1Token-bus - IEEE 802.4 Token-Bus  All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted.

Slides:



Advertisements
Similar presentations
Ethernet “dominant” LAN technology: cheap $20 for 100Mbs!
Advertisements

Token Ring/IEEE Risanuri Hidayat.
The ALOHA Protocol “Free for all”: whenever station has a frame to send, it does so. –Station listens for maximum RTT for an ACK. –If no ACK after a specified.
William Stallings Data and Computer Communications 7th Edition
Multiple access What if multiple machines are sharing the same link?
Channel Access Methods
Multiple Access Methods. When nodes or stations are connected and use a common link (cable or air), called a multipoint or broadcast link, we need a.
Bridging. Bridge Functions To extend size of LANs either geographically or in terms number of users. − Protocols that include collisions can be performed.
CompTIA Network+ Chapter 2
1 Version 3.0 Module 6 Ethernet Fundamentals. 2 Version 3.0 Why is Ethernet so Successful? In 1973, it could carry data at 3 Mbps Now, it can carry data.
1Ring Networks - Ring Networks  All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted.
CCNA 1 v3.1 Module 6 Review. 2 What 3 things happen on an Ethernet network after a collision occurs? A backoff algorithm is invoked and transmission is.
1 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Spring 2003 Week 4 Introduction to Networks and the Internet.
Distributed Systems Distributed Algorithms 1 Brendan Tangney Distributed Systems (Distributed Algorithms – A Problem Based Learning Approach)
William Stallings Data and Computer Communications 7 th Edition Chapter 7 Data Link Control Protocols.
Copyright © 2003, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Chapter 6 Multiple Radio Access.
1 K. Salah Module 4.0: Data Link Layer The Logical Link Control (LLC) sublayer –Framing –Flow Control –Error Control The Media Access Control (MAC) sublayer.
Spring 2002CS 4611 Shared Access Networks Outline Bus (Ethernet) Token ring (FDDI) Wireless (802.11)
Channel Access Methods When several devices are connected to a single channel, there must be some rules to govern these devices when they access, transmit,
Token Ring and FDDI.
EEC-484/584 Computer Networks Lecture 13 Wenbing Zhao
12.1 Chapter 12 Multiple Access Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Medium Access Control Sublayer
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Ethernet, ARP.
1 Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
IEEE Standards, FDDI, Collision Free Protocols
Ethernet. Ethernet Goals Simplicity Low Cost Compatibility Address flexibility Fairness –All nodes have equal access to the network High speed Stability.
Unit IV Data Link Control: Data link layer is the second layer in ISO OSI model. The two main functions of DLL are Data link control which deals with the.
Packet Transmission (Part III) Local Area Networks (LANs)
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking LANs 2: MAC protocols.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 16.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:  SD, ED mark start,
IEEE Wireless LAN Standard. Medium Access Control-CSMA/CA IEEE defines two MAC sublayers Distributed coordination function (DCF) Point coordination.
Wireless LANs Prof. F. Tobagi MAC Management 1.
Cyclic Redundancy Check (CRC).  An error detection mechanism in which a special number is appended to a block of data in order to detect any changes.
Chapter 1 - Local Area Network Technologies. How IP Datagrams are Encapsulated IP datagrams are found at the OSI Network layer IP datagrams are sent to.
1 CS4550: Computer Networks II Review Data Link Layer.
IST 126 Computer Networks Day 2. Server Security Only one password needed to access network Associated with the account is permission to access certain.
17 - Winter 2005 ECE ECE 766 Computer Interfacing and Protocols 1 Local Area Networks Need for high performance communications for physically close devices.
Data Communications, Kwangwoon University12-1 Chapter 12. Multiple Access 1.Random Access 2.Controlled Access 3.Channelization.
LOCAL AREA NETWORKS. CSMA/CA In a wired network, the received signal has almost the same energy as the sent signal because either the length of the cable.
Ch 12. Multiple Access. Multiple Access for Shared Link Dedicated link – Point-to-point connection is sufficient Shared link – Link is not dedicated –
Ethernet Overview it the IEEE standard for Ethernet.
1 Layer 2 Technologies Honolulu Community College Cisco Academy Training Center Semester 1 Version
IEEE l IEEE has had the greatest impact on Layer 2 standards. l IEEE divided Layer 2 into two sublayers.
1 DQDB -  All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or by.
網路概論 Class 3 – Data Link Control Part I 授課老師 楊人順 2001/10/09,2001/10/16.
802.5 Token-Ring Networks Differential Manchester Encoding –For a 1 No transition at start of bit period Transition in middle –For a 0 Transition at start.
Data and Computer Communications Data Link Control Protocols.
Token Passing: IEEE802.5 standard  4 Mbps  maximum token holding time: 10 ms, limiting packet length  packet (token, data) format:
2 IEEE 802 Working Groups a Active working groupsInactive or disbanded working groups Higher Layer LAN Protocols Working Group Ethernet Working.
Data Link Layer.
11 CS716 Advanced Computer Networks By Dr. Amir Qayyum.
IEEE (Token Ring) LAN Dr. Sanjay P. Ahuja, Ph.D.
March 21, 2001 Recall we have talked about the Sliding Window Protocol for Flow Control Review this protocol A window of size I can contain at most I.
Chapter 12 Multiple Access.
Part III Datalink Layer.
TOKEN BUS & TOKEN RING.
CS 457 – Lecture 6 Ethernet Spring 2012.
CSC 336 Data Communications and Networking
CIS 321 Data Communications & Networking
100BASE-TX: uses 2-pair UTP or STP that can handle 125 MHz signals and beyond. It uses a binary coding scheme called 4B5B, every 5 clock pulses are used.
Token Ring/IEEE Risanuri Hidayat.
Data Communication Networks
Part III Datalink Layer.
Token Ring Neil Tang 9/22/2008 CS440 Computer Networks.
Computer Interfacing and Protocols
Chapter 12 Media Access Control (MAC)
Chapter 13 Wired LANs: Ethernet
Presentation transcript:

1Token-bus - IEEE Token-Bus  All rights reserved. No part of this publication and file may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without prior written permission of Professor Nen-Fu Huang (

2Token-bus - Token-Passing Bus Access Method  Physically, it is a Bus network. Logically, it is a Ring network  Stations are organized as a circular doubly-linked list  A distributed polling algorithm is used to avoid bus contention  Token: Right of access  Token Holder (The station receiving the token)  Transmit one or more MAC-frame  Poll other stations  Receive responses

3Token-bus - Token-Passing Bus Access Method  Non-Token Holder  Listen to the channel  Respond to a poll  Send Acknowledgement  Logical Ring Maintenance  Ring Initialization  Addition to ring  Deletion from ring  Error Recovery

4Token-bus - Token-Bus Network Example 網路(B us ) 邏輯環 10 本站 前站後站

5Token-bus - Frame Format  Preamble: Establish bit synchronization and locate the first bit of the frame  SD = Start Delimiter  FC = Frame Control  DA = Destination Address  SA = Source Address  FCS = Frame Check Sequence  ED = End Delimiter  Maximum Length (From SD to ED): 8191 Bytes >= ,6 2,6 >= 位元組 Preamble SD FC DA SA LLC FCS ED

6Token-bus - Specific IEEE Frame Formats Preamble SD DA SA FCS ED Preamble SD DA SA FCS ED 任意值 長度 = (0,2,4,6) 倍的時槽位元組 (a) 要求 - 標記 (Claim Token, CT). The frame has a data-unit whose value is arbitrary and whose length in octets (between addresses and FCS exclusive) is 0,2,4, or 6 times the system’s slot-time also measured in octets. (b) 邀請 - 後工作站 -1 (Solicit-Successor-1, SS1). The frame has a DA= the contents of the station's NS register and a null data unit. One response window always follows this frame. 一個反應時窗  Response Window: One slot time (Round-Trip propagation delay). The Token holder expects response or acknowledgement from other stations in a given number of Response Windows.  Possible events in the response window No response One Response Multiple Responses -- A garbled Response (Contention)

7Token-bus - Specific IEEE Frame Formats Preamble SD DA SA FCS ED 三個反應時窗 舊後站 (d) 誰 - 跟在後面 (Who-follows, W). The frame has a data-unit = the value of the station's NS register. The format and the length of the data-unit is the same as a source address. Three response windows always follow this frame. (This gives receivers two extra slot-time to make a comparison with an address other than TS.) Preamble SD DA SA FCS ED 四個反應時窗 (e) 解決 - 爭端 (Resolve-contention, R). The frame has a null data-unit. Four response windows always follow this frame. Preamble SD DA SA FCS ED (c) 邀請 - 後工作站 -2 (Solicit-Successor-2, SS2). The frame has a DA= the contents of the station's NS or TS register and a null data unit. Two response windows always follow this frame. 二個反應時窗

8Token-bus - Specific IEEE Frame Formats Preamble SD DA SA FCS ED 新後站 (g) 設定 - 後工作站 (Set-Successor, S). The frame has DA = the SA of the last frame received, and data-unit = the value of the station's NS or TS register. The format and the length of the data-unit is the same as a source address. Preamble SD 01MMMPPP DA SA LLC FCS ED (h) LLC 訊框格式. LLC data frames have a DA and data-unit specified by a station's LLC sublayer. A frame of this type with a non-null data unit shall be passed to the receiving station's LLC sublayer. Preamble SD DA SA FCS ED (f) 標記 (Token, T). The frame has DA = the contents of the station's NS register, and has a null data-unit.

9Token-bus - Normal Token Passing Operation  In numerically descending order (60 -> 50 -> 30 -> 20 -> 60)  Each station in the ring has knowledge of  TS: This Station's address ( 本站 )  NS: Next Station's address ( 後站 )  PS: Previous Station's address ( 前站 )  A station has a token holding timer to limit the time it can hold the token. This value is set at the system initialization time by the network management process.  At the end of transmission, the token is passed to the next station.  Once received the token, the station either starts to transmit or passes the token to the next station within one response window.

10Token-bus - Normal Token Passing Example  The Logical ring consists of stations 60,50,30,20. Station 10 is not included in the logical ring.  Station 50 passes a token to station 30 via the broadcast bus.  All the stations in the bus can see the token, but only station 30 has the right to use the token DA SA 5030 T 本站 前站後站

11Token-bus - Addition of a Station  Token holder has the responsibility of periodically (an inter- solicit-count timer) granting an opportunity for new stations to enter the logical ring before it passes the token.  A Solicit-Successor-1 (SS1) control frame is issued with  DA = NS  SA = TS  Data = Null  One response window is reserved for those stations desired to enter the logical ring and their address is between DA and SA. (If the address of the token-holder has the smallest address in the logical ring, then a Solicit-Successor-2 frame is issued)

12Token-bus - Addition of a Station  The station desired to enter the logical ring will respond with a Set-Successor frame with  DA = Token-holder address  SA = TS (Its address)  Data = TS  The Token holder detects the event in the response window and takes appropriate actions:  No Response: Pass token to the next station  One Response: Pass token to the newly added station. The newly added station will update its NS value by recall the DA field of the previously received Solicit-Successor-1 frame.

13Token-bus - Addition of a Station (Continued)  Multiple Responses:  A Resolve-Contention frame is issued by the token-holder with DA = XX, SA = TS, Data = Null  A station desired to enter the logical ring will response with a Set- Successor frame as before at the K-th window, where K is determined by the value of the first two bits of its address. However, if the channel is detected busy before the K-th window, it will give up.  If no valid Set-Successor frame is received by the token-holder, the token-holder will issue another Resolve-Contention frame.  Now only those stations involved in the contention may try again. The value of K now is determined by the next two bits.  The above procedure is repeated until a valid Set-Successor frame is received by the token-holder. A new station is thus successfully added to the logical ring.

14Token-bus - Addition Example 1 (without Contention) DA SA 5030 SS1 1 DA SA DATA 4050 S 40 2 本站 前站後站 本站 前站後站 Newly added Station

15Token-bus - Addition Example 2 (with contention) DA SA 5020 SS1 1 DA SA DATA 4050 S 40 2 DA SA DATA 3050 S 30 2 DA SA 50 R 3 XX 本站 前站後站 本站 前站後站 Newly added Station

16Token-bus - Resolve Contention Example  Five stations: A,B,C,D,E. For simplicity, addresses are assumed to have only 8 bits.  Four Resolve-Contention frames are required to find out the station with the largest address (B). Each frame follows with four Response Windows. B A D C E A C DE 1 A BC 2 BC 3 B C 4 B Give up

17Token-bus - Addition of a Station (Continued)  Usually, NS TS (The one with the smallest address in the logical ring). In this case Solicit-Successor-2 (SS2) frame is issued followed by two Response Windows.  The first response window is reserved for stations (X) whose address is less than this station.  The second response window is reserved for stations (Y) whose address is greater than its successor.  Stations in Y will respond with the Set-Successor frame only if there is no response in the first response window.

18Token-bus - Addition of a Station (Continued)  Each response window may have the following events:  No response  One response -- A newly station is added  Multiple responses -- Resolved contention procedure is invoked to find out the largest address involved in the contention.  If both the response windows have no response, then the token-holder passes the token to the next station.

19Token-bus - Addition Example 3 (with SS2) 本站 前站後站 DA SA 2060 SS2 1 DA SA DATA 1020 S 10 2 本站 前站後站 Newly added Station

20Token-bus - Deletion of a Station  The station wishes to be deleted may wait until it receives the token, then sends a Set-Successor frame to its predecessor, with  DA = PS  SA = TS  Data = NS  The previous station once receives the Set-Successor frame will modify its NS and send a token to its new next station.  The next station once receives the Set-Successor frame will modify its PS accordingly.  After these two modifications, the station is removed from the logical ring automatically.  If the station fails, it will not receive the token. This will be detected by the token-sender as explained later.

21Token-bus DA SA DATA 3050 S 20 2 DA SA 5030 T 1 本站 前站後站 DA SA 5020 T 3 本站 前站後站 Deleted Station Deletion Example

22Token-bus - Fault Management  One of the most important issues of the token-bus protocol is to maintain the logical ring under the following possible conditions:  Multiple Tokens  Unaccepted Token  Failed Station  Failed Receiver  No Token

23Token-bus - Multiple Tokens  Cause:  Noise  Duplicate Address, each one may "receive" a token  Detection:  While holding the token, the station may hear a frame on the bus which indicating that another station also has a token.  Action:  Drop the token  If all stations drop the token, the network becomes the case of no token (see the procedure of handling no token later)

24Token-bus - Unaccepted Token or Failed Station  Cause  The token passed to the next station may be garbled  The next station fails  Detection:  No response (Channel is idle) in one response window  Action:  Try to pass token one more time  It still no response, then the next station is assumed to have failed  The token holder then issues a Who-Follows frame with DA = XX, SA = TS, Data = NS

25Token-bus - Unaccepted Token or Failed Station  All other stations once received Who-Follows frame will compare the data with its PS value. If there is a match, it will issue a Set-Successor frame back. Three response windows are reserved after Who-Follows. The first two are needed to make a comparison.  If no response to the Who-Follows frame, the above procedure will be tried one more time.  If still no response to the Who-Follows frame, then it could be that the next station to the next station has also failed.  The token-holder will try to establish the ring by issuing a Solicit-Successor-2 frame, with DA = TS, SA = TS, Data = Null.

26Token-bus - Unaccepted Token and Failed Station  DA=SA=TS implies that every station is invited to respond. Two response windows are reserved after this frame.  The first response window is reserved for stations whose address is less than the sender.  The second response window is reserved for stations whose address is greater than the sender.  The procedure of add a station is then used.  If still no response to the Solicit frame, then either all stations have failed (Left the ring) or its own receiver has failed (so it cannot listen).  If the only one station has something to send, it sends the data. Then repeat the token passing process. Otherwise, listen to the channel.

27Token-bus - Station Fails Example 1 (Station 50) DA SA 6050 T 2 1 DA SA DATA 3060 S 30 4 DA SA DATA 60XX50 3 W 本站 前站後站 DA SA 6030 T 5 本站 前站後站

28Token-bus - Station Fails Example 2 (Stations 50 and 30) DA SA DATA DA SA 6050 T 2 1 DA SA DATA 2060 S 20 6 DA SA DATA 60XX50 3 W S 10 DA SA 60 5 SS2 6 本站 前站後站 DA SA 6020 T 本站 前站後站

29Token-bus - No Token or Initialization  Cause:  The Token-holder station fails  The token is destroyed  Network Initialization  Detection:  No channel activity has been heard for a certain amount of time (Bus-Idle Timer expired)  Action:  Any station when its Bus-Idle timer is expired will issue a Claim-Token frame, with DA = XX, SA = TS, Data = Any value with (0,2,4,6) slot times depending on its address

30Token-bus - No Token or Initialization  The station with the greatest address will get the token. This is done by comparing the address. Two bits of the address are compared at a time.  In each pass, only those stations who transmitted the longest frame on the previous pass try again.  The station that succeeds on the last pass considers itself the token holder.  The difference is 2 slots in the frame padding. The station waits one slot for its or other frame to pass. It then samples the channel at the second slot.  The logical ring can then be established by issuing Solicit- Successor frames as described before.

31Token-bus - No Token or Initialization Preamble SD DA SA FCS ED 2 個時槽(任意值) 4 個時槽(任意值) 6 個時槽(任意值) 0 個時槽 00: 01: 10: 11:

32Token-bus - Priority Mechanism  In the control field of data frame, three bits are reserved to indicate frame priority.  Only four access classes are considered  6 : The highest priority  4  2  0 : The lowest priority  Hi-Pri-Token-Hold-Time: To avoid one station dominating the network, an upper bound is set in each station to determine the maximum time that the highest priority frame can hold the token.  Each lower access class in the station has a Target token Rotation Time (TRT).

33Token-bus - Priority Mechanism 等級 6 等級 4 等級 2 等級 0 貯列 網路 本站 前站後站

34Token-bus - Priority Handling of Frames  Some Timers set by the network management  Class N: HPTHT (Hi-Pri-Token-Hold-Time)  Class N-1: TRT(N-1) Token-Rotation-Time ...  Class 1: TRT(1)  TRTC: Token-Rotation-Time-Counter  TT: Temporary Timer 上次取得訊標時間 本次取得訊標時間 等級 N 等級 N-1 TRTC TT 時間

35Token-bus - General Priority Algorithm 接收訊標 TT <- 0 傳送一筆 等級 N 訊框 i = N-1 TRTC < TRT(i) 及 Queue(i) <>  i = i - 1 i = 0 傳遞訊標 Y Y N N N Y TT < HPTHT 及 Queue(N) <>  傳送一筆 等級 i 訊框 TRTC <- TT

36Token-bus - Priority Algorithm Example TRT = 1600 等級 2 等級 1 TRT = 1600 等級 1 等級 2 TRTC 傳送筆數 訊標 環繞次數 TRTC 傳送筆數

37Token-bus - Priority Algorithm Example  N = 2  Station 60: Frame-size = 128 Bytes, Transmit three Class-2 frames at a time  Station 50: TRT(1) = 1600, Frame-size = 400 Bytes, Transmit as many Class-1 frames as possible  Station 20: TRT(1) = 1600, Frame-size = 356 Bytes, Transmit as many Class-1 frames as possible  Station 10: Frame-size = 305 Bytes, Transmit two Class-2 frames at a time  Token passing time = 19 bytes  Initially all stations are idle  TRTC Calculation:  Station 50: (Token Rotation no. 6), 1782 = 2(356)+2(305)+3(128)+4(19) > 1600  Station 20: (Token Rotation no. 9), 1477 = 2(356)+1(305)+3(128)+4(19) < 1600

38Token-bus - Token-bus Priority Algorithm 時限到 ? 傳送訊框 是 是 否 有等級 4 否 訊框要送 ? 時限到 ? 傳送訊框 是 是 否 有等級 6 訊框要送 ? 時限到 ? 傳送訊框 是 是 否 有等級 0 否 訊框要送 ? 時限到 ? 傳送訊框 是 是 否 有等級 2 否 訊框要送 ? 傳送設定後站 訊框給前站 是 否 還有 否 訊框要送 ? 是 繼續 留在環中 ? 傳遞訊標 使用訊標 否

39Token-bus - Encoding: Differential Manchester Encoding 二進位 1s 或 二進位 0s 或 位元界線 + - 或 或 + - SD ED V1V1 V0V0 0V1V1 V0V0 000 V1V1 V0V0 1V1V1 V0V0 10 錯誤偵測指示