Asynchronous Transfer Mode (ATM)
ATM is a cell-based fast-packet communication
technique that can support data-transfer rates from sub-T1 speeds to 10 Gbps.
ATM achieves its high speeds in part by transmitting data in fixed-size cells
and dispensing with error-correction protocols. It relies on the inherent integrity
of digital lines to ensure data integrity.
ATM can be integrated into an existing network as
needed without having to update the entire network. Its fixed-length cell-relay
operation is the signaling technology of the future and offers more predictable
performance than variable length frames. Networks are extremely versatile and
an ATM network can connect points in a building, or across the country, and
still be treated as a single network.
Power over Ethernet (PoE)
PoE is a solution in which an electrical current is
run to networking hardware over the Ethernet Category 5 cable or higher. This
solution does not require an extra AC power cord at the product location. This
minimizes the amount of cable needed as well as eliminates the difficulties and
cost of installing extra outlets.
LAN Technology Specifications
Name
|
IEEE Standard
|
Data Rate
|
Media Type
|
Maximum Distance
|
Ethernet
|
802.3
|
10 Mbps
|
10Base-T
|
100 meters
|
Fast Ethernet/
100Base-T |
100 Mbps
|
100Base-TX
100Base-FX |
100 meters
2000 meters |
|
Gigabit Ethernet/
GigE |
802.3z
|
1000 Mbps
|
1000Base-T
1000Base-SX 1000Base-LX |
100 meters
275/550 meters 550/5000 meters |
10 Gigabit Ethernet
|
|
10 Gbps
|
10GBase-SR
10GBase-LX4 10GBase-LR/ER 10GBase-SW/LW/EW |
300 meters
300m MMF/ 10km SMF 10km/40km 300m/10km/40km |
Token Ring
Token Ring is another form of network
configuration. It differs from Ethernet in that all messages are transferred in
one direction along the ring at all times. Token Ring networks sequentially
pass a “token” to each connected device. When the token arrives at a particular
computer (or device), the recipient is allowed to transmit data onto the
network. Since only one device may be transmitting at any given time, no data
collisions occur. Access to the network is guaranteed, and time-sensitive
applications can be supported. However, these benefits come at a price.
Component costs are usually higher, and the networks themselves are considered
to be more complex and difficult to implement. Various PC vendors have been
proponents of Token Ring networks.
Networking and Ethernet Basics
Protocols
After a physical connection has been established,
network protocols define the standards that allow computers to communicate. A
protocol establishes the rules and encoding specifications for sending data.
This defines how computers identify one another on a network, the form that the
data should take in transit, and how this information is processed once it
reaches its final destination. Protocols also define procedures for determining
the type of error checking that will be used, the data compression method, if
one is needed, how the sending device will indicate that it has finished
sending a message, how the receiving device will indicate that it has received
a message, and the handling of lost or damaged transmissions or “packets”.
The main types of network protocols in use today
are: TCP/IP (for UNIX, Windows NT, Windows 95 and other platforms); IPX (for
Novell NetWare); DECnet (for networking Digital Equipment Corp. computers);
AppleTalk (for Macintosh computers), and NetBIOS/NetBEUI (for LAN Manager and
Windows NT networks).
Although each network protocol is different, they
all share the same physical cabling. This common method of accessing the
physical network allows multiple protocols to peacefully coexist over the
network media, and allows the builder of a network to use common hardware for a
variety of protocols. This concept is known as “protocol independence,” which
means that devices which are compatible at the physical and data link layers
allow the user to run many different protocols over the same medium.
No comments:
Post a Comment