Upload
dora-arnold
View
223
Download
2
Tags:
Embed Size (px)
Citation preview
NETE0510 Communication Media and Data Communications
1
NETE0510LANs and Hi-speed LANs
Dr Supakorn Kungpisdansupakornmutacth
NETE0510 Communication Media and Data Communications
2
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
3
LAN Topologies
NETE0510 Communication Media and Data Communications
4
LAN Protocol Architecture
NETE0510 Communication Media and Data Communications
5
IEEE 802 Layers
Physical encodingdecoding of signals preamble generationremoval bit transmissionreception transmission medium and topology
Logical Link Control interface to higher levels flow and error control
Media Access Control on transmit assemble data into frame on receive disassemble frame govern access to transmission medium for same LLC may have several MAC options
NETE0510 Communication Media and Data Communications
6
LAN Protocols in Context
NETE0510 Communication Media and Data Communications
7
Logical Link Control (LLC)
transmission of link level PDUs between stations must support multi-access shared medium but MAC layer handles link access details addressing involves specifying source and
destination LLC users referred to as service access points (SAP) typically higher level protocol
NETE0510 Communication Media and Data Communications
8
LLC Services
based on HDLC 3 services provided
Unacknowledged connectionless service Simple no flow- and error control no data delivery
guaranteed rely on higher layer protocols Connection-mode service
Similar to that offered by HDLC Need connection setup provide flow and error control
Acknowledged connectionless service Hybrid approach No connection setup required but require
acknowledgement
NETE0510 Communication Media and Data Communications
9
Media Access Control (MAC)
MAC layer receives data from LLC layer fields
MAC control destination MAC address source MAC address LLC CRC
MAC layer detects errors and discards frames LLC optionally retransmits unsuccessful frames
(link-to-link retransmission not end-to-end)
NETE0510 Communication Media and Data Communications
10
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
11
Ethernet (CSMACD)
most widely used LAN standard developed by
Xerox - original Ethernet IEEE 8023
Carrier Sense Multiple Access with Collision Detection (CSMACD) random contention access to media
NETE0510 Communication Media and Data Communications
12
Pure VS Slotted ALOHA
Pure ALOHA
Slotted ALOHA
NETE0510 Communication Media and Data Communications
13
ALOHA
developed for packet radio nets when station has frame it sends then listens for a bit over max round trip time (RTT)
if receive ACK then fine if not retransmit if no ACK after repeated transmissions give up
uses a frame check sequence (as in HDLC) to check for errors
frame may be damaged by noise or by another station transmitting at the same time (collision)
any overlap of frames causes collision max utilization 18
NETE0510 Communication Media and Data Communications
14
Slotted ALOHA
time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism)
transmission begins only at the beginning of the slot So frames either miss or overlap totally
max utilization 37 both have poor utilization fail to use fact that propagation time (PT) is much less
than frame transmission time (TT) If PT gtgt TT a station may succeed in transmitting a frame If TT gtgt PT none of the stations may not succeed
NETE0510 Communication Media and Data Communications
15
CSMA stations soon know transmission has started1 so first listen for clear medium (carrier sense)2 if medium idle transmit3 if two stations start at the same instant collision
wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame
max utilization depends on propagation time (medium length) and frame length
shorter PT longer frame higher utilization Also work well for the case that PT ltlt TT Collision can occur only more than one user begins
transmitting within PT
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
2
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
3
LAN Topologies
NETE0510 Communication Media and Data Communications
4
LAN Protocol Architecture
NETE0510 Communication Media and Data Communications
5
IEEE 802 Layers
Physical encodingdecoding of signals preamble generationremoval bit transmissionreception transmission medium and topology
Logical Link Control interface to higher levels flow and error control
Media Access Control on transmit assemble data into frame on receive disassemble frame govern access to transmission medium for same LLC may have several MAC options
NETE0510 Communication Media and Data Communications
6
LAN Protocols in Context
NETE0510 Communication Media and Data Communications
7
Logical Link Control (LLC)
transmission of link level PDUs between stations must support multi-access shared medium but MAC layer handles link access details addressing involves specifying source and
destination LLC users referred to as service access points (SAP) typically higher level protocol
NETE0510 Communication Media and Data Communications
8
LLC Services
based on HDLC 3 services provided
Unacknowledged connectionless service Simple no flow- and error control no data delivery
guaranteed rely on higher layer protocols Connection-mode service
Similar to that offered by HDLC Need connection setup provide flow and error control
Acknowledged connectionless service Hybrid approach No connection setup required but require
acknowledgement
NETE0510 Communication Media and Data Communications
9
Media Access Control (MAC)
MAC layer receives data from LLC layer fields
MAC control destination MAC address source MAC address LLC CRC
MAC layer detects errors and discards frames LLC optionally retransmits unsuccessful frames
(link-to-link retransmission not end-to-end)
NETE0510 Communication Media and Data Communications
10
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
11
Ethernet (CSMACD)
most widely used LAN standard developed by
Xerox - original Ethernet IEEE 8023
Carrier Sense Multiple Access with Collision Detection (CSMACD) random contention access to media
NETE0510 Communication Media and Data Communications
12
Pure VS Slotted ALOHA
Pure ALOHA
Slotted ALOHA
NETE0510 Communication Media and Data Communications
13
ALOHA
developed for packet radio nets when station has frame it sends then listens for a bit over max round trip time (RTT)
if receive ACK then fine if not retransmit if no ACK after repeated transmissions give up
uses a frame check sequence (as in HDLC) to check for errors
frame may be damaged by noise or by another station transmitting at the same time (collision)
any overlap of frames causes collision max utilization 18
NETE0510 Communication Media and Data Communications
14
Slotted ALOHA
time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism)
transmission begins only at the beginning of the slot So frames either miss or overlap totally
max utilization 37 both have poor utilization fail to use fact that propagation time (PT) is much less
than frame transmission time (TT) If PT gtgt TT a station may succeed in transmitting a frame If TT gtgt PT none of the stations may not succeed
NETE0510 Communication Media and Data Communications
15
CSMA stations soon know transmission has started1 so first listen for clear medium (carrier sense)2 if medium idle transmit3 if two stations start at the same instant collision
wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame
max utilization depends on propagation time (medium length) and frame length
shorter PT longer frame higher utilization Also work well for the case that PT ltlt TT Collision can occur only more than one user begins
transmitting within PT
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
3
LAN Topologies
NETE0510 Communication Media and Data Communications
4
LAN Protocol Architecture
NETE0510 Communication Media and Data Communications
5
IEEE 802 Layers
Physical encodingdecoding of signals preamble generationremoval bit transmissionreception transmission medium and topology
Logical Link Control interface to higher levels flow and error control
Media Access Control on transmit assemble data into frame on receive disassemble frame govern access to transmission medium for same LLC may have several MAC options
NETE0510 Communication Media and Data Communications
6
LAN Protocols in Context
NETE0510 Communication Media and Data Communications
7
Logical Link Control (LLC)
transmission of link level PDUs between stations must support multi-access shared medium but MAC layer handles link access details addressing involves specifying source and
destination LLC users referred to as service access points (SAP) typically higher level protocol
NETE0510 Communication Media and Data Communications
8
LLC Services
based on HDLC 3 services provided
Unacknowledged connectionless service Simple no flow- and error control no data delivery
guaranteed rely on higher layer protocols Connection-mode service
Similar to that offered by HDLC Need connection setup provide flow and error control
Acknowledged connectionless service Hybrid approach No connection setup required but require
acknowledgement
NETE0510 Communication Media and Data Communications
9
Media Access Control (MAC)
MAC layer receives data from LLC layer fields
MAC control destination MAC address source MAC address LLC CRC
MAC layer detects errors and discards frames LLC optionally retransmits unsuccessful frames
(link-to-link retransmission not end-to-end)
NETE0510 Communication Media and Data Communications
10
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
11
Ethernet (CSMACD)
most widely used LAN standard developed by
Xerox - original Ethernet IEEE 8023
Carrier Sense Multiple Access with Collision Detection (CSMACD) random contention access to media
NETE0510 Communication Media and Data Communications
12
Pure VS Slotted ALOHA
Pure ALOHA
Slotted ALOHA
NETE0510 Communication Media and Data Communications
13
ALOHA
developed for packet radio nets when station has frame it sends then listens for a bit over max round trip time (RTT)
if receive ACK then fine if not retransmit if no ACK after repeated transmissions give up
uses a frame check sequence (as in HDLC) to check for errors
frame may be damaged by noise or by another station transmitting at the same time (collision)
any overlap of frames causes collision max utilization 18
NETE0510 Communication Media and Data Communications
14
Slotted ALOHA
time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism)
transmission begins only at the beginning of the slot So frames either miss or overlap totally
max utilization 37 both have poor utilization fail to use fact that propagation time (PT) is much less
than frame transmission time (TT) If PT gtgt TT a station may succeed in transmitting a frame If TT gtgt PT none of the stations may not succeed
NETE0510 Communication Media and Data Communications
15
CSMA stations soon know transmission has started1 so first listen for clear medium (carrier sense)2 if medium idle transmit3 if two stations start at the same instant collision
wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame
max utilization depends on propagation time (medium length) and frame length
shorter PT longer frame higher utilization Also work well for the case that PT ltlt TT Collision can occur only more than one user begins
transmitting within PT
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
4
LAN Protocol Architecture
NETE0510 Communication Media and Data Communications
5
IEEE 802 Layers
Physical encodingdecoding of signals preamble generationremoval bit transmissionreception transmission medium and topology
Logical Link Control interface to higher levels flow and error control
Media Access Control on transmit assemble data into frame on receive disassemble frame govern access to transmission medium for same LLC may have several MAC options
NETE0510 Communication Media and Data Communications
6
LAN Protocols in Context
NETE0510 Communication Media and Data Communications
7
Logical Link Control (LLC)
transmission of link level PDUs between stations must support multi-access shared medium but MAC layer handles link access details addressing involves specifying source and
destination LLC users referred to as service access points (SAP) typically higher level protocol
NETE0510 Communication Media and Data Communications
8
LLC Services
based on HDLC 3 services provided
Unacknowledged connectionless service Simple no flow- and error control no data delivery
guaranteed rely on higher layer protocols Connection-mode service
Similar to that offered by HDLC Need connection setup provide flow and error control
Acknowledged connectionless service Hybrid approach No connection setup required but require
acknowledgement
NETE0510 Communication Media and Data Communications
9
Media Access Control (MAC)
MAC layer receives data from LLC layer fields
MAC control destination MAC address source MAC address LLC CRC
MAC layer detects errors and discards frames LLC optionally retransmits unsuccessful frames
(link-to-link retransmission not end-to-end)
NETE0510 Communication Media and Data Communications
10
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
11
Ethernet (CSMACD)
most widely used LAN standard developed by
Xerox - original Ethernet IEEE 8023
Carrier Sense Multiple Access with Collision Detection (CSMACD) random contention access to media
NETE0510 Communication Media and Data Communications
12
Pure VS Slotted ALOHA
Pure ALOHA
Slotted ALOHA
NETE0510 Communication Media and Data Communications
13
ALOHA
developed for packet radio nets when station has frame it sends then listens for a bit over max round trip time (RTT)
if receive ACK then fine if not retransmit if no ACK after repeated transmissions give up
uses a frame check sequence (as in HDLC) to check for errors
frame may be damaged by noise or by another station transmitting at the same time (collision)
any overlap of frames causes collision max utilization 18
NETE0510 Communication Media and Data Communications
14
Slotted ALOHA
time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism)
transmission begins only at the beginning of the slot So frames either miss or overlap totally
max utilization 37 both have poor utilization fail to use fact that propagation time (PT) is much less
than frame transmission time (TT) If PT gtgt TT a station may succeed in transmitting a frame If TT gtgt PT none of the stations may not succeed
NETE0510 Communication Media and Data Communications
15
CSMA stations soon know transmission has started1 so first listen for clear medium (carrier sense)2 if medium idle transmit3 if two stations start at the same instant collision
wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame
max utilization depends on propagation time (medium length) and frame length
shorter PT longer frame higher utilization Also work well for the case that PT ltlt TT Collision can occur only more than one user begins
transmitting within PT
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
5
IEEE 802 Layers
Physical encodingdecoding of signals preamble generationremoval bit transmissionreception transmission medium and topology
Logical Link Control interface to higher levels flow and error control
Media Access Control on transmit assemble data into frame on receive disassemble frame govern access to transmission medium for same LLC may have several MAC options
NETE0510 Communication Media and Data Communications
6
LAN Protocols in Context
NETE0510 Communication Media and Data Communications
7
Logical Link Control (LLC)
transmission of link level PDUs between stations must support multi-access shared medium but MAC layer handles link access details addressing involves specifying source and
destination LLC users referred to as service access points (SAP) typically higher level protocol
NETE0510 Communication Media and Data Communications
8
LLC Services
based on HDLC 3 services provided
Unacknowledged connectionless service Simple no flow- and error control no data delivery
guaranteed rely on higher layer protocols Connection-mode service
Similar to that offered by HDLC Need connection setup provide flow and error control
Acknowledged connectionless service Hybrid approach No connection setup required but require
acknowledgement
NETE0510 Communication Media and Data Communications
9
Media Access Control (MAC)
MAC layer receives data from LLC layer fields
MAC control destination MAC address source MAC address LLC CRC
MAC layer detects errors and discards frames LLC optionally retransmits unsuccessful frames
(link-to-link retransmission not end-to-end)
NETE0510 Communication Media and Data Communications
10
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
11
Ethernet (CSMACD)
most widely used LAN standard developed by
Xerox - original Ethernet IEEE 8023
Carrier Sense Multiple Access with Collision Detection (CSMACD) random contention access to media
NETE0510 Communication Media and Data Communications
12
Pure VS Slotted ALOHA
Pure ALOHA
Slotted ALOHA
NETE0510 Communication Media and Data Communications
13
ALOHA
developed for packet radio nets when station has frame it sends then listens for a bit over max round trip time (RTT)
if receive ACK then fine if not retransmit if no ACK after repeated transmissions give up
uses a frame check sequence (as in HDLC) to check for errors
frame may be damaged by noise or by another station transmitting at the same time (collision)
any overlap of frames causes collision max utilization 18
NETE0510 Communication Media and Data Communications
14
Slotted ALOHA
time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism)
transmission begins only at the beginning of the slot So frames either miss or overlap totally
max utilization 37 both have poor utilization fail to use fact that propagation time (PT) is much less
than frame transmission time (TT) If PT gtgt TT a station may succeed in transmitting a frame If TT gtgt PT none of the stations may not succeed
NETE0510 Communication Media and Data Communications
15
CSMA stations soon know transmission has started1 so first listen for clear medium (carrier sense)2 if medium idle transmit3 if two stations start at the same instant collision
wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame
max utilization depends on propagation time (medium length) and frame length
shorter PT longer frame higher utilization Also work well for the case that PT ltlt TT Collision can occur only more than one user begins
transmitting within PT
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
6
LAN Protocols in Context
NETE0510 Communication Media and Data Communications
7
Logical Link Control (LLC)
transmission of link level PDUs between stations must support multi-access shared medium but MAC layer handles link access details addressing involves specifying source and
destination LLC users referred to as service access points (SAP) typically higher level protocol
NETE0510 Communication Media and Data Communications
8
LLC Services
based on HDLC 3 services provided
Unacknowledged connectionless service Simple no flow- and error control no data delivery
guaranteed rely on higher layer protocols Connection-mode service
Similar to that offered by HDLC Need connection setup provide flow and error control
Acknowledged connectionless service Hybrid approach No connection setup required but require
acknowledgement
NETE0510 Communication Media and Data Communications
9
Media Access Control (MAC)
MAC layer receives data from LLC layer fields
MAC control destination MAC address source MAC address LLC CRC
MAC layer detects errors and discards frames LLC optionally retransmits unsuccessful frames
(link-to-link retransmission not end-to-end)
NETE0510 Communication Media and Data Communications
10
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
11
Ethernet (CSMACD)
most widely used LAN standard developed by
Xerox - original Ethernet IEEE 8023
Carrier Sense Multiple Access with Collision Detection (CSMACD) random contention access to media
NETE0510 Communication Media and Data Communications
12
Pure VS Slotted ALOHA
Pure ALOHA
Slotted ALOHA
NETE0510 Communication Media and Data Communications
13
ALOHA
developed for packet radio nets when station has frame it sends then listens for a bit over max round trip time (RTT)
if receive ACK then fine if not retransmit if no ACK after repeated transmissions give up
uses a frame check sequence (as in HDLC) to check for errors
frame may be damaged by noise or by another station transmitting at the same time (collision)
any overlap of frames causes collision max utilization 18
NETE0510 Communication Media and Data Communications
14
Slotted ALOHA
time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism)
transmission begins only at the beginning of the slot So frames either miss or overlap totally
max utilization 37 both have poor utilization fail to use fact that propagation time (PT) is much less
than frame transmission time (TT) If PT gtgt TT a station may succeed in transmitting a frame If TT gtgt PT none of the stations may not succeed
NETE0510 Communication Media and Data Communications
15
CSMA stations soon know transmission has started1 so first listen for clear medium (carrier sense)2 if medium idle transmit3 if two stations start at the same instant collision
wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame
max utilization depends on propagation time (medium length) and frame length
shorter PT longer frame higher utilization Also work well for the case that PT ltlt TT Collision can occur only more than one user begins
transmitting within PT
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
7
Logical Link Control (LLC)
transmission of link level PDUs between stations must support multi-access shared medium but MAC layer handles link access details addressing involves specifying source and
destination LLC users referred to as service access points (SAP) typically higher level protocol
NETE0510 Communication Media and Data Communications
8
LLC Services
based on HDLC 3 services provided
Unacknowledged connectionless service Simple no flow- and error control no data delivery
guaranteed rely on higher layer protocols Connection-mode service
Similar to that offered by HDLC Need connection setup provide flow and error control
Acknowledged connectionless service Hybrid approach No connection setup required but require
acknowledgement
NETE0510 Communication Media and Data Communications
9
Media Access Control (MAC)
MAC layer receives data from LLC layer fields
MAC control destination MAC address source MAC address LLC CRC
MAC layer detects errors and discards frames LLC optionally retransmits unsuccessful frames
(link-to-link retransmission not end-to-end)
NETE0510 Communication Media and Data Communications
10
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
11
Ethernet (CSMACD)
most widely used LAN standard developed by
Xerox - original Ethernet IEEE 8023
Carrier Sense Multiple Access with Collision Detection (CSMACD) random contention access to media
NETE0510 Communication Media and Data Communications
12
Pure VS Slotted ALOHA
Pure ALOHA
Slotted ALOHA
NETE0510 Communication Media and Data Communications
13
ALOHA
developed for packet radio nets when station has frame it sends then listens for a bit over max round trip time (RTT)
if receive ACK then fine if not retransmit if no ACK after repeated transmissions give up
uses a frame check sequence (as in HDLC) to check for errors
frame may be damaged by noise or by another station transmitting at the same time (collision)
any overlap of frames causes collision max utilization 18
NETE0510 Communication Media and Data Communications
14
Slotted ALOHA
time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism)
transmission begins only at the beginning of the slot So frames either miss or overlap totally
max utilization 37 both have poor utilization fail to use fact that propagation time (PT) is much less
than frame transmission time (TT) If PT gtgt TT a station may succeed in transmitting a frame If TT gtgt PT none of the stations may not succeed
NETE0510 Communication Media and Data Communications
15
CSMA stations soon know transmission has started1 so first listen for clear medium (carrier sense)2 if medium idle transmit3 if two stations start at the same instant collision
wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame
max utilization depends on propagation time (medium length) and frame length
shorter PT longer frame higher utilization Also work well for the case that PT ltlt TT Collision can occur only more than one user begins
transmitting within PT
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
8
LLC Services
based on HDLC 3 services provided
Unacknowledged connectionless service Simple no flow- and error control no data delivery
guaranteed rely on higher layer protocols Connection-mode service
Similar to that offered by HDLC Need connection setup provide flow and error control
Acknowledged connectionless service Hybrid approach No connection setup required but require
acknowledgement
NETE0510 Communication Media and Data Communications
9
Media Access Control (MAC)
MAC layer receives data from LLC layer fields
MAC control destination MAC address source MAC address LLC CRC
MAC layer detects errors and discards frames LLC optionally retransmits unsuccessful frames
(link-to-link retransmission not end-to-end)
NETE0510 Communication Media and Data Communications
10
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
11
Ethernet (CSMACD)
most widely used LAN standard developed by
Xerox - original Ethernet IEEE 8023
Carrier Sense Multiple Access with Collision Detection (CSMACD) random contention access to media
NETE0510 Communication Media and Data Communications
12
Pure VS Slotted ALOHA
Pure ALOHA
Slotted ALOHA
NETE0510 Communication Media and Data Communications
13
ALOHA
developed for packet radio nets when station has frame it sends then listens for a bit over max round trip time (RTT)
if receive ACK then fine if not retransmit if no ACK after repeated transmissions give up
uses a frame check sequence (as in HDLC) to check for errors
frame may be damaged by noise or by another station transmitting at the same time (collision)
any overlap of frames causes collision max utilization 18
NETE0510 Communication Media and Data Communications
14
Slotted ALOHA
time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism)
transmission begins only at the beginning of the slot So frames either miss or overlap totally
max utilization 37 both have poor utilization fail to use fact that propagation time (PT) is much less
than frame transmission time (TT) If PT gtgt TT a station may succeed in transmitting a frame If TT gtgt PT none of the stations may not succeed
NETE0510 Communication Media and Data Communications
15
CSMA stations soon know transmission has started1 so first listen for clear medium (carrier sense)2 if medium idle transmit3 if two stations start at the same instant collision
wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame
max utilization depends on propagation time (medium length) and frame length
shorter PT longer frame higher utilization Also work well for the case that PT ltlt TT Collision can occur only more than one user begins
transmitting within PT
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
9
Media Access Control (MAC)
MAC layer receives data from LLC layer fields
MAC control destination MAC address source MAC address LLC CRC
MAC layer detects errors and discards frames LLC optionally retransmits unsuccessful frames
(link-to-link retransmission not end-to-end)
NETE0510 Communication Media and Data Communications
10
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
11
Ethernet (CSMACD)
most widely used LAN standard developed by
Xerox - original Ethernet IEEE 8023
Carrier Sense Multiple Access with Collision Detection (CSMACD) random contention access to media
NETE0510 Communication Media and Data Communications
12
Pure VS Slotted ALOHA
Pure ALOHA
Slotted ALOHA
NETE0510 Communication Media and Data Communications
13
ALOHA
developed for packet radio nets when station has frame it sends then listens for a bit over max round trip time (RTT)
if receive ACK then fine if not retransmit if no ACK after repeated transmissions give up
uses a frame check sequence (as in HDLC) to check for errors
frame may be damaged by noise or by another station transmitting at the same time (collision)
any overlap of frames causes collision max utilization 18
NETE0510 Communication Media and Data Communications
14
Slotted ALOHA
time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism)
transmission begins only at the beginning of the slot So frames either miss or overlap totally
max utilization 37 both have poor utilization fail to use fact that propagation time (PT) is much less
than frame transmission time (TT) If PT gtgt TT a station may succeed in transmitting a frame If TT gtgt PT none of the stations may not succeed
NETE0510 Communication Media and Data Communications
15
CSMA stations soon know transmission has started1 so first listen for clear medium (carrier sense)2 if medium idle transmit3 if two stations start at the same instant collision
wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame
max utilization depends on propagation time (medium length) and frame length
shorter PT longer frame higher utilization Also work well for the case that PT ltlt TT Collision can occur only more than one user begins
transmitting within PT
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
10
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
11
Ethernet (CSMACD)
most widely used LAN standard developed by
Xerox - original Ethernet IEEE 8023
Carrier Sense Multiple Access with Collision Detection (CSMACD) random contention access to media
NETE0510 Communication Media and Data Communications
12
Pure VS Slotted ALOHA
Pure ALOHA
Slotted ALOHA
NETE0510 Communication Media and Data Communications
13
ALOHA
developed for packet radio nets when station has frame it sends then listens for a bit over max round trip time (RTT)
if receive ACK then fine if not retransmit if no ACK after repeated transmissions give up
uses a frame check sequence (as in HDLC) to check for errors
frame may be damaged by noise or by another station transmitting at the same time (collision)
any overlap of frames causes collision max utilization 18
NETE0510 Communication Media and Data Communications
14
Slotted ALOHA
time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism)
transmission begins only at the beginning of the slot So frames either miss or overlap totally
max utilization 37 both have poor utilization fail to use fact that propagation time (PT) is much less
than frame transmission time (TT) If PT gtgt TT a station may succeed in transmitting a frame If TT gtgt PT none of the stations may not succeed
NETE0510 Communication Media and Data Communications
15
CSMA stations soon know transmission has started1 so first listen for clear medium (carrier sense)2 if medium idle transmit3 if two stations start at the same instant collision
wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame
max utilization depends on propagation time (medium length) and frame length
shorter PT longer frame higher utilization Also work well for the case that PT ltlt TT Collision can occur only more than one user begins
transmitting within PT
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
11
Ethernet (CSMACD)
most widely used LAN standard developed by
Xerox - original Ethernet IEEE 8023
Carrier Sense Multiple Access with Collision Detection (CSMACD) random contention access to media
NETE0510 Communication Media and Data Communications
12
Pure VS Slotted ALOHA
Pure ALOHA
Slotted ALOHA
NETE0510 Communication Media and Data Communications
13
ALOHA
developed for packet radio nets when station has frame it sends then listens for a bit over max round trip time (RTT)
if receive ACK then fine if not retransmit if no ACK after repeated transmissions give up
uses a frame check sequence (as in HDLC) to check for errors
frame may be damaged by noise or by another station transmitting at the same time (collision)
any overlap of frames causes collision max utilization 18
NETE0510 Communication Media and Data Communications
14
Slotted ALOHA
time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism)
transmission begins only at the beginning of the slot So frames either miss or overlap totally
max utilization 37 both have poor utilization fail to use fact that propagation time (PT) is much less
than frame transmission time (TT) If PT gtgt TT a station may succeed in transmitting a frame If TT gtgt PT none of the stations may not succeed
NETE0510 Communication Media and Data Communications
15
CSMA stations soon know transmission has started1 so first listen for clear medium (carrier sense)2 if medium idle transmit3 if two stations start at the same instant collision
wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame
max utilization depends on propagation time (medium length) and frame length
shorter PT longer frame higher utilization Also work well for the case that PT ltlt TT Collision can occur only more than one user begins
transmitting within PT
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
12
Pure VS Slotted ALOHA
Pure ALOHA
Slotted ALOHA
NETE0510 Communication Media and Data Communications
13
ALOHA
developed for packet radio nets when station has frame it sends then listens for a bit over max round trip time (RTT)
if receive ACK then fine if not retransmit if no ACK after repeated transmissions give up
uses a frame check sequence (as in HDLC) to check for errors
frame may be damaged by noise or by another station transmitting at the same time (collision)
any overlap of frames causes collision max utilization 18
NETE0510 Communication Media and Data Communications
14
Slotted ALOHA
time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism)
transmission begins only at the beginning of the slot So frames either miss or overlap totally
max utilization 37 both have poor utilization fail to use fact that propagation time (PT) is much less
than frame transmission time (TT) If PT gtgt TT a station may succeed in transmitting a frame If TT gtgt PT none of the stations may not succeed
NETE0510 Communication Media and Data Communications
15
CSMA stations soon know transmission has started1 so first listen for clear medium (carrier sense)2 if medium idle transmit3 if two stations start at the same instant collision
wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame
max utilization depends on propagation time (medium length) and frame length
shorter PT longer frame higher utilization Also work well for the case that PT ltlt TT Collision can occur only more than one user begins
transmitting within PT
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
13
ALOHA
developed for packet radio nets when station has frame it sends then listens for a bit over max round trip time (RTT)
if receive ACK then fine if not retransmit if no ACK after repeated transmissions give up
uses a frame check sequence (as in HDLC) to check for errors
frame may be damaged by noise or by another station transmitting at the same time (collision)
any overlap of frames causes collision max utilization 18
NETE0510 Communication Media and Data Communications
14
Slotted ALOHA
time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism)
transmission begins only at the beginning of the slot So frames either miss or overlap totally
max utilization 37 both have poor utilization fail to use fact that propagation time (PT) is much less
than frame transmission time (TT) If PT gtgt TT a station may succeed in transmitting a frame If TT gtgt PT none of the stations may not succeed
NETE0510 Communication Media and Data Communications
15
CSMA stations soon know transmission has started1 so first listen for clear medium (carrier sense)2 if medium idle transmit3 if two stations start at the same instant collision
wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame
max utilization depends on propagation time (medium length) and frame length
shorter PT longer frame higher utilization Also work well for the case that PT ltlt TT Collision can occur only more than one user begins
transmitting within PT
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
14
Slotted ALOHA
time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism)
transmission begins only at the beginning of the slot So frames either miss or overlap totally
max utilization 37 both have poor utilization fail to use fact that propagation time (PT) is much less
than frame transmission time (TT) If PT gtgt TT a station may succeed in transmitting a frame If TT gtgt PT none of the stations may not succeed
NETE0510 Communication Media and Data Communications
15
CSMA stations soon know transmission has started1 so first listen for clear medium (carrier sense)2 if medium idle transmit3 if two stations start at the same instant collision
wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame
max utilization depends on propagation time (medium length) and frame length
shorter PT longer frame higher utilization Also work well for the case that PT ltlt TT Collision can occur only more than one user begins
transmitting within PT
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
15
CSMA stations soon know transmission has started1 so first listen for clear medium (carrier sense)2 if medium idle transmit3 if two stations start at the same instant collision
wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame
max utilization depends on propagation time (medium length) and frame length
shorter PT longer frame higher utilization Also work well for the case that PT ltlt TT Collision can occur only more than one user begins
transmitting within PT
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
16
CSMA Persistence and Backoff
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
17
Non-persistent CSMA
Non-persistent CSMA rules1 if medium is idle transmit2 if medium is busy wait for amount of time drawn
from probability distribution (retransmission delay) amp retry
random delays reduces probability of collisions capacity is wasted because medium will remain
idle following end of transmission even stations are waiting to transmit frames
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
18
1-persistent CSMA
1-persistent CSMA avoids idle channel time 1-persistent CSMA rules
1 if medium idle transmit
2 if medium busy listen until idle then transmit immediately
1-persistent stations are selfish if two or more stations waiting a collision is
guaranteed
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
19
P-persistent CSMA
a compromise to try and reduce collisions and idle time
p-persistent CSMA rules 1 if medium idle transmit with probability p and delay
one time unit (equal to max propagation delay) with probability (1ndashp)
2 if medium busy listen until idle and repeat step 1
3 if transmission is delayed one time unit repeat step 1
issue of choosing effective value of p to avoid instability under heavy load
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
20
CSMACD
with CSMA collision occupies medium for duration of transmission
better if stations listen whilst transmitting CSMACD rules
1 if medium idle transmit2 if busy listen for idle then transmit3 if collision detected jam and then cease transmission4 after jam wait random time (backoff period) then retry
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
21
CSMACD (contrsquod)
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
22
1 Adaptor receives datagram from net layer amp creates frame
2 If adapter senses channel idle (no signal energy entering adapter for 96 bit times) it starts to transmit frame If it senses channel busy waits until channel idle and then transmits
3 If adapter transmits entire frame without detecting another transmission the adapter is done with frame
4 If adapter detects another transmission while transmitting aborts and sends 48-bit jam signal
5 After aborting adapter enters exponential backoff after the mth collision adapter chooses a K at random from 012hellip2m-1 Adapter waits K512 bit times and returns to Step 2
CSMACD Algorithm
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
23
CSMACD (contrsquod)
Jam Signal make sure all other transmitters are aware of collision 48 bits
Bit time time to send 1 bit of data
= 01 microsec for 10 Mbps Ethernet for K=1023 wait time is about 50 msec
(1023 x 512 x 01
= 52378 microsec
= 5238 msec)
Exponential Backoff Goal adapt retransmission
attempts to estimated current load heavy load random wait
will be longer first collision choose K from
01 delay is K 512 bit transmission times
after second collision choose K from 0123hellip
after ten collisions choose K from 01234hellip1023
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
24
IEEE 8023 Frame Format
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
25
10Mbps Specification (Ethernet)
10BASE5 10BASE2 10BASE-T 10BASE-FP
Transmissionmedium
Coaxial cable (50ohm)
Coaxial cable (50ohm)
Unshielded twistedpair
850-nm optical fiberpair
Signalingtechnique
Baseband(Manchester)
Baseband(Manchester)
Baseband(Manchester)
Manchesteron-off
Topology Bus Bus Star Star
Maximum segmentlength (m)
500 185 100 500
Nodes per segment 100 30 mdash 33
Cable diameter(mm)
10 5 04 to 06 625125 microm
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
26
100Mbps Fast Ethernet
100BASE-TX 100BASE-FX 100BASE-T4
Transmissionmedium
2 pair STP 2 pair Category5 UTP
2 optical fibers 4 pair Category3 4 or 5 UTP
Signalingtechnique
MLT -3 MLT -3 4B5B NRZI 8B6T NRZ
Data rate 100 Mbps 100 Mbps 100 Mbps 100 Mbps
Maximumsegment length
100 m 100 m 100 m 100 m
Network span 200 m 200 m 400 m 200 m
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
27
100BASE-X
uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link
encoding scheme same as FDDI 4B5B-NRZI
two physical medium specifications 100BASE-TX
uses two pairs of twisted-pair cable for tx amp rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used
100BASE-FX uses two optical fiber cables for tx amp rx convert 4B5B-NRZI code group into optical signals
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
28
MTL-3 Encoding
An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
29
100BASE-T Options
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
30
Gigabit Ethernet Configuration
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
31
Gigabit Ethernet ndash Physical
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
32
10Gbps Ethernet Options
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
33
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
34
Token Ring
Many types of token ring technology IBMrsquos Token Ring IEEE8025 Token Ring FDDI (Fiber Distribution Data
Interface) IEEE80217 Resilient Packet
Ring A token ring network consists
of nodes connected in a ring Data always flows in a
particular direction around the ring with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
35
Token Ring (contrsquod)
Different from Ethernet ring-based VS bus topology
Same single shared-medium network Two common features of Token Ring and
Ethernet Involve a distributed algorithm that controls when
each node is allowed to transmit All nodes see all frames only the node identified in
a frame as the destination will save a copy of the frame as it flows past
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
36
Token Ring specifications
Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MBs Cat 5 for 16
Mbs) for IBMrsquos Token Ring but not specified in IEEE8025
Use Manchester encoding Access method is token passing Logical topology ring physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 8025)
and 260 (IBM) per ring
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
37
Token
Token is a special sequence of bits circulating around the ring
Token Ring operation1 Each node receives and forwards the token2 When a node that has a frame to transmit sees the token it
takes the token off the ring and insert its frame into the ring3 Each node along the way simply forwards the frame with the
destination node saving a copy and forwarding the message onto the next node on the ring
4 When the frame makes its way back around to the sender this node strips its frame off the ring and reinserts the token
The media access algorithm is fair the token circulates around the ring each node gets a chance to transmit
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
38
Physical Properties
Link or node failure would render the whole network useless
Solved by connecting each station into the ring using an electromechanical relay
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
39
Physical Properties (contrsquod)
Several of these relays are usually packed into a single box known as a multi-station access unit (MSAU or MAU)
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
40
Token Ring Frame Format
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
41
Token Ring Frame Format (Contrsquod)
T is token bit set to specify the token frame M is monitor bit set by Active Monitor
A =1 Address recognized C = 1 Frame copied
Access Control
Frame Status
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
42
Token Ring Media Access Control
As the token circulates around the ring any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token
The first 2 bytes of the modified token now become the preamble for the subsequent data packet
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
43
Token Holding Time (THT)
Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit
each time it possesses the token
Time limit data limit or no limit Default THT for IEEE8025 is 10 ms
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
44
Token Rotation Time (TRT)
The amount of time it takes a token to traverse the tine as viewed by a given node
TRT le ActiveNodes x THT + RingLatency
Where RingLatency denotes how long it takes to circulate
around the ring where no one has data to send ActiveNodes denotes the number of nodes that
have data to send
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
45
Reliable Delivery
8025 provides a form of reliable delivery using 2 bits in the frame status field A and C bits
Initially A and C are 0s When a destination station sees a frame it sets A bit When it copies the frame into its adaptor it sets C bit If the sending station receives the frame with A bit still 0
the recipient is not functioning or absent If A bit is set but C bit is 0 the destination could not
accept the frame (may be the buffer is full) The sender may retransmit the frame
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
46
Token Ring Priority
The token contains a 3-bit priority field It has certain priority n at any time
Each station that has data to send assigns priority to that frame and the station can only seize the token to transmit a packet if the packetrsquos priority is at least as great as the tokenrsquos
The tokenrsquos priority changes over time due to 3 reservation bits in Access Control field
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
47
Token Ring Priority (contrsquod)
For example Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value
So the station that currently holds the token must reduce the priority of the token to n when it releases the token
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
48
Token Release
Early release or delayed release Early release allows better bandwidth utilization
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
49
Active and Standby Monitors
Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station
However there can be only one active monitor on a ring at a time
Becoming an AM is chosen by election Once an AM is chosen every other station becomes a standby monitor All stations must be capable of becoming an active monitor station if necessary
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
50
Active Monitor Election
Electing AM is done when the ring is first connected or on the failure of the current AM
The active monitor is chosen through an election or monitor contention process a loss of signal on the ring is detected an active monitor station is not detected by other stations on
the ring or when a particular timer on an end station expires such as the
case when a station hasnt seen a token frame in the past 7 seconds
The station that detects the above situation will try to become a new AM by performs the following
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
51
Active Monitor Election (contrsquod)
1 The station sends a ldquoclaim tokenrdquo frame saying it wants to become a new AM This frame contains its MAC address
2 If that token circulates back to the sender it is assumed that it can become a new AM
3 If other stations also want to become a new AM they also send the claim tokens The station with highest MAC address will become a new AM
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
52
Active Monitor
The active monitor performs a number of ring administration functions Operate as the master clock for the ring in order to provide
synchronization of the signal for stations on the wire Insert a 24-bit delay into the ring to ensure that there is
always sufficient buffering in the ring for the token to circulate
Ensure that exactly one token circulates whenever there is no frame being transmitted and to detect a broken ring
Token may vanish for several reasons eg bit error Responsible for removing circulating frames from the ring
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
53
Detecting A Missing Token
AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time The interval equals
NumStations x THT + RingLatency
If the timer expires without the AM seeing a token it creates a new token
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
54
Detecting Errors
AM checks for corrupted or orphaned frames Dealing with corrupted frames
The corrupted frame is the frame with checksum error or invalid format Without the AM intervention it could circulate forever
The AM removes it and reinsert a new token Dealing with orphaned frames
The orphaned frame is a normal frame whose ldquoparentrdquo died the sending station is down after sending the frame
This frame can be detected by using ldquomonitorrdquo bit in Access Control field
Initially the monitor bit is 0 it is set to 1 for the first time it passes the AM If the AM detects this frame with this bit set it knows that this frames is going by for the second time
Then the AM drains the frame off the ring
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
55
Outline
LAN Overview Ethernet Token Ring FDDI
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
56
FDDI
Fiber Distribution Data Interface Requently used as high-speed backbone technol
ogy because of its support for high bandwidth and greater distances than copper
An implementation on copper is called CDDI An FDDI network consists of a dual ring
transmitting data in opposite directions primary and secondary rings
Tolerate a single break in the cable or the failure of one station
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
57
FDDI (contrsquod)
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
58
FDDI Specifications
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
59
Station-attachment Types
Because of the expense of dual-ring configuration some node connects with a single cable single attachment station (SAS) their dual-connected counterpart is called dual attachment station (DAS)
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
60
Concentrator
A concentrator attaches several SASs to the dual ring analogous to MSAU used in 8025
If an SAS fails it uses an optical bypass to isolate the failed SA thereby keeping the ring connected
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
61
Concentrator (contrsquod)
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
62
Dealing With Failures
Station failure Cable failure
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
63
Optical Bypass Switch
Provides continuous dual-ring operation if a device on the dual ring fails
Prevent ring segmentation and eliminate failed stations from the ring
The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation
If a failure of the DAS device occurs eg a power-off the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the rings integrity
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
64
Optical Bypass Switch (contrsquod)
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
65
Dual Homing
Critical devices such as routers or mainframe hosts can use a fault-tolerant technique called dual homing to provide additional redundancy and to help guarantee operation
In dual-homing situations the critical device is attached to two concentrators
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
66
FDDI Physical Characteristics
Limit to 500 stations in a network span over 100 km
FDDI uses 4B5B encoding Primary ring offers the rate up to 100 Mbps
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
67
Timed Token Algorithm
Token Holding Time (THT) is calculated the same as that of 8025
Target Token Rotation Time (TTRT) the amount of time whereby all nodes agree to live within
Measured TRT (MTRT) the time where each node measures between successive arrivals of the token
If MTRT gt TTRT the token is late the node does not transmit any data
If MTRT lt TTRT the token is early the node is allowed to hold the token for the difference between TTRT-MTRT
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
68
FDDI Frame Format
The FDDI frame format is similar to the format of a Token Ring frame
FDDI frames can be as large as 4500 bytes
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
69
FDDI Frame Format (contrsquod)
PreamblemdashGives a unique sequence that prepares each station for an upcoming frame
Start delimitermdashIndicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame
Frame controlmdashIndicates the size of the address fields and whether the frame contains asynchronous or synchronous data among other control information
Destination addressmdashContains a unicast (singular) multicast (group) or broadcast (every station) address FDDI destination addresses are 6 bytes long
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
70
FDDI Frame Format (contrsquod)
Source addressmdashIdentifies the single station that sent the frame FDDI source addresses are 6 bytes long
DatamdashContains either information destined for an upper-layer protocol or control information
Frame check sequence (FCS)mdash error detection End delimitermdashContains unique symbols cannot be
data symbols that indicate the end of the frame Frame statusmdashAllows the source station to determine w
hether an error occurred identifies whether the frame was recognized and copied by a receiving station
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
71
Timed Token Algorithm (contrsquod)
However if a node sees the token but it has lots of data to send its MTRT gt TTRT it cannot transmit data
To account for this possibility FDDI defines 2 classes of traffic synchronous and asynchronous
For synchronous data a node is allowed to send after receiving a token no matter it is early or late Synchronous traffic is delay sensitive eg voice or video The total amount of data to send is bound by TTRT
For asynchronous data the token must be early Asynchronous more suitable for non-delay-sensitive data
eg file transfer
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
72
Timed Token Algorithm (contrsquod)
Question how a node determines if it can send asynchronous traffic Answer A node can send if MTRT lt TTRT
Question what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT Answer the node is allowed to send the frame
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
73
Token Maintenance
All nodes monitor the time to ensure that the token has not been lost
Each node should see a valid transmission data frame or the token
The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 25 ms
Normally each node sets a timer event to 25 ms If the timer expires the node sends a ldquoclaimrdquo
frame
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
74
Electing Active Monitor
Bidding for TTRT the node with lowest TTRT wins This node can hold the token and can transmit a frame
If nodes have equal TTRTs the node with higher address wins
If a node receives a claim frame it checks to see if the TTRT bid in the frame is less than its own If so the node reset its local TTRT and forward the frame to
the next node If its TTRT lt the bid TTRT remove the claim frame and
putting its own claim frame on the ring If the claim frame is back to the sender it can safely claim the
token
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN
NETE0510 Communication Media and Data Communications
75
Questions
Next Lecture
ISDN