- DCN Tutorial
- Data Comm & Networks Home
- DCN - Overview
- DCN - Computer Network Types
- DCN - Network LAN Technologies
- DCN - Computer Network Topologies
- DCN - Computer Network Models
- DCN - Computer Network Security
- Physical Layer
- DCN - Physical Layer Introduction
- DCN - Digital Transmission
- DCN - Analog Transmission
- DCN - Transmission media
- DCN - Wireless Transmission
- DCN - Multiplexing
- DCN - Network Switching
- Data Link Layer
- DCN - Data Link Layer Introduction
- DCN - Error detection and Correction
- DCN - Data Link Control & Protocols
- Network Layer
- DCN - Network Layer Introduction
- DCN - Network Addressing
- DCN - Routing
- DCN - Internetworking
- DCN - Network Layer Protocols
- Transport Layer
- DCN - Transport Layer Introduction
- DCN - Transmission Control Protocol
- DCN - User Datagram Protocol
- Application Layer
- DCN - Application Layer Introduction
- DCN - Client-Server Model
- DCN - Application Protocols
- DCN - Network Services
- DCN Useful Resources
- DCN - Quick Guide
- DCN - Useful Resources
Differentiate between IEEE 802.3 and IEEE 802.5 in Computer Network.
IEEE 802.3 Standard
The IEEE 802.3 standard is popularly called as Ethernet or CSMA/CD (Carrier Sense Multiple Access/Collision Detect). Ethernet is a LAN architecture developed by XEROX and extended by DEC, IC and Xerox. It is specified by IEEE 802.3, and it defines two categories such as Baseband and Broadband.
Standard Ethernet network facilitates CSMA/CD. When a station needs to send, it listens to the wire. If the wire is busy, the station waits just before it goes idle, otherwise, it sends directly.
If two or more stations together begin sending on an idle cable, they will collide. All colliding stations then remove their transmission, wait a random time, and continue the whole process all over again.
IEEE 802.5 Standard
Token ring is the IEEE 802.5 standard for a token-passing ring in transmission networks. In a token ring, a special bit pattern, known as a token, circulates around the ring when all the stations are idle. Token Ring is formed by the nodes connected in ring format.
The principle used in the token ring network is that a token is circulating in the ring, and whichever node grabs that token will have the right to transmit the data.
The token ring is the most convenient network in the workstation environment. All the stations are connected in the structure of a ring.
Therefore, the token is deleted from the network by adjusting a single bit in the token. After finishing the transmission, the station restores the tokens and inserts them into the network.
The major differences between IEEE 802.3 and IEEE 802.5 are as follows −
|IEEE 802.3||IEEE 802.5|
|The maximum size of the frame in 802.3 is 1572 bytes.||The maximum size of the frame in 802.5 is variable.|
|The maximum size of the data field is 0 to 1500 bytes.||There is no limit on the maximum size of the data that can be sent.|
|There is no provision of setting the properties.||Priorities are possible.|
|This protocol is very simple.||This protocol is very difficult as compared to IEEE 802.3 Standard.|
|The minimum frame size required is 64 bytes.||It can support shorter frames as well.|
|There is no control maintenance.||A designated monitor station performs maintenance.|
|The cable length is 50m to 2000m.||The cable length is 50 m to 1000m.|
- Related Articles
- Explain the Token Ring Network (IEEE Standard 802.5) in Computer Network.
- What are(Wireless LAN) IEEE 802.11 Networks in Computer Network?
- Token Bus (IEEE 802.4) Network
- Differentiate between infrastructure mode and the ad hoc mode of IEEE 802.11
- IEEE 802.3 and Ethernet
- Differentiate between CIFS and NFS in Computer Network.
- Differentiate between DIMM and SIMM in Computer Network
- Differentiate between HTTP and HTTPS in Computer Network.
- Differentiate between IMAP and POP3 in Computer Network.
- Differentiate between FDM and TDM in Computer Network.
- Differentiate between NAS and DAS in Computer Network.
- Differentiate between DAS and SAN in Computer Network.
- Differentiate between GSM and CDMA in Computer Network.
- Wireless LAN and IEEE 802.11
- Differentiate between I2C and SPI Protocol in Computer Network.