pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

FDDI Networking

Developed by the American National Standards Institute (ANSI) standards committee in the mid-1980s – at a time when high-speed engineering workstations were beginning to tax the bandwidth of existing LANs based on Ethernet and Token Ring – the Fibre Distributed Data Interface (FDDI) specifies a 100 Mbit/s token-passing, dual-ring LAN using fibre-optic cable.

FDDI uses a dual ring topology, which is to say that it is comprised of two counter-rotating rings. During normal operation, the primary ring is used for data transmission, and the secondary ring remains idle. The primary purpose of the dual rings is to provide superiorreliability and robustness.

FDDI

A dual-attached rooted station on the network is attached to both of these rings. This has at least two ports – an A port, where the primary ring comes in and the secondary ring goes out, and a B port where the secondary ring comes in, and the primary goes out. A station may also have a number of M ports, which are attachments for single-attached stations. Stations with at least one M port are called concentrators.

The sequence in which stations gain access to the medium is predetermined. A station generates a special signalling sequence called a Token that controls the right to transmit. This Token is continually passed around the network from one node to the next. When a station has something to send, it captures the Token, sends the information in well formatted FDDI frames, then releases the token. The header of these frames includes the address of the station(s) that will copy the frame. All nodes read the frame as it is passed around the ring to determine if they are the recipient of the frame. If they are, they extract the data, retransmitting the frame to the next station on the ring. When the frame returns to the originating station, the originating station strips the frame. The token-access control scheme thus allows all stations to share the network bandwidth in an orderly and efficient manner.

FDDI has found its niche as a reliable, high-speed backbone for mission critical and high traffic networks. It was designed to run through fibre cables, transmitting light pulses to convey information between stations. However, an implementation of FDDI protocols over twisted-pair copper wire – known as Copper Distributed Data Interface (CDDI) – has subsequently emerged to provide a 100 Mbit/s service over copper.

  • OSI Model
  • Network Topologies
  • FDDI Networking
  • Token Ring Networks
  • Ethernet
  • Fast Ethernet
  • Gigabit Ethernet
  • Peer to Peer Network Architecture
  • Client/Server Architecture
  • P2P Networking
  • Network Hardware
  • NIC Cards
  • Hubs and Repeaters
  • Bridges
  • Routers
  • Network Switches
  • Network Transceivers
  • Cabling
  • Home Networking
  • Ethernet Networks
  • Phone-line Networks
  • Power-line Networks
  • IEEE 802.11
  • Wireless Networks
  • Technology Comparison

Share this:

  • Click to share on Twitter (Opens in new window)
  • Click to share on Facebook (Opens in new window)

Related

Filed Under: Networking Tagged With: fddi, FDDI Networking

Latest Articles

Remove Antispyware Soft

Antispyware Soft is a rouge software originated from the same family as Antivirus Soft. This program will get you all confused by giving fake security alerts, informing you about infections which in reality does not exist. The whole idea of such fake alerts is to get you all panicked so that … [Read More...]

Managing and Operating a Dedicated Server Over the Internet Using Online Control Panels

Operation and management of a dedicated server over the Internet can be achieved in several ways. Most straightforwardly, you can use control panels, provided by your hosting company, which give you easy to use interfaces for controlling the hardware and also completing common tasks on your server … [Read More...]

LP to CD Editing

LP to CD Editing

Here we're going to examine how to eliminate individual clicks that have not been removed by the Remove Noise function, specifically the rather obvious click that occurs about 40 seconds into the Dance The Night Away track. To do this we first need several clicks of the Zoom tool to get a … [Read More...]


4 Very Useful CAD Hacks You Might Not Be Using

The market for CAD design is growing around 7% a year. It is expected to be worth $7.3 billion by 2022. CAD experts have a lot of job security, … [Read More...]

What Are the Best eSports Games to Watch in 2020?

The esports industry is growing at a remarkable rate.  According to Statistica, the global market for esports is expected to reach $1.79 billion … [Read More...]

Choosing the Safest Crypto Wallet for the New Year

 There are a number of excellent benefits of cryptocurrencies.  They are extremely convenient and offer a tremendous amount of privacy. … [Read More...]

Guidelines on Troubleshooting Python Code

Whenever we write a computer program we need to verify that it works as expected. Usually we execute the code, if necessary we provide some inputs, … [Read More...]

Developing a Python to Extract Data from Your Smartphone

Many times we ask ourselves: "What part of the universe is this phone from?", even if we already know where it is, but we don't know which operator. … [Read More...]

Most Demanding Heroes to Play in Dota 2

Dota 2 is one of the most popular multi-player online combat games. It had an average player count of 485,000 throughout most of 2018. The peak number … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Where to Learn More about Web Design and Website Development

If you're looking for a book on web page building, look for one that matches the tools and technologies that you're going to be … [Read More...]

Remove Qone8.com Browser Hijacker

Qone8.com looks like a harmless search engine that will help you find useful information like Yahoo, Google or Bing. The search engine is owned Taiwan … [Read More...]

BIOS Settings

As soon as POST starts, you'll be invited to hit a key - generally DEL - to enterBIOS Setup. You've already set the system time, but now's the time … [Read More...]

Return to top of page

Copyright © 2019 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors