CS 165 -- Direct Link Networks (Continued) Slide Set 6.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

CS4550: Computer Networks II high speed networks, part 1 : FDDI & 100baseTX.
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices as they access, transmit,
Token Ring and Fiber Distributed Data Interface (FDDI)
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
Department of Computer Engineering University of California at Santa Cruz Networking Systems (1) Hai Tao.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI)
1 Computer Networks Local Area Networks. 2 A LAN is a network: –provides Connectivity of computers, mainframes, storage devices, etc. –spans limited geographical.
TDC 461 Basic Communications Systems Local Area Networks 29 May, 2001.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
EE 4272Spring, 2003 Chapter 14 LAN Systems Ethernet (CSMA/CD)  ALOHA  Slotted ALOHA  CSMA  CSMA/CD Token Ring /FDDI Fiber Channel  Fiber Channel Protocol.
Token Ring and FDDI.
Spring 2003CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
COMPUTER NETWORKS.
Gursharan Singh Tatla Transport Layer 16-May
1 Computer Networks Course: CIS 3003 Fundamental of Information Technology.
Lecture 8: Ethernet and Token Ring Networks. Ethernet Carrier Sense, Multiple Access and Collision Detect (CSMA/CD) LAN Ethernet Standard-DEC, Intel,
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
CSC581 Communication Networks II Chapter 6b: Local Area Network (Token Ring ) Dr. Cheer-Sun Yang.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 17.
Packet Transmission (Part III) Local Area Networks (LANs)
Layer 2: Technologies Chapter 7
Lecture 9: Ethernet and Token Ring Networks
1 Computer Communication & Networks Lecture 13 Datalink Layer: Local Area Network Waleed Ejaz
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Network Technologies Chapter 2. Approaches to Network Communication Connection-Oriented –Circuit-switched –A dedicated connection (circuit) is formed.
8-Oct-154/598N: Computer Networks Shared Access Networks Token Ring ATM Fibre channel Myrinet.
Internetworking An internetwork is typically comprised of many physical networks over which data travels There are many different types of physical networks:
LAN technologies and network topology LANs and shared media Locality of reference Star, bus and ring topologies Medium access control protocols.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
5: DataLink Layer5a-1 Chapter 5: The Data Link Layer Last time: r multiple access protocols and LANs r link layer addressing, ARP r specific link layer.
14-Oct-15Computer Networks1 Reliable Transmission.
Ethernet Fundamentals. The success of Ethernet is due to the following factors: Simplicity and ease of maintenance Ability to incorporate new technologies.
1 6/4/ :56 Chapter 8Token Ring LANs, FDDI & MANs1 Rivier College CS575: Advanced LANs Chapter 8: Token Ring LANs, FDDI and MANs.
1 Other LANs Token Rings Wireless –Wireless LAN (802.11, WiFi) –Broadband Wireless (802.16) –Bluetooth.
Chapter Six The Data Link Layer. Objectives Learn about physical addressing on the network. Explore the MAC and LLC sublayers of Data Link. Get introduced.
FDDI (Fiber Distributed Data Interface) Standardized by ASI and ITU-T (ITU-T X.3.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF.
802.5 and FDDI TC Token Ring Reference Stallings 6.3 4/16Mbps over STP 4Mbps over CAT3 UTP.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
IEEE l IEEE has had the greatest impact on Layer 2 standards. l IEEE divided Layer 2 into two sublayers.
FDDI Network Security.
CS3502: Data and Computer Networks Loca Area Networks - 3 Adaptive Tree Walk Token Ring LAN : IEEE slotted rings FDDI.
1 Chapter 2: Direct Link Networks (Part Two) Dr. Rocky K. C. Chang 30 January 2004.
1 Shared Access Networks: Token ring, Wireless Sections 2.7 & 2.8.
1 Link Layer 3 Mozafar Bag-Mohammadi University of Ilam.
CNAP AT VCC Semester 1 CHAPTER 7 Wael Yousif Connecting The Internet Generation.
Chi-Cheng Lin, Winona State University CS412 Introduction to Computer Networking & Telecommunication Data Link Layer Part II – Sliding Window Protocols.
Chapter Objectives After completing this chapter you will be able to: Describe in detail the following Local Area Network (LAN) technologies: Ethernet.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
COMPUTER NETWORKS Lecture-8 Husnain Sherazi. Review Lecture 7  Shared Communication Channel  Locality of Reference Principle  LAN Topologies – Star.
1 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D.
Advanced Computer Networks
Chapter 14 LAN Systems Ethernet (CSMA/CD) ALOHA Slotted ALOHA CSMA
TOKEN BUS & TOKEN RING.
Ethernet and Token Ring LAN Networks
Medium Access Control (MAC) Sub-layer
CSC 336 Data Communications and Networking
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
Ethernet and Token Ring LAN Networks
DATA COMMUNICATION Lecture-44.
Token Ring Neil Tang 9/22/2008 CS440 Computer Networks.
Net 323 D: Networks Protocols
7- chapter Seven Local Area Networks (LAN)
IEEE , Token Rings 4/26/2019 CS/ECE UIUC, Fall 2006.
Ethernet and Token Ring LAN Networks
Presentation transcript:

CS Direct Link Networks (Continued) Slide Set 6

In this set.... Token Ring Networks FDDI -- Fiber Distributed Data Interface

Token Ring Specified by the IEEE standard. Set of nodes are connected in a ring. Data always flows in one direction Node receiving frames from upstream neighbor passes it to downstream neighbor.

Features Distributed algorithm dictates when each node can transmit. All nodes see all frames : destination saves a copy of the frame when it flows past. Token used to control who transmits.

The Token The token allows a host to transmit -- contains a special sequence of bits. When a node that wishes to send sees the token, it –picks up the token –inserts its own frame instead on the ring. When frame traverses ring and returns, the sender takes frame off and reinserts token.

Physical Properties Electromechanical relays are used. Protection against failures -- single node failure should not cause the entire ring to fail.

Multi-station access units Units that can interconnect stations. Looks like a star topology. Easy to add/remove stations.

Some details Remember -- nodes use network adaptor. Contains a receiver, transmitter and storage token is 24 bits in size. Total storage in the network must be enough to hold token.

Medium Access Control Token circulates around the ring. Every station that has data to send may seize the token off the ring – Modify 1 bit in the first two bytes – these now become the preamble for the subsequent packet Transmitted packet contains dest addr. Each node looks at the packet -- if packet meant for the node, copy packet onto buffer as it flows through the adaptor. Sending node responsible for removal of frame from ring.

Token Holding Time How long can a node hold onto the token ? Dictated by the token holding time or THT. If lightly loaded (as in Ethernet) you may allow a node to hold onto it as long as it wants -- very high utilization. But it is unfair... multiple nodes might have data to send and if we do this, heavily loaded nodes are at an advantage.

THT (cont) In 802.5, THT is specified to be 10 milliseconds. Each node keeps track of how much time is left. It then checks to see if it is enough to transmit next packet (depends on length of packet). If yes, transmit, else, defer.

Token Rotation Time (TRT) TRT: Time taken by token to traverse the ring (as viewed by a node). TRT <= Active Nodes X THT + Ring Latency No of nodes that have data to transmit Time taken to traverse ring when there is no data to send

Reliable Delivery in Two bits in a packet trailer A and C bits. Both are zero to begin with. When a station notices that it is the destination for a frame it sets the A bit. When it copies frame, it sets C bit. When sender sees: 1.The ‘A’ bit set to zero, it will deduce that the recipient is absent / non-functional. 2.If ‘A’ bit =1 but ‘C’ bit = 0, it deduces that for some reason destination could not accept frame and tries to retransmit.

Priorities in supports priorities -- token has 3 bit priority field. If priority is specified, a node can seize the token only if its own frame’s priority is > priority specified. In addition, frames have three reservation bits that allow hosts to set priorities.

Protocol for setting priorities Say, X has a priority “n”. If it sees d data frame going past and the bits haven’t already been set to a higher value, it can set the bits. When the station that sent the frame gets back the frame, it sets the priority bits in the token to reflect the value in the reservation bits. Any node with that priority can seize the token. Strict Priority: No lower packets may be sent when higher priority packets await.

Token Release EARLY RELEASE: Release token right after frame Better utilization DELAYED RELEASE: Release token after frame is removed from ring.

The Monitor A special node that ensures the health of the ring. Any station can become the monitor. If monitor is healthy, it periodically announces its presence. If no message seen for awhile, a node will assume that the monitor has failed and will try to become a monitor -- same for new ring/failed monitor. It transmits a claim token --> intent to become monitor. More than one claim -- highest address wins.

Maintaining the token Monitor ensures the presence of token – Token may get corrupted or lost Max possible TRT = Num_stations X THT + Ring Latency. –If no token seen for this time, token may be lost; monitor creates new token.

Other Monitor Functions Check for corrupted frames -- Checksum is in error etc. Check for orphaned frames -- frame inserted by a node that dies. –Use of a monitor bit, monitor sets this to 1 to see if the frame keeps circulating. Bypass malfunctioning stations -- beaconing suspect stations.

Frame Format in Nuggets: Frame control is the demultiplexing key -- which higher layer protocol. Access control -- frame priority and reservation priority bits. Manchester coding. Address bits -- as in Ethernet.

FDDI Fiber Distributed Data Interface Similar to Token ring -- optical fiber. Two rings instead of one; second used if first fails. –FDDI can tolerate single node or link failures.

Single Access Stations and Concentrators Expensive for nodes to connect to two cables and so FDDI allows nodes to attach using a single cable – called Single Access Stations or SAS. –as opposed to “dual access stations !” Concentrators -- Attach several SASs to a ring.

FDDI Specs Read book. Important nugget -- there is a maximum number of stations and maximum distance between stations and length of network –Impose time restrictions on token rotation time.

Timed Token Algorithm for FDDI THT -- Token Holding Time defined as before and configured to some suitable value. We want to ensure that a node gets the opportunity to transmit within a certain time -- we want to impose an upper bound on the token rotation time. We define a target token rotation time or TTRT.

Timed Token Algorithm (cont) Each node measures TRT. If measured TRT > TTRT, – Token is late, do not transmit data If measured TRT < TTRT, – Token is early; hold token for difference between TTRT and measured TRT.

Disadvantages of Timed Token Algorithm Does not ensure that a node can send a frame within a bounded delay. Node with lots of data can do so when it receives token early. – Uses up the remaining time and leaves no opportunity for other nodes to transmit.

Division into traffic classes Traffic divided into two classes – Delay sensitive synchronous traffic – Delay insensitive asynchronous traffic Application interested in throughput and reliability as opposed to delay.

Sending rules with traffic classes When node receives traffic, it can send synchronous traffic irrespective of whether or not the token is late. Send async. traffic only if token early. Still a problem if too much sync. data. So -- total amount of sync. data that can be sent in one token rotation is at most TTRT. Thus,....

Thus.... In the worst case: – First async. traffic use TTRT worth of time. –Next sync. traffic use TTRT worth of time. –So, total < = 2 x TTRT. Note: If Sync. traffic was transmitted first and used TTRT, no async. traffic can be sent. Thus, note -- back to back rotations cannot take 2 x TTRT.

In addition... What if remaining time is only slightly less than TTRT ? -- in other words, it takes longer to transmit an async. frame ? Node will send ! Thus, measured TTRT actually bounded by TTRT + time it takes to transmit a frame.

Token Maintenance How does one set the TTRT ? How does one ensure that valid token is present ? Every node monitors ring for valid token. If operations are correct, a node must observe a token or a data frame every so often.

Claim frames Greatest idle time = Ring latency + frame transmission time. If nothing seen, a node suspects something is wrong and sends a “claim frame”. Nodes bid for the TTRT using the claim frame. Why bid ? TTRT set to that the node needs so that applications running can meet timing constraints.

The bidding process A node can send a claim frame without having the token -- does so when it suspects failure or when it first joins the net. If claim frame came back, node knows that its TTRT bid is the lowest. It is responsible for inserting token on the ring.

Bidding Process (cont) When a node receives a claim frame, it checks to see if the TTRT bid is lower than its own. If yes, it resets local definition of TTRT and simply forwards the claim frame. Else, it removes the claim frame and enters the bidding process – Put its own claim frame on ring. When there are ties, highest address wins.

Rest of FDDI -- please read book. Next: Wireless/802.11, Chapter 4 -- Network layer and IP.