pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

FDDI Networking

Developed by the American National Standards Institute (ANSI) standards committee in the mid-1980s – at a time when high-speed engineering workstations were beginning to tax the bandwidth of existing LANs based on Ethernet and Token Ring – the Fibre Distributed Data Interface (FDDI) specifies a 100 Mbit/s token-passing, dual-ring LAN using fibre-optic cable.

FDDI uses a dual ring topology, which is to say that it is comprised of two counter-rotating rings. During normal operation, the primary ring is used for data transmission, and the secondary ring remains idle. The primary purpose of the dual rings is to provide superiorreliability and robustness.

FDDI

A dual-attached rooted station on the network is attached to both of these rings. This has at least two ports – an A port, where the primary ring comes in and the secondary ring goes out, and a B port where the secondary ring comes in, and the primary goes out. A station may also have a number of M ports, which are attachments for single-attached stations. Stations with at least one M port are called concentrators.

The sequence in which stations gain access to the medium is predetermined. A station generates a special signalling sequence called a Token that controls the right to transmit. This Token is continually passed around the network from one node to the next. When a station has something to send, it captures the Token, sends the information in well formatted FDDI frames, then releases the token. The header of these frames includes the address of the station(s) that will copy the frame. All nodes read the frame as it is passed around the ring to determine if they are the recipient of the frame. If they are, they extract the data, retransmitting the frame to the next station on the ring. When the frame returns to the originating station, the originating station strips the frame. The token-access control scheme thus allows all stations to share the network bandwidth in an orderly and efficient manner.

FDDI has found its niche as a reliable, high-speed backbone for mission critical and high traffic networks. It was designed to run through fibre cables, transmitting light pulses to convey information between stations. However, an implementation of FDDI protocols over twisted-pair copper wire – known as Copper Distributed Data Interface (CDDI) – has subsequently emerged to provide a 100 Mbit/s service over copper.

  • OSI Model
  • Network Topologies
  • FDDI Networking
  • Token Ring Networks
  • Ethernet
  • Fast Ethernet
  • Gigabit Ethernet
  • Peer to Peer Network Architecture
  • Client/Server Architecture
  • P2P Networking
  • Network Hardware
  • NIC Cards
  • Hubs and Repeaters
  • Bridges
  • Routers
  • Network Switches
  • Network Transceivers
  • Cabling
  • Home Networking
  • Ethernet Networks
  • Phone-line Networks
  • Power-line Networks
  • IEEE 802.11
  • Wireless Networks
  • Technology Comparison

Filed Under: Networking Tagged With: fddi, FDDI Networking

Latest Articles

RAID tutorial – installing the drivers

Now is the time to use the previously prepared floppy disk containing the RAID Controller driver software. Proceed as follows: Press F6 when invited to do so, to ...... install third party SCSI or RAID driver. Press S when invited to do so, to specify additional SCSI adapters, CD-ROM drives, … [Read More...]

Palm Pilot

In 1996 Palm Computing, Inc. - then a part of US Robotics - led the resurgence of handheld computing with the introduction of its Pilot 1000 and Pilot 5000 organizers. Designed as companion products to personal computers, the devices … [Read More...]

The Evolution of Software for Digital Gaming Sites

The digital gaming industry is undergoing a major change in 2019. A number of the key players are starting to use more sophisticated software to improve the quality of the services that they offer. This is likely one of the reasons that the gaming market is expected to be worth $103 billion in the … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

A simple PC guide on keeping safe while using public Wi-Fi

Did you know that there is a cyberattack every 39 seconds? You are more likely to be a victim if you are lax about your digital security. This … [Read More...]

What is an Antidetect Browser and how can it protect you?

To be everywhere and to be nowhere - it is the purpose of many users on the Internet making modern advertisement campaigns. Many websites banned the … [Read More...]

BTX – Balanced Technology eXtended – Motherboard Form Factor

Intel has been promoting its Balanced Technology Extended specification for a while before the company began, in late 2004, to push in earnest to … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors