synchronized with the signal
being transmitted and received.IEEE Project 802 accommodates the
three transmission media used at the Physical layertwisted-pair
cable, coaxial cable and optical fiber cable. Its specifications,
for a given LANarchitecture, include:
The type of cable. The type of transmission. The encoding
method. The data rate.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 129
Data Link layer overview
Logical Link Control (LLC) sub-layer recommendationsLogical Link
Control (LLC) specifies mechanisms for addressing stations across
thetransmission medium and for controlling the exchange of data
between two devices. Itincludes provisions for establishing
connections, for data transfer and for connectiontermination.The
role of this sub-layer is to shield the higher-level layers from
the low-level signalingspecifications of each LAN architecture.
Project 802 defines only a single standard at thislevelit is a
common element in all of the 802 standards.
The logical link control sub-layer is responsible for the
following: Initiating control signal interchange. Organizing data
flow. Interpreting commands. Generating responses. Carrying out
error control and recovery functions.
Data Link layer overview,continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 130
Media Access Control (MAC) sub-layer recommendationsThis
sub-layer of the Data Link layer is responsible for defining the
rules allowing networkdevices to share the transmission channel. It
defines how the many devices sharing thesingle physical
transmission channel gain orderly access to the medium. Four
functionsmake up the media access control sub-layer standard:
Medium Access Management The rules or procedures used by network
devices to control the sharing of the
transmission medium.
Framing The addition of header and trailer information necessary
to identify the beginning
and end of a packet, to synchronize the sender with the
receiver, to route thepacket, and to provide for error
detection.
Addressing The determination of the appropriate network
addresses to identify the devices
involved in sending and receiving a message.
Error Detection The checking done to ensure that a packet has
been transmitted and received
correctly.
Data Link layer overview,continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 131
Although many access control methods exist, Project 802 has
standardized three methods: CSMA/CD [introduced in IEEE 802.3].
Token-bus [introduced in IEEE 802.4]. Token-ring [introduced in
IEEE 802.5].
Each of these methods is described on the following pages.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 132
IEEE 802.3 CSMA/CD Media Access Control
Definition of CSMA/CDThe IEEE 802.3 standard specifies the
CSMA/CD (Carrier Sense Multiple Access withCollision Detection)
media access control method. CSMA/CD is the most commonlyemployed
access method for LANs using a bus or tree topology. It is the
media accesscontrol method used by Ethernet.CSMA/CD operates per
the following steps:
A station with a message to transmit listens to the transmission
medium to see ifanother station is currently transmitting a
message.
If the transmission medium is quietno other station is
transmittingthetransmission is sent.
When two or more stations have a message to send, it is possible
that theytransmit at precisely the same time, resulting in a
collision on the network.
When a collision occurs, all receiving stations ignore the
garbled transmission. The transmitting stations stop transmitting
as soon as they detect a collision. Each of the transmitting
stations waits a random period of time and attempts to
transmit again.
Definition of CSMA/CD, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 133
Carrier sensingCarrier sensing is the approach used by CSMA/CD
for listening to the transmissionmediumthe carrier to see if it is
free. If it is, the encapsulated data frame is passed tothe
physical layer for transmission. If the carrier is busy, it
continues to be monitored untilit is free.
Collision detectionAfter transmission has begun, monitoring of
the transmission medium continues. Whentwo signals collide, their
messages get mixed and become unreadable. If this happens,
theaffected stations stop transmitting and send out a jamming
signal. This jamming signalensures that all other stations on the
network are aware a collision has occurred.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 134
CSMA/CD functionsThe IEEE CSMA/CD standard defines a model made
up of six functions. Three of thesefunctions are concerned with
sending data and the three others are concerned with receivingdata.
The receiving functions operate in parallel with the sending
functions.
Data encapsulation/decapsulationThe data encapsulation and
decapsulation function is performed by the Media AccessControl
sublayer. This process is responsible for addressing and
error-checking functions.
Data encapsulationData encapsulation is performed by the sending
station. It is the act of addinginformationaddresses and error
control bytesto the beginning and end of the data unitto be
transmitted. This is done after the data packet is received from
the Logical LinkControl sublayer. The information added to the
packet is needed to perform the followingtasks:
Synchronize the receiving station with the signal. Delimit the
beginning and end of the frame. Identify the addresses of both the
sending and receiving stations. Detect transmission errors.
CSMA/CD functions, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 135
Data decapsulationData decapsulation is performed by the
receiving station. When a frame is received, thereceiving station
is responsible for performing the following tasks:
Recognizing the destination address and determining if it
matches the stationsown address.
Performing an error check. Removal of the control information
that was added by the data encapsulation
function in the sending station.
Media access managementThe media access management function is
also performed by the Media Access Controlsublayer.In the sending
station, the media access management function is responsible
fordetermining whether the transmission medium is available. If the
channel is available,transmission can begin. Additionally, the
management function is responsible fordetermining what action
should be taken when a collision is detected and when to try
toretransmit.
In the receiving station, the media access management function
is responsible forperforming validity checks on a frame before
passing it to the data decapsulation function.
CSMA/CD functions, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 136
Data encoding/decodingThe data encoding/decoding function is
performed by the Physical layer. This function isresponsible for
getting the electrical form of the data transmission onto the
transmissionmedium.
Data encodingData encoding is performed by the sending station.
It is responsible for translating the bitsinto the correct
electrical signals to be sent across the transmission medium.
WithCSMA/CD, Manchester phase encoding is used to translate the bit
stream into electricalsignals.In addition, this function is
responsible for listening to the transmission medium and
fornotifying the media access management function whether the
medium is free or busy or ifa collision has been detected.
Data decodingData decoding is performed by the receiving
station. It is responsible for translating theelectrical signal
back into a bit stream.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 137
CSMA/CD transmission frameA transmission frame is defined
as:
A group of bits in a specific format, with anindicator at each
end to signal thebeginning and end of the frame.
The defined format of a frame allows networkequipment to
recognize the meaning and purpose of thespecific bits in the frame.
A frame is usually a logicaltransmission unit containing control
information forerror checking and addressing purposes.The CSMA/CD
(IEEE 802.3) frame format is shownbelow.
FIGURE 3.4:CSMA/CD (IEEE 802.3) FRAME FORMAT
Frame CheckSequence
Pad(optional)
Information
Length Count
Source Address
Destination Address
Start FrameDelimiter
Preamble7 bytes
1 byte
2 or 6 bytes
Variable
2 bytes
2 or 6 bytes
0 - n bytes
4 bytes
CSMA/CD transmission frame,continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 138
The CSMA/CD frame components are responsible for the following
tasks:
PreambleThe preamble is responsible for providing the
synchronization between the sending andreceiving device.It is a
series of 56 bits (7 bytes) of alternating 1s and 0s found at the
beginning of theframe.
Start Frame DelimiterThe start frame delimiter follows the
preamble. As its name implies, it indicates the startof the data
frame. The start frame delimiter is 1 byte in lengthmade up of the
following8-bit sequence10101011.
Address FieldsEach of the address fieldsthe destination address
and the source addresscan beeither 2 bytes or 6 bytes in length. If
universal addressing is used, the addresses must be6 bytes each.
But if local addressing is used they may be either 2 or 6 bytes
long. Bothdestination and source addresses must be of the same
length for all devices on a givennetwork.The destination address
field specifies the station(s) to which the data is to be sent.
Anaddress referring to a specified group of stations is known as a
multicast group addressand an address referring to all of the
stations on the network is known as a broadcastaddress.The source
address identifies the station making the transmission.
CSMA/CD transmission frame,continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 139
Length CountThis is a 2-byte field indicating the length of the
data field that follows. It is needed todetermine the length of the
data field in those cases when a pad field is used.
Information FieldThe information field contains the actual data
packet to be transmitted. Its length isvariable.
Pad FieldA pad field is used to ensure that the frame meets a
minimum length requirement. A framemust contain a minimum number of
bytes in order for stations to detect collisionsaccurately.
Frame Check SequenceThe frame check field is used as an
error-control mechanism.When the transmitting device assembles a
frame, it performs a calculation on the bits inthe frame. The
algorithm used to perform this calculation always results in a
4-byte value.The sending device stores this value in the frame
check sequence field.
When the destination device receives the frame, it performs the
same calculation andcompares the result to that in the frame check
sequence field. If the two values are thesame, the transmission is
assumed to be correct. If the two values are different,
thedestination device can request a retransmission of the
frame.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 140
IEEE 802.3 naming conventionA variety of IEEE 802.3
implementations are available. To distinguish between them,
anotation has been developed. The notation specifies three
characteristics of theimplementation:
The data rate in Mbps. The signaling method used. The
approximate maximum cable segment length in hundreds of m.
Some of these IEEE 802.3 implementations and their
characteristics are as follows:
1Base-5 The IEEE standard for baseband Ethernet at 1 Mbps over
twisted-pair cabling to a
maximum distance of 500 m (1640 ft).
10Base-5 The IEEE standard for baseband Ethernet at 10 Mbps over
coaxial trunk and
AUI (Attachment Unit Interface) twisted-pair cable to a maximum
distance of500 m (1640 ft).
10Base-2 The IEEE standard for baseband Ethernet at 10 Mbps over
thin coaxial cable to a
maximum distance of 185 m (607 ft).
IEEE 802.3 naming convention,continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 141
10Broad-36 The IEEE standard for broadband Ethernet at 10 Mbps
over broadband coaxial
cable to a maximum distance of 3600 m (2.25 mi).
10Base-T The IEEE standard for baseband Ethernet at 10 Mbps over
unshielded twisted-pair
following a star horizontal cabling topology, with a maximum
distance of100 m (328 ft) from the station to the hub.
10Base-F The IEEE standard for baseband Ethernet at 10 Mbps over
optical fiber to a
maximum distance of 2 km (1.25 mi).
100Base-TX The IEEE standard for baseband Ethernet at 100 Mbps
over two twisted-pairs
either 2-pair Category 5 UTP or 2-pair STP cabling.
100Base-T4 The IEEE standard for baseband Ethernet at 100 Mbps
over four-pair UTP
cablingeither Category 3, 4 or 5.
100Base-FX The IEEE standard for baseband Ethernet at 100 Mbps
over a two-fiber
62.5/125 m optical fiber cabling system.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 142
IEEE 802.4 Token Bus Media Access Control
Definition of Token-busThe IEEE 802.4 standard specifies the
Token-bus media access control method. It is one oftwo token
passing access methods. IEEE 802.4 is based on a physical bus or
tree topology.The Token-bus approach requires a station to have
possession of a token in order totransmit. The token is passed from
station to station in a logical ring.IEEE 802.4 is the basis for
LAN architectures often used in factory automation, such as MAPand
ARCnet.Token-bus operates in the following manner:
A station having data to transmit must first be in possession of
the token. Thetoken gives a device the right to transmit.
When a station receives the token, it broadcasts its
transmission for all stations tohear. The station is given a
predetermined amount of time to send its message.
When the station has transmitted all of its data unit, or it has
run out of time, thetoken is passed to the next station.
If a station runs out of time, it must wait until the next time
it possesses thetoken to transmit the rest of the data.
Definition of Token-bus, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 143
Devices on the network acknowledge only those transmissions
addressed to them. When a token is passed to the next device, the
address field is changed. The token
is always passed from station to station in order of decreasing
addresses. Whenthe lowest address is reached, the token is sent to
the station with the highestnetwork address.
If a station receiving the token has no message to transmit, the
token isimmediately passed on to the next station in the
hierarchy.
Since possession of the token is needed for a station to
transmit, there is nopossibility of a collision. With no
possibility of a collision, there is no minimumlength requirement
for data packets and only minimal control information isrequired
for proper processing.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 144
Token-bus functionsThe Token-bus standard addresses five key
areas as part of the Media Access Controlsublayer.
Interface to the Logical Link Control sublayerThe MAC sublayer
receives data packets from the LLC sublayer and prepares them
fortransmission. It also receives incoming data packets and
prepares them to be passed on tothe LLC sublayer.
Token handlingThis function makes provisions for:
Passing tokens from station to station. Recognizing a token when
it is received. Prioritizing data packets.
Ring maintenanceRing maintenance functions include
initialization of the logical ring during network start-upand
modification of the logical ring as stations are connected to or
disconnected from thenetwork.
Token-bus functions, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 145
Fault detection and recoveryFaults must be detected and, when
possible, corrected as soon as possible. Somepossible faults
occurring on a Token-bus network include:
Multiple tokens. Lost tokens.
Token pass failures. Stations with unresponsive receivers.
Duplicate station addresses.
Sending and receiving dataIn order to send or receive data,
control information must be added to and removed fromthe data
packet. Therefore, the MAC sublayer is responsible for preparing
data packetsand passing them to the Physical layer for
transmission. At the receiving end, the packetsmust be taken from
the Physical layer and stripped of control information.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 146
Token-bus transmission frameThe Token-bus frame format is shown
below:
FIGURE 3.5: TOKEN-BUS FRAME FORMAT
End Delimiter
Frame CheckSequence
Information
Source Address
Destination Address
Frame Control
Start Delimiter
Preamble0 - n bytes
1 byte
1 byte
0 - 819 bytes
2 or 6 bytes
4 bytes
1 byte
2 or 6 bytes
Token-bus transmission frame,continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 147
The Token-bus frame components are responsible for performing
the following tasks:
PreambleThe preamble is responsible for providing the
synchronization between the sending andreceiving device.The length
of this field and its contents depend on the modulation method
being used andthe speed of the network.
Start DelimiterThe start delimiter follows the preamble. As its
name implies, it indicates the start of thedata frame. The start
frame delimiter is 1 byte in length and contains a signaling
patternthat is always different from the datathe actual signaling
pattern varies with theencoding scheme used.
Frame Control FieldThis field identifies the type of frame being
sentLogical Link Control data frames, tokencontrol frames, Media
Access Control management data frames, or special-purpose
dataframes.
Token-bus transmission frame,continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 148
Address FieldsEach of the address fieldsthe destination address
and the source addresscan beeither 2 bytes (16-bit addresses) or 6
bytes (48-bit addresses) in length. If universaladdressing is used,
the addresses must be 6 bytes each. But if local addressing is
usedthey may be either 2 or 6 bytes long. Both destination and
source addresses must be ofthe same length for all devices on a
given network.The source address must be for an individual device.
The destination address can be anindividual address, a group
address or a broadcast address.
Information FieldThe information field contains the actual data
packet to be transmitted. Its length isvariable. It may contain a
Logical Link protocol data unit, token control data, managementdata
or special-purpose dataas indicated in the frame control field.
Frame Check SequenceThe frame check field is used as an error
control mechanism.When the transmitting device assembles a frame,
it performs a calculation on the bits inthe frame. The algorithm
used to perform this calculation always results in a 4-byte
value.The sending device stores this value in the frame check
sequence field.When the destination device receives the frame, it
performs the same calculation andcompares the result to that in the
frame check sequence field. If the two values are thesame, the
transmission is assumed to be correct. If the two values are
different, thedestination device can request a retransmission of
the frame.
Token-bus transmission frame,continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 149
End DelimiterThe end delimiter marks the end of the frame and
shows the position of the frame checksequence field. Just as with
the start delimiter, the signaling value is always different
fromthe data.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 150
Token-bus optionsWhile the general principle behind Token-bus is
token passing over a bus or tree topology,the standard actually
specifies three Physical layer optionsbroadband, carrierband
andoptical fiber.
Broadband Token-busThe definition of broadband states that such
a transmission technique allows multipletransmissions to occur
simultaneously, with each transmission taking place at a
differentfrequency on the cable.Broadband Token-bus is defined by
the following characteristics:
It uses 75 coaxial cable as the transmission mediumcoaxial cable
is commonlyused for broadband systems.
It follows a tree topologythis is sometimes referred to as a
directional bus. It supports data channels with the following
bandwidths and transmission speeds:
1.5 MHz bandwidth with a transmission speed of 1 Mbps. 6 MHz
bandwidth with a transmission speed of 5 Mbps. 12 MHz bandwidth
with a transmission speed of 10 Mbps.
Token-bus options, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 151
Carrierband Token-busCarrierband signaling requires that the
whole frequency spectrum of the cable be devotedto a single
transmission path for the purpose of transmitting analog signals.
For thisreason, carrierband is also referred to as single-channel
broadband.Carrierband Token-bus is defined by the following
characteristics:
It uses 75 coaxial cable as the transmission medium. It follows
a traditional bus topology. Since there is only one data channel,
electronics are simpler and less expensive
than those used for broadband.
Specifications exist for transmission speeds of 1, 5 and 10
Mbps.
Optical fiber Token-busThe optical fiber specification is the
most recent addition to the IEEE 802.4 standard.Optical fiber
Token-bus is defined by the following characteristics:
The transmission medium is 2 optical fibersone for transmit and
one forreceivethat supports a spectral width of 270 nanometers (nm)
with a centerwavelength between 800 and 910 nm.
The optical fiber specification can be used with any topology
that is logically abusphysically, it usually follows a star
topology where all devices are connectedto a central active or
passive hub.
Specifications exist for transmission speeds of 5, 10 and 20
Mbps.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 152
IEEE 802.5 Token-ring Media Access Control
Definition of Token-ringIEEE 802.5 is the second of the token
passing access control methods. Token-ring is mostcommonly used in
a network structure following both a logical and physical ring
topology.The right to transmit is controlled by a token. The method
of transmission is as follows:
A token indicating the right to transmit is known as a free
token. When a stationreceives a free token it changes the
configuration of the token to that of a busytoken.
The busy token is included as part of each data unit
transmitted. The station isallowed to transmit data units until a
predetermined time is reached.
The data unit travels from station to station around the ring.
Each station receiving a data unit checks the address to see if it
should process the
information. If the data unit is intended for another station,
it is passed on to the next station in
the ring.
Definition of Token-ring, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 153
The intended destination station, upon receiving and processing
the data unit, setsthree control bits in the data unit before
sending it to the next station:
The Address Recognized control bit allows the destination
station to indicatethat it identified the data unit as being
addressed to it.
The Packet Copied control bit shows that the destination station
sent a copy ofthe data unit to the LLC sublayer for processing.
The Error control bit shows that an error condition was
detected. This control bitcan be set by any station on the ring,
not only by the destination station.
Once the data unit returns to the originating station, it is
removed from the network.The station then sends a free token to the
next station in the ring.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 154
Token-ring functionsToken-ring tokens use three control bits
indicating if the data unit was processed or if anyerror conditions
were detected. The different combinations of two of these bits,
addressrecognized and packet copied, allow the source station to
differentiate between differentconditions. For example, it would be
able to see if:
The data unit was recognized by the destination station and
processed. The data unit was recognized by the destination station
but it was not able to
process it. The data unit was not recognized by the destination
station or the destination
station is nonexistent or inactive.Token-ring differs in two
other areas with respect to method of operationits manner of
faultmanagement and an optional priority scheme.
Fault managementThere are three serious error conditions
affecting the operation of Token-ring:
The loss of a token. A constantly busy token. The failure of a
station on the ring.
In order to detect and then correct the first two of these
conditions, Token-ring designatesone of the stations on the network
as an active monitor. All the remaining stations aredesigned as
passive monitorsmonitoring the operation of the active monitor.
Token-ring functions, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 155
The station designated as the active monitor performs the
following duties: It continuously monitors the network. If no token
is detected for a predetermined amount of time, the monitor
assumes
that the token has been lost and issues a new token.
To check for a constantly busy token, the monitor sets a monitor
bit in a busy tokenas it passes. If the busy token returns with the
monitor bit still set, the monitor willknow that the sending
station did not remove the data unit from the network. Themonitor
then changes the data unit to a free token and passes it to the
next device.
If the active monitor fails, the passive monitors use a
contention procedure to determinewhich one of them becomes the new
active monitor.The third serious error condition is that of a
failed station. If a station fails, it may not beable to transmit,
causing the ring to be broken. To accommodate for such an
occurrence, abypass switch in incorporated into each device.
Closing this bypass switch removes thestation from the ring and
allows data units to circulate properly. When a star-wiredtopology
is used, the bypass switches are found in the central hub. This
makes physicalfailures in the ring easier to correct.
Token-ring functions, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 156
Optional priority schemeToken-ring access control can be
operated on either a nonpriority basis or a priority basis.When
operating on a nonpriority basis, a station can transmit data units
as soon as itreceives a free token.When operating on a priority
basis, three bits in each data unit are used to represent
thecurrent priority. A station receiving a free token follows a set
procedure as follows:
The priority value of the token is compared to the priority
value of the data unit tobe transmitted.
If the priority value of the data unit is equal to or higher
than that of the token, thedata is sent.
If the priority value of the data unit is lower, the data is not
sent.Each frame also has three reservation bits. These can be used
by a station to reserve thetoken for its data transmission. The
process to use the reservation bits is as follows:
A station must have a data unit to transmit that has a priority
greater than zero. When this station receives and retransmits a
frame, it sets the reservation bits in
the token to the same priority value of the data unit. When the
original sending station removes the data unit and generates a free
token
it checks the reservation bits and the priorities of additional
data units it has tosend.
Token-ring functions, continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 157
If the reservation bits or the priority of the waiting data have
a higher value than thecurrent priority, this original sending
station resets the current priority to the highervalue.
When a priority is reset to a higher value, the station saves
the previous priorityvalue and it is responsible for eventually
restoring the token priority to that originallower value.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 158
Token-ring transmission frameThe Token-ring frame format is
shown below.
FIGURE 3.6: TOKEN-RING FRAME FORMAT
Frame Status1 byte
Ending Delimiter
Frame CheckSequence
Information
Source Address
Destination Address
Frame Control
Access Control
Starting Delimiter1 byte
1 byte
1 byte
Variable
2 or 6 bytes
4 bytes
1 byte
2 or 6 bytes
Token-ring transmission frame,continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 159
The Token-ring frame components are responsible for performing
the following tasks:
Starting DelimiterThe starting delimiter indicates the start of
the data frame. It uses a unique signal patternthat does not
correspond to either a 0 or 1 bit. These are known as nondata
values andensure that no data sequence will ever be mistaken for a
delimiter.
Access Control FieldThis field identifies whether the frame is a
data frame or a token. It contains a bit used toidentify a
constantly busy token, a priority bit and reservations bits.
Frame Control FieldThis field identifies the frame type and for
certain types of control frames, the function it isto perform.
Address FieldsEach of the address fieldsthe destination address
and the source addresscan beeither 2 bytes (16-bit addresses) or 6
bytes (48-bit addresses) in length. If universaladdressing is used,
the addresses must be 6 bytes each. But if local addressing is
usedthey may be either 2 or 6 bytes long. Both destination and
source addresses must be ofthe same length for all devices on a
given network.The source address must be for an individual device.
The destination address can be anindividual address, a group
address or a broadcast address.
Token-ring transmission frame,continued
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 160
Information FieldThe information field contains the actual data
packet to be transmitted. This can be eithera protocol data unit
being passed from the logical link control sublayer or
controlinformation supplied by the media access control sublayer.
Its length is variableanywhere from 0 to 17800 bytes in length.
Frame Check SequenceThe frame check field is used as an error
control mechanism.When the transmitting device assembles a frame,
it performs a calculation on the bits inthe frame. The algorithm
used to perform this calculation always results in a 4 byte
value.The sending device stores this value in the frame check
sequence field.When the destination device receives the frame, it
performs the same calculation andcompares the result to that in the
frame check sequence field. If the two values are thesame, the
transmission is assumed to be correct. If the two values are
different, thedestination station can request a retransmission of
the frame.
Ending DelimiterThis identifies the end of the frame by
containing nondata values. It also contains bits usedto identify
whether or not it is the last frame in a multiframe transmission
and if an errorhas been detected by any station.
Frame Status FieldThe frame status field contains the address
recognized and frame copied control bits.
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 161
Overview
..................................................................................
1LAN communications
defined.......................................................
1Communications terminology
....................................................... 2
Communications standards organizations ........................
3American National Standards Institute (ANSI)
.......................... 3Comite Consultatif Internationale
deTelegraphique et Telephonique (CCITT)
...................................... 3
CCITT (ITU) recommendations
........................................................ 4Examples
of V-series CCITT standards
.............................................................
5Examples of X-series CCITT standards
............................................................. 5
International Organization for Standardization (ISO)
............... 6OSI Model
.........................................................................................
6
Institute of Electrical and Electronics Engineers (IEEE)
.......... 7IEEE Project 802
...............................................................................
7
TA
BLE
O
F CO
NTEN
TS TA
BLE
O
F CO
NTEN
TS CH
APTER
3 - LAN CO
MM
UNICATIONS
STA
ND
AR
DS
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 162
Communications fundamentals
........................................... 8Protocols
...........................................................................................
8
Defined
..............................................................................................
8Function of a protocol
........................................................................
9
Packets/Frames/Datagrams
......................................................... 10Defined
............................................................................................
10
Layered architectures
...................................................................
11Defined
.............................................................................................
11
Hardware independence
..............................................................
12Overview
.........................................................................................
12Objectives
........................................................................................
12
Connectivity
......................................................................................................
12Modularity
.........................................................................................................
13Ease of implementation
....................................................................................
13Ease of use
.......................................................................................................
13Reliability
..........................................................................................................
13Ease of modification
.........................................................................................
13
TA
BLE
O
F CO
NTEN
TS TA
BLE
O
F CO
NTEN
TS C
HA
PTER 3 - LAN C
OM
MUNICATIO
NS S
TAN
DA
RDS
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 163
The Open Systems Interconnection (OSI) model ............
14Overview..........................................................................................
14Defining the seven layers of the OSI model
............................. 16
Physical Layer
..................................................................................................
16Data Link
Layer.................................................................................................
16Network
Layer...................................................................................................
16Transport
Layer.................................................................................................
17Session Layer
...................................................................................................
17Presentation Layer
............................................................................................
17Application Layer
..............................................................................................
17
Purpose of the OSI model
............................................................
18Using the OSI model
.....................................................................
19
The hardware level
..........................................................................
19The transport level
..........................................................................
19
Transport-level
protocols...............................................................
20IPX/SPX
............................................................................................................
20NetBEUI
............................................................................................................
20
The application-to-transport level
................................................... 21The
application level
.......................................................................
21
Applying the OSI model in the LAN environment
................... 22
TA
BLE
O
F CO
NTEN
TS TA
BLE
O
F CO
NTEN
TS C
HA
PTER 3 - LAN C
OM
MUNICATIO
NS S
TAN
DA
RDS
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 164
IEEE Project 802
...................................................................
23Overview..........................................................................................
23802 standards
.................................................................................
24
IEEE 802.1 - High-Level Interface
....................................................................
24IEEE 802.2 - Logical Link Control
.....................................................................
24IEEE 802.3 - Carrier Sense Multiple Access with Collision
Detection ............. 24IEEE 802.4 - Token-bus
....................................................................................
24IEEE 802.5 - Token-ring
....................................................................................
25IEEE 802.6 - Metropolitan Area Network (MAN)
.............................................. 25IEEE 802.7 -
Broadband Technology
................................................................
25IEEE 802.8 - Fiber Optics
.................................................................................
25IEEE 802.9 - Integrated Services LAN
.............................................................
25IEEE 802.10 - LAN Security
.............................................................................
26IEEE 802.11 - Wireless
.....................................................................................
26IEEE 802.12 - Demand Priority
.........................................................................
26
Physical layer
overview................................................................
28Data Link layer overview
..............................................................
29
Logical Link Control (LLC) sub-layer recommendations
................. 29Media Access Control (MAC) sub-layer
recommendations ............ 30
Medium Access Management
...........................................................................
30Framing
.............................................................................................................
30Addressing
........................................................................................................
30Error
Detection..................................................................................................
30
TA
BLE
O
F CO
NTEN
TS TA
BLE
O
F CO
NTEN
TS C
HA
PTER 3 - LAN C
OM
MUNICATIO
NS S
TAN
DA
RDS
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 165
IEEE 802.3 CSMA/CD Media Access Control ....................
32Definition of CSMA/CD
.................................................................
32
Carrier sensing
................................................................................
33Collision detection
...........................................................................
33
CSMA/CD functions
......................................................................
34Data encapsulation/decapsulation
.................................................. 34
Data
encapsulation........................................................................
34Data
decapsulation........................................................................
35
Media access management
.............................................................
35Data encoding/decoding
..................................................................
36
Data encoding
...............................................................................
36Data decoding
...............................................................................
36
CSMA/CD transmission frame
.................................................... 37Preamble
...........................................................................................................
38Start Frame Delimiter
.......................................................................................
38Address Fields
..................................................................................................
38Length Count
.....................................................................................................39Information
Field
...............................................................................................
39Pad Field
...........................................................................................................
39Frame Check Sequence
...................................................................................
39
IEEE 802.3 naming convention
................................................... 401Base-5
.............................................................................................................
4010Base-5
...........................................................................................................
4010Base-2
...........................................................................................................
4010Broad-36
........................................................................................................
4110Base-T
...........................................................................................................
4110Base-F
...........................................................................................................
41100Base-TX
......................................................................................................
41100Base-T4
.......................................................................................................
41100Base-FX
......................................................................................................
41
TA
BLE
O
F CO
NTEN
TS TA
BLE
O
F CO
NTEN
TS C
HA
PTER 3 - LAN C
OM
MUNICATIO
NS S
TAN
DA
RDS
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 166
IEEE 802.4 Token Bus Media Access Control ..................
42Definition of Token-bus
................................................................
42Token-bus functions
.....................................................................
44
Interface to the Logical Link Control sublayer
................................ 44Token handling
................................................................................
44Ring maintenance
...........................................................................
44Fault detection and recovery
...........................................................
45Sending and receiving data
.............................................................
45
Token-bus transmission frame
................................................... 46Preamble
...........................................................................................................
47Start Delimiter
...................................................................................................
47Frame Control Field
..........................................................................................
47Address Fields
..................................................................................................
48Information Field
...............................................................................................
48Frame Check Sequence
...................................................................................
48End Delimiter
....................................................................................................
49
Token-bus options
.........................................................................
50Broadband Token-bus
.....................................................................
50Carrierband Token-bus
....................................................................
51Optical fiber Token-bus
...................................................................
51
TA
BLE
O
F CO
NTEN
TS TA
BLE
O
F CO
NTEN
TS C
HA
PTER 3 - LAN C
OM
MUNICATIO
NS S
TAN
DA
RDS
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 167
TA
BLE
O
F CO
NTEN
TS TA
BLE
O
F CO
NTEN
TS IEEE 802.5 Token-ring Media Access Control ..................
52
Definition of Token-ring
................................................................
52Token-ring functions
.....................................................................
54
Fault management
..........................................................................
54Optional priority scheme
.................................................................
56
Token-ring transmission frame
................................................... 58Starting
Delimiter
..............................................................................................
59Access Control
Field.........................................................................................
59Frame Control Field
..........................................................................................
59Address Fields
..................................................................................................
59Information Field
...............................................................................................
60Frame Check Sequence
...................................................................................
60Ending
Delimiter................................................................................................
60Frame Status
Field............................................................................................
60
CH
APTER
3 - LAN CO
MM
UNICATIONS
STA
ND
AR
DS
-
Chapter 3 - LAN Communications Standards 1996, BICSI LAN Design
Manual - CD-ROM, Issue 168
Figure 3.1: The OSI model
.................................................... 15
Figure 3.2: The OSI model and LAN communications ....... 22
Figure 3.3: Project 802 layers and sublayers
..................... 27Figure 3.4: CSMA/CD (IEEE 802.3) frame
format .............. 37Figure 3.5: Token-bus frame format
..................................... 46
Figure 3.6: Token-ring frame format
..................................... 58
FI
GUR
ES FI
GUR
ES FI
GUR
ES FI
GUR
ES CH
APTER
3 - LAN CO
MM
UNICATIONS
STA
ND
AR
DS
ContentsFiguresThe OSI modelThe OSI model and LAN
communicationsProject 802 layers and sublayersCSMA/CD (IEEE 802.3)
frame format Token-bus frame formatToken-ring frame format
Overview LAN communications defined Communications
terminology
Communications standards organizations American National
Standards Institute (ANSI) Comite Consultatif Internationale de
Telegraphique et Telephonique (CCITT) CCITT (ITU) recommendations
Examples of V-series CCITT standards Examples of X-series CCITT
standards
International Organization for Standardization (ISO) OSI
Model
Institute of Electrical and Electronics Engineers (IEEE) IEEE
Project 802
Communications fundamentals Protocols Defined Function of a
protocol
Packets/Frames/Datagrams Defined
Layered architectures Defined
Hardware independence Overview Objectives Connectivity
Modularity Ease of implementation Ease of use Reliability Ease of
modification
The Open Systems Interconnection (OSI) model Overview Defining
the seven layers of the OSI model Physical Layer Data Link Layer
Network Layer Transport Layer Session Layer Presentation Layer
Application Layer
Purpose of the OSI model Using the OSI model The hardware level
The transport level Transport-level protocols IPX/SPX NetBEUI
The application-to-transport level The application level
Applying the OSI model in the LAN environment
IEEE Project 802 Overview 802 standards IEEE 802.1 - High-Level
Interface IEEE 802.2 - Logical Link Control IEEE 802.3 - Carrier
Sense Multiple Access with Collision Detection IEEE 802.4 -
Token-bus IEEE 802.5 - Token-ring IEEE 802.6 - Metropolitan Area
Network (MAN) IEEE 802.7 - Broadband Technology IEEE 802.8 - Fiber
Optics IEEE 802.9 - Integrated Services LAN IEEE 802.10 - LAN
Security IEEE 802.11 - Wireless IEEE 802.12 - Demand Priority
Physical layer overview Data Link layer overview Logical Link
Control (LLC) sub-layer recommendations Media Access Control (MAC)
sub-layer recommendations Medium Access Management Framing
Addressing Error Detection
IEEE 802.3 CSMA/CD Media Access Control Definition of CSMA/CD
Carrier sensing Collision detection
CSMA/CD functions Data encapsulation/decapsulation Data
encapsulation Data decapsulation Media access management Data
encoding/decoding Data encoding Data decoding
CSMA/CD transmission frame Preamble Start Frame Delimiter
Address Fields Length Count Information Field Pad Field Frame Check
Sequence
IEEE 802.3 naming convention 1Base-5 10Base-5 10Base-2
10Broad-36 10Base-T 10Base-F 100Base-TX 100Base-T4 100Base-FX
IEEE 802.4 Token Bus Media Access Control Definition of
Token-bus Token-bus functions Interface to the Logical Link Control
sublayer Token handling Ring maintenance Fault detection and
recovery Sending and receiving data
Token-bus transmission frame Preamble Start Delimiter Frame
Control Field Address Fields Information Field Frame Check Sequence
End Delimiter
Token-bus options Broadband Token-bus Carrierband Token-bus
Optical fiber Token-bus
IEEE 802.5 Token-ring Media Access Control Definition of
Token-ring Token-ring functions Fault management Optional priority
scheme
Token-ring transmission frame Starting Delimiter Access Control
Field Frame Control Field Address Fields Information Field Frame
Check Sequence Ending Delimiter Frame Status Field