SlideShare uma empresa Scribd logo
1 de 11
FDDI




   Network Security
What is FDDI?

 Fiber Distributed Data Interface
 100-Mbps token passing
 Dual-ring LAN
 A high-speed backbone technology
 High bandwidth
 Optical fiber transmission
 Allows up to 1000 stations


              Network Security
FDDI Architecture




         Network Security
Components of FDDI

 Fiber optic cable
 A concentrator (ring)
 Stations: 2 types
     DAS (Dual Attachment Station) or Class A:
          Connected to both the rings
     SAS (Single Attachment Station) or Class B:
          Connected to primary ring




                     Network Security
Ring Wrapping




When a single station fails, devices on either side of the failed
(or powered-down) station wrap, forming a single ring. Network
operation continues for the remaining stations on the ring.

                     Network Security
FDDI Access Method
 FDDI uses token passing as an access method similar to
  the IEEE 802.5 token ring.
 Any station wants to transmit information holds the token
  and then transmits the information and when it finish it
  releases the token in the ring.
 The time a station holds the token is called Synchronous
  Allocation Time (SAT) and this time is variable for each
  station. The allocation of this time to each station is
  achieved by Station Management (SMT).
 The functions of SMT are ring control, ring initialization,
  station insertion and station removal.


                    Network Security
FDDI Frame Format

 Similar to token ring frame




                Network Security
FDDI Frame Fields
 Preamble: Gives a unique sequence that prepares each
    station for an upcoming frame
   Start delimiter: Indicates the beginning of a frame
   Frame control: Indicates the size of the address fields
    and whether the frame contains asynchronous or
    synchronous data, among other control information
   Destination address: Contains a unicast (singular),
    multicast (group), or broadcast (every station) address
   Source address: Identifies the single station that sent
    the frame
   Data: Contains either information destined for an upper-
    layer protocol or control information.
                    Network Security
FDDI Frame Fields (continued)
 Frame check sequence (FCS): Is filed by the source
  station with a calculated cyclic redundancy check value
  dependent on frame contents. The destination address
  recalculates the value to determine whether the frame
  was damaged in transit. If so, the frame is discarded.
 End delimiter: Contains unique symbols; cannot be data
  symbols that indicate the end of the frame.
 Frame status: Allows the source station to determine
  whether an error occurred; identifies whether the frame
  was recognized and copied by a receiving station.




                  Network Security
FDDI Characteristics

 100 Mbps of data throughput
 Two interfaces
 Connects equipment to the ring over
  long distances
 Allows all stations to have equal amount
  of time to transmit data
 FDDI is a LAN with Station Management


             Network Security
Things to do

 FDDI Vs Token Ring
 FDDI Layered structure
 FDDI specifications
 CDDI




             Network Security

Mais conteúdo relacionado

Mais procurados

Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
Abhijeet Shah
 

Mais procurados (20)

Token ring
Token ringToken ring
Token ring
 
ALOHA Protocol (in detail)
ALOHA Protocol (in detail)ALOHA Protocol (in detail)
ALOHA Protocol (in detail)
 
17 SONET/SDH
17 SONET/SDH17 SONET/SDH
17 SONET/SDH
 
TCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet ProtocolTCP/IP – Transmission Control Protocol/ Internet Protocol
TCP/IP – Transmission Control Protocol/ Internet Protocol
 
Application layer
Application layerApplication layer
Application layer
 
Token bus
Token busToken bus
Token bus
 
Csma cd and csma-ca
Csma cd and csma-caCsma cd and csma-ca
Csma cd and csma-ca
 
Frame relay
Frame relayFrame relay
Frame relay
 
TDMA, FDMA, and CDMA
TDMA, FDMA, and CDMATDMA, FDMA, and CDMA
TDMA, FDMA, and CDMA
 
Controlled Access Protocols
Controlled Access ProtocolsControlled Access Protocols
Controlled Access Protocols
 
Token Ring : 802.5
Token Ring : 802.5Token Ring : 802.5
Token Ring : 802.5
 
Ethernet and token ring
Ethernet and token ringEthernet and token ring
Ethernet and token ring
 
Wireless LAN technologies
Wireless LAN technologiesWireless LAN technologies
Wireless LAN technologies
 
LAYER PROTOCOL ,SONET,SDH
LAYER PROTOCOL ,SONET,SDHLAYER PROTOCOL ,SONET,SDH
LAYER PROTOCOL ,SONET,SDH
 
IEEE 802.11
IEEE 802.11IEEE 802.11
IEEE 802.11
 
Hiperlan
HiperlanHiperlan
Hiperlan
 
Ethernet
EthernetEthernet
Ethernet
 
Optical Fiber Communication
Optical Fiber CommunicationOptical Fiber Communication
Optical Fiber Communication
 
CSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARECSMA /CD PPT ON SLIDESHARE
CSMA /CD PPT ON SLIDESHARE
 
Dqdb & Fddi
Dqdb & FddiDqdb & Fddi
Dqdb & Fddi
 

Semelhante a Fddi

Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
Jason Hando
 

Semelhante a Fddi (20)

Mac protocols
Mac protocolsMac protocols
Mac protocols
 
FDDI and SONET by Er.Anup-(IOE)
FDDI and SONET  by Er.Anup-(IOE)FDDI and SONET  by Er.Anup-(IOE)
FDDI and SONET by Er.Anup-(IOE)
 
WLAN - IEEE 802.11
WLAN - IEEE 802.11WLAN - IEEE 802.11
WLAN - IEEE 802.11
 
LAN
LANLAN
LAN
 
Frame relay
Frame relayFrame relay
Frame relay
 
Ethernet
EthernetEthernet
Ethernet
 
WLAN
WLANWLAN
WLAN
 
Network Topologies
Network TopologiesNetwork Topologies
Network Topologies
 
TOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.pptTOKEN BUS & TOKEN RING.ppt
TOKEN BUS & TOKEN RING.ppt
 
Advanced Network Chapter I: Which is very best lecture note
Advanced Network Chapter I: Which is very best lecture noteAdvanced Network Chapter I: Which is very best lecture note
Advanced Network Chapter I: Which is very best lecture note
 
frame relay
frame relayframe relay
frame relay
 
Networking
NetworkingNetworking
Networking
 
IT8602 Mobile Communication - Unit III
IT8602 Mobile Communication  - Unit IIIIT8602 Mobile Communication  - Unit III
IT8602 Mobile Communication - Unit III
 
Unit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part AUnit 3 - Data Link Layer - Part A
Unit 3 - Data Link Layer - Part A
 
Computer networks wireless lan,ieee-802.11,bluetooth
Computer networks  wireless lan,ieee-802.11,bluetoothComputer networks  wireless lan,ieee-802.11,bluetooth
Computer networks wireless lan,ieee-802.11,bluetooth
 
III_UNIT.ppt
III_UNIT.pptIII_UNIT.ppt
III_UNIT.ppt
 
High speed Networking
High speed NetworkingHigh speed Networking
High speed Networking
 
The osi model layers
The osi model layersThe osi model layers
The osi model layers
 
Module 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layerModule 5 high speed swan,atm,transport layer
Module 5 high speed swan,atm,transport layer
 
Module 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25docModule 4 netwok layer,routing ,vlan,x.25doc
Module 4 netwok layer,routing ,vlan,x.25doc
 

Último

Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
KarakKing
 

Último (20)

Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Salient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functionsSalient Features of India constitution especially power and functions
Salient Features of India constitution especially power and functions
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdfUGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
UGC NET Paper 1 Mathematical Reasoning & Aptitude.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024FSB Advising Checklist - Orientation 2024
FSB Advising Checklist - Orientation 2024
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 

Fddi

  • 1. FDDI Network Security
  • 2. What is FDDI?  Fiber Distributed Data Interface  100-Mbps token passing  Dual-ring LAN  A high-speed backbone technology  High bandwidth  Optical fiber transmission  Allows up to 1000 stations Network Security
  • 3. FDDI Architecture Network Security
  • 4. Components of FDDI  Fiber optic cable  A concentrator (ring)  Stations: 2 types  DAS (Dual Attachment Station) or Class A:  Connected to both the rings  SAS (Single Attachment Station) or Class B:  Connected to primary ring Network Security
  • 5. Ring Wrapping When a single station fails, devices on either side of the failed (or powered-down) station wrap, forming a single ring. Network operation continues for the remaining stations on the ring. Network Security
  • 6. FDDI Access Method  FDDI uses token passing as an access method similar to the IEEE 802.5 token ring.  Any station wants to transmit information holds the token and then transmits the information and when it finish it releases the token in the ring.  The time a station holds the token is called Synchronous Allocation Time (SAT) and this time is variable for each station. The allocation of this time to each station is achieved by Station Management (SMT).  The functions of SMT are ring control, ring initialization, station insertion and station removal. Network Security
  • 7. FDDI Frame Format  Similar to token ring frame Network Security
  • 8. FDDI Frame Fields  Preamble: Gives a unique sequence that prepares each station for an upcoming frame  Start delimiter: Indicates the beginning of a frame  Frame control: Indicates the size of the address fields and whether the frame contains asynchronous or synchronous data, among other control information  Destination address: Contains a unicast (singular), multicast (group), or broadcast (every station) address  Source address: Identifies the single station that sent the frame  Data: Contains either information destined for an upper- layer protocol or control information. Network Security
  • 9. FDDI Frame Fields (continued)  Frame check sequence (FCS): Is filed by the source station with a calculated cyclic redundancy check value dependent on frame contents. The destination address recalculates the value to determine whether the frame was damaged in transit. If so, the frame is discarded.  End delimiter: Contains unique symbols; cannot be data symbols that indicate the end of the frame.  Frame status: Allows the source station to determine whether an error occurred; identifies whether the frame was recognized and copied by a receiving station. Network Security
  • 10. FDDI Characteristics  100 Mbps of data throughput  Two interfaces  Connects equipment to the ring over long distances  Allows all stations to have equal amount of time to transmit data  FDDI is a LAN with Station Management Network Security
  • 11. Things to do  FDDI Vs Token Ring  FDDI Layered structure  FDDI specifications  CDDI Network Security