pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

FDDI Networking

Developed by the American National Standards Institute (ANSI) standards committee in the mid-1980s – at a time when high-speed engineering workstations were beginning to tax the bandwidth of existing LANs based on Ethernet and Token Ring – the Fibre Distributed Data Interface (FDDI) specifies a 100 Mbit/s token-passing, dual-ring LAN using fibre-optic cable.

FDDI uses a dual ring topology, which is to say that it is comprised of two counter-rotating rings. During normal operation, the primary ring is used for data transmission, and the secondary ring remains idle. The primary purpose of the dual rings is to provide superiorreliability and robustness.

FDDI

A dual-attached rooted station on the network is attached to both of these rings. This has at least two ports – an A port, where the primary ring comes in and the secondary ring goes out, and a B port where the secondary ring comes in, and the primary goes out. A station may also have a number of M ports, which are attachments for single-attached stations. Stations with at least one M port are called concentrators.

The sequence in which stations gain access to the medium is predetermined. A station generates a special signalling sequence called a Token that controls the right to transmit. This Token is continually passed around the network from one node to the next. When a station has something to send, it captures the Token, sends the information in well formatted FDDI frames, then releases the token. The header of these frames includes the address of the station(s) that will copy the frame. All nodes read the frame as it is passed around the ring to determine if they are the recipient of the frame. If they are, they extract the data, retransmitting the frame to the next station on the ring. When the frame returns to the originating station, the originating station strips the frame. The token-access control scheme thus allows all stations to share the network bandwidth in an orderly and efficient manner.

FDDI has found its niche as a reliable, high-speed backbone for mission critical and high traffic networks. It was designed to run through fibre cables, transmitting light pulses to convey information between stations. However, an implementation of FDDI protocols over twisted-pair copper wire – known as Copper Distributed Data Interface (CDDI) – has subsequently emerged to provide a 100 Mbit/s service over copper.

  • OSI Model
  • Network Topologies
  • FDDI Networking
  • Token Ring Networks
  • Ethernet
  • Fast Ethernet
  • Gigabit Ethernet
  • Peer to Peer Network Architecture
  • Client/Server Architecture
  • P2P Networking
  • Network Hardware
  • NIC Cards
  • Hubs and Repeaters
  • Bridges
  • Routers
  • Network Switches
  • Network Transceivers
  • Cabling
  • Home Networking
  • Ethernet Networks
  • Phone-line Networks
  • Power-line Networks
  • IEEE 802.11
  • Wireless Networks
  • Technology Comparison

Filed Under: Networking Tagged With: fddi, FDDI Networking

Latest Articles

Win 7 Security 2012

Remove Win 7 Security 2012

Win 7 Security 2012 Win 7 Security 2012 is part of a multi rogue malware set. It goes by several different names. The purpose of this kind of malware client is to trick or force the user into making a purchase of the program. It does this by blocking normal programs from running and not letting … [Read More...]

Network Switches

LAN switches are an expansion of the concept in LAN bridging. They operate at Layer 2 (link layer) of the OSI reference model, which controls data flow, handles transmission errors, provides physical (as opposed to logical) addressing, and manages … [Read More...]

The 4thGen Intel Core i7 Processor

Intel has never ceased to innovate when it comes to its processors. Compare from the previous generation of Intel Core i7 processor has faster multiple applications along its amazing digital media creation. You can feel, better performance in every task you’ll do, especially with the Intel … [Read More...]

Everything You Need to Know About Sourcing Circuit Boards From U.S. Suppliers

In This Article This article includes: Why Source PCBs From the United States?How to Get a Quote From a U.S.-Based PCB ManufacturerThe Top U.S. … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Hard Disk MR Technology

In 1991, IBM's work on AMR technology led to the development of MR (magnetoresistive) heads capable of the areal … [Read More...]

Switch & Sync Software Review

PROS: Switch & Sync is one of the easiest products to use in the synchronization area. CONS: Wireless users will not be able to use this … [Read More...]

Antivirus IS Removal Process

which is programmed to give false security alerts to a user once it gets access to his/her system. This particular software can spread by Trojans, … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors