Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If...
Transcript of Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If...
![Page 1: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/1.jpg)
Lecture 6 11.4.2012
Special Course in Computer Science: Local Networks
![Page 2: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/2.jpg)
Roadmap of the Course So far Basic telecom concepts General study of LANs Ethernet
Today An alternative of Ethernet at a time: token networks Token bus Token ring
An ITU-T local network, ATM LAN
![Page 3: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/3.jpg)
Token Bus
![Page 4: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/4.jpg)
Using LANs Direct application in Factory automation Process control
The nodes are computers controlling the manufacturing process
Real-time processing needed Minimum, predictable delays
Bus topology needed An assembly line resembles a bus
![Page 5: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/5.jpg)
Token bus IEEE 802.4 Standard sustained by General Motors Published in 1990, reviewed in 1995, 1997 Currently withdrawn
Combines Physical configuration of Ethernet (bus topology) Collision-free feature of token rings (=> predictable
delays)
![Page 6: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/6.jpg)
Physical vs. logical topology Physical topology: bus Logical topology: ring Formed based on physical addresses of stations in
descending order A station has a Successor: the station with immediate lower address;
referred as next station Predecessor: the station with immediate higher address;
referred as previous station
![Page 7: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/7.jpg)
More on the ring To form the ring Station with highest address has as predecessor
the station with lowest address Station with lowest address has as successor the
station with highest address
![Page 8: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/8.jpg)
Bus/Ring illustration
![Page 9: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/9.jpg)
Token passing Token: a small frame circulating from station to
station in the logical ring It controls the access to the shared medium When a station has data to send: keeps the token and
sends the data frames There are timers to prevent monopolization Token contains the address of the next station The ring is logical Physical topology is bus => every station gets the token but only
the logical “next” can use it
![Page 10: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/10.jpg)
Token passing illustration 1
![Page 11: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/11.jpg)
Token passing illustration 2
![Page 12: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/12.jpg)
Service classes Data to send can be classified in priority classes:
0, 2, 4, or 6 (6 – highest priority) If a station does not classify its data, then it
implicitly belongs to class 6 When a station uses the classification It has 4 queues, one per class Data arranged in corresponding queue by MAC
layer
![Page 13: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/13.jpg)
A station with queues
![Page 14: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/14.jpg)
Timers There are 4, to handle the different classes THT (token holding timer) Maximum time a station can send class 6 data Same for all stations
TRT4, TRT2, TRT0 (token rotation timers) Maximum time a token takes to circulate the ring + the
time to send respective class data
![Page 15: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/15.jpg)
Ring management The whole token bus depends on the logical ring
management
![Page 16: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/16.jpg)
Management frames There are 7 Token Claim-token Set-successor Solicit-successor-1 Solicit-successor-2 Resolve-contention Who-follows
![Page 17: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/17.jpg)
Removing stations
If a station leaves the ring, its predecessor should now bypass it To reform logical ring
A station may leave Voluntarily Unexpectedly (due to malfunctioning)
Example: token bus with stations A, B, C, D, E, in this logical order Assume station C is leaving the ring
![Page 18: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/18.jpg)
Voluntary leaving
C waits until it gets the token (from B) C sends a set-successor frame to B, identifying D as
the future successor of B B updates its record with the above C sends token to D C leaves the ring
![Page 19: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/19.jpg)
Unexpected leaving B sends token to C and listens for activity on bus
If C is functioning, it sends data/token on the bus and B hears about it, so nothing more happens
If C is not functioning, B hears nothing and then waits a preset amount of time (response window time)
If nothing happens B sends token again, to be sure there is no transmission problem
If after the 2nd response window still nothing happens, B assumes C does not function and sends a who-follows frame with C address in it
D replies with a set-successor frame specifying itself as B’s future successor
B changes its record to the above B sends token to D
![Page 20: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/20.jpg)
Adding stations Stations in the ring provide opportunities for
stations needing to join the ring Periodical testing
A station cannot add itself to the ring Waits for invitation
Two cases 1. The address of joining station within the range of
ring station addresses 2. The address of joining station outside the range
of ring station addresses
![Page 21: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/21.jpg)
Case 1 A token-holding station Sends invitation: solicit-successor-1 frame, with its
address and its successor’s Creates a response window of twice the propagation
delay A station with address in specified range answers
with a set-successor frame If token-holding station gets no answer during the
window, it closes it and sends token to its successor
![Page 22: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/22.jpg)
Case 1 (2) If token-holding station gets an answer (set-
successor frame) during the window Changes its successor to answering station Sends token to the newly added station
The newly added station Sets predecessor and successor accordingly Becomes part of the ring
![Page 23: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/23.jpg)
Case 1 (3) If there are more than one answer => there is a
collision Token-holding station sends a resolve-contention frame Waits for answer for 4 response window times
Each answering station replies in one of the 4 response windows, according to their first 2 address bits
Implicit priority given to 00-stations
![Page 24: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/24.jpg)
Response to resolve-contention frame
First two bits in address
Responding window Waiting time
00 1 None
01 2 One response window time
10 3 Two response windows time
11 4 Three response windows time
![Page 25: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/25.jpg)
Case 1 (4) When two/more stations with same first 2 bits
answer in the same response window then there is collision again
Inviting station sends resolve-contention frame again Only the colliding stations answer based on their
second two address bits Step above repeated until there is one station
succeeding to transmit
![Page 26: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/26.jpg)
Case 2
Station-to-join waits invitation from station with lowest address
When station with lowest address gets token Sends solicit-successor-2 frame with its address and the
largest address in ring Station with address smaller than the lowest or bigger
than the highest answers Next steps as in case 1
![Page 27: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/27.jpg)
Token recovery In what case can there be no token? When ring is first set up When token-holding station fails When a token is corrupted in transit and discarded
by receiving station A new token has to be generated and put in the
ring
![Page 28: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/28.jpg)
Token recovery procedure Every station has a token-recovery timer When this timer expires and there is no activity in
the bus, a station knows there is no token in the network
A station detecting this sends a claim-token frame Indicates that station is willing to generate a new
token
![Page 29: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/29.jpg)
Token recovery procedure 2 When more than one timer expires at the same
time All corresponding stations are token-claimants A collision of their claim-token frames occurs
To solve collision Each station pads the data field of the claim-token
frame with 0/2/4/6 × time slot, depending on the first 2 address bits
![Page 30: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/30.jpg)
Claim-token frame padding
First two bits Length
00 0
01 2 × time slot
10 4 × time slot
11 6 × time slot
![Page 31: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/31.jpg)
Token recovery procedure 3 All stations sending padded claim-token frames
continue listening to the bus If a station senses a frame longer than its own, it
gives up the claim The station sending the longest frame regenerates
token If collision again, procedure repeated based on
second two bits, and third two bits, etc Implicit priority given to 11-stations
![Page 32: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/32.jpg)
Removing duplicate tokens If a token-holding station detects activity in the
bus It knows that other station holds the a token too It drops its token and moves to listening state
![Page 33: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/33.jpg)
Ring initialization At startup, each station knows its own address
only and is connected to the bus It can receive broadcast messages It does not know a predecessor / successor There is no token in the ring
Token-recovery and adding-station procedures are combined
![Page 34: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/34.jpg)
Ring initialization steps New token generated using the token-recovery
procedure The winning station becomes the token-holder The ring is thus formed with one station
The token-holder adds stations to ring using the usual procedure For adding a 2nd station to ring, token-holder defines itself
as both predecessor and successor (case 2)
![Page 35: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/35.jpg)
Token bus layers
![Page 36: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/36.jpg)
MAC sublayer
Access method token passing over a bus topology, as discussed
![Page 37: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/37.jpg)
MAC frame fields Preamble: 1/more bytes of a predefined pattern,
used for synchronizing sender and receiver Added by the physical layer
Start delimiter (SD): 1 byte, serves as a flag to alert the receiver to a frame arrival The N bits stand for non-regular encoding of binary 1 This encoding performed by PhL => implementation
dependent Data field transparency ensured
![Page 38: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/38.jpg)
MAC frame fields 2 Frame control (FC): 1 byte, defines frame type
![Page 39: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/39.jpg)
MAC frame fields 3 Destination address (DA): 2-6 bytes, the physical
address of frame’s next destination Frame Destination address
Claim-token Ignored
Solicit-successor-1 Ignored
Solicit-successor-2 Ignored
Who-follows Ignored
Resolve-contention Ignored
Token Address of successor
Set-successor Address of station that sent solicit-successor frame or of predecessor
Data Address of data recipient
![Page 40: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/40.jpg)
MAC frame fields 4 Source address (SA): 2-6 bytes, the physical
address of sending station Present in all frame types
Data: 0 - 8190 bytes For a data frame: data coming from LLC layer For a control frame: some extra information
![Page 41: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/41.jpg)
Data field contents Frame Data
Claim-token Length of frame
Solicit-successor-1 Address of successor
Solicit-successor-2 Address of successor
Who-follows The address of not-responding successor
Resolve-contention Missing
Token Missing
Set-successor New address of successor
Data Data coming from LLC layer
![Page 42: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/42.jpg)
MAC frame fields 5 Frame check sequence (FCS): 4 bytes, a CRC-32
error detecting sequence End delimiter (ED): 1 byte, serves as a flag to alert
receiver to a frame termination The N bits stand for non-regular encoding of binary 0 This encoding performed by PhL => implementation
dependent Data field transparency ensured Last bit can be used to show if there are more frames to
send
![Page 43: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/43.jpg)
Physical layer
![Page 44: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/44.jpg)
Carrier band, phase continuous Based on carrier band modulation Analog modulation Uses the whole medium capacity No multiplexing
Signaling Data first encoded with Manchester encoding Manchester encoding then modulated with FSK 2 frequencies, a high (H) and a low (L) one Specific modulation technique: 0 bit as HL, 1 bit as LH
![Page 45: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/45.jpg)
Encoding and signaling for CBPCont
![Page 46: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/46.jpg)
Carrier band, phase continuous 2 Transparency Refers to how the SD and ED fields represent their N bits Also refers to padding representation Achieved through a use of L and H frequencies that are not
used in data N bits are modulated in pairs (NN) Use LLHH
Padding: HHLL
![Page 47: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/47.jpg)
Carrier band, phase continuous 3 Parameter Value
Encoding Manchester
Modulation FSK (3.75, 6.25 Mhz)
Data rate 1Mbps
Topology Bidirectional bus
Medium Coaxial cable
Medium interface T connector and drop cable up to 35 cm in length
![Page 48: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/48.jpg)
Carrier band, phase coherent Based on carrier band modulation Analog modulation Uses the whole medium capacity No multiplexing
Signaling Data first encoded with Manchester encoding Manchester encoding then modulated with FSK 2 frequencies, a high (H) and a low (L) one L = data rate, H = 2 × data rate 0 bit as H, 1 bit as L
![Page 49: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/49.jpg)
Encoding and signaling for CBPCoh
![Page 50: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/50.jpg)
Carrier band, phase coherent 2 Transparency Refers to how the SD and ED fields represent their N
bits N bits are modulated in pairs (NN) Half-period of H One period of L Half-period of H
![Page 51: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/51.jpg)
Carrier band, phase coherent 3 Parameter Value
Encoding Manchester
Modulation FSK (5/10, 10/20 Mhz)
Data rate 5 or 10 Mbps
Topology Bidirectional bus
Medium Coaxial cable
Medium interface Taps and drop cable up to 300 m in length
![Page 52: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/52.jpg)
Broadband Specifies a broadband transmission With multiplexing
Signaling Data first encoded with multilevel duobinary 3 levels: 0, 2, 4 0 bit encoded as signal value 0, 1 bit encoded as signal level 4
Encoded data then modulated with a combination of ASK/PSK
![Page 53: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/53.jpg)
Encoding and signaling for Broadband
![Page 54: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/54.jpg)
Broadband 2 Transparency Refers to how the SD and ED fields represent their N
bits N bits use the third level (2)
![Page 55: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/55.jpg)
Broadband 3 Parameter Value
Encoding Multilevel duobinary
Modulation ASK / PSK
Data rate 1, 5 or 10 Mbps
Topology Unidirectional bus, with frequency converter / dual bus
Medium Coaxial cable
Medium interface Taps and drop cable
![Page 56: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/56.jpg)
Optical fiber
Specifies a broadband transmission With multiplexing
Signaling Data first encoded with Manchester encoding Manchester encoding then modulated with ASK 1 bit as a high amplitude 0 bit as a zero amplitude
![Page 57: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/57.jpg)
Encoding and signaling for Optical fiber
![Page 58: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/58.jpg)
Optical fiber 2 Transparency Refers to how the SD and ED fields represent their N
bits N bits use another amplitude level
![Page 59: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/59.jpg)
Optical fiber 3 Parameter Value
Encoding Manchester
Modulation ASK (on/off)
Data rate 5, 10, or 20 Mbps
Topology Star
Medium Optical fiber
Bandwidth 10, 20, or 40 MHz
![Page 60: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/60.jpg)
Distributed queue, dual bus (DQDB)
Designed to be used in MANs Each station connected to two (unidirectional)
backbone links Access method: distributed queues
![Page 61: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/61.jpg)
Token Ring
![Page 62: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/62.jpg)
Token ring motivation Medium access mechanism of Ethernet (CSMA/CD)
may result in collisions Data may be sent multiple times before transmission
makes it to the link Unpredictable delays Especially if traffic is heavy
Unpredictable occurrence of collisions Token ring designed to solve the above
unpredictability
![Page 63: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/63.jpg)
Token ring IEEE 802.5 Standard sustained by IBM Published in 1989, reviewed in 1991, 1998, 2000,
2001 Still in use at some IBM sites, virtually nowhere else Work progressing on a GB version (802.5v)
Uses a token passing access method
![Page 64: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/64.jpg)
Basic idea Stations take turns in sending data Turns are regulated by a token placeholder frame that passes from station to
station Created and regenerated by a monitor station
When a station has the token and data to send, it attaches the data to the token One station sends only one data frame at a time
![Page 65: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/65.jpg)
Token passing illustration 1
![Page 66: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/66.jpg)
Token passing illustration 2
![Page 67: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/67.jpg)
Token passing illustration 3
![Page 68: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/68.jpg)
Token passing illustration 4
![Page 69: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/69.jpg)
Token passing steps 1. When network unoccupied, a 3-byte token circulates from station to
station 2. Token is captured by the first station with data to send 3. Station keeps token and sends a data frame 4. Data frame proceeds in the ring, being regenerated at each station 5. Intermediate stations examine the destination address and relay frame 6. The recipient recognizes its address, copies the message, checks for
errors and changes 4 bits in last byte of frame This indicates address recognized and frame copied
7. Frame then continues to the sender 1. Sender recognizes itself in the source address 2. Sender releases token into the ring 3. Sender examines the modified bits and if those are set it discards the data
frame. If not, data should be resent in the next token capture
![Page 70: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/70.jpg)
Token ring layers
![Page 71: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/71.jpg)
MAC sublayer Responsible for Token passing Reservation operations Creation and delivery of frames to physical layer
Three frame types Data frame Token frame Abort frame
![Page 72: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/72.jpg)
Data frame The only frame that Carries a PDU Is addressed to a specific destination
![Page 73: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/73.jpg)
Data frame fields Start delimiter (SD): 1 byte, alerts the receiver to a frame
arrival, allows for synchronization The J, K bits stand for non-regular encoding of binary 1
J: both differential Manchester encoding transitions are cancelled K: middle differential Manchester encoding transition is cancelled
This encoding performed by PhL => implementation dependent Data field transparency ensured
![Page 74: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/74.jpg)
Data frame fields 2 Access control (AC): 1 byte priority subfield: 3 bits token bit subfield: when set, says this is a data frame monitor bit subfield reservation subfield: set by stations wishing the token
![Page 75: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/75.jpg)
Data frame fields 3 Frame control (FC): 1 byte type bit subfield: control or data PDU special info subfield: 7 bits, info used by token ring
logic E.g., how to use the AC field info
![Page 76: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/76.jpg)
Data frame fields 4 Destination address (DA): 6 bytes, physical
address of frame’s destination Source address (SA): 6 bytes, physical address
of frame’s source Data: 0 - 4500 bytes, contains the PDU PDU length/type not included
CRC: 4 bytes, CRC-32 error detecting sequence
![Page 77: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/77.jpg)
Data frame fields 5 End delimiter (ED): 1
byte, indicates the end of sender’s data and control info PhL handles it Transparency
ensured with the J,K violations
Frame status (FS): 1 byte, set by receiver when frame was read and by the monitor when frame has been around the ring
![Page 78: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/78.jpg)
Token frame Token: placeholder and reservation field Token frame: SD, AC, ED fields AC indicates that the frame is a token AC includes the priority and reservation fields
![Page 79: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/79.jpg)
Abort frame Carries no information at all, only SD and ED Can be generated by Sender: to stop its own transmission Monitor: to purge an old transmission from the network
![Page 80: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/80.jpg)
Addressing Each data frame carries two addresses Source address and destination address 2 or 6 bytes
Addresses can be local/global Destination address can be Unicast: first bit of first byte is 0 Multicast or broadcast: first bit of first byte is 1 Broadcast: all address bits are 1
![Page 81: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/81.jpg)
Physical layer Bit and byte ordering Byte ordering: like in Ethernet Bit ordering: first bit of first byte first
Implementation: series of STP (shielded twisted pairs) sections linking stations to their neighbors
![Page 82: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/82.jpg)
Switch Without switches disabled/disconnected nodes can stop the traffic
flow With switches Each station connected to automatic switch Switch can bypass an inactive station Station disabled: switch closes the ring without it Station comes in: NIC signals the switch and station is
brought back to the ring
![Page 83: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/83.jpg)
Switch illustration
![Page 84: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/84.jpg)
Multi-station access unit (MAU) Individual switches are combined into a hub
called MAU MAU can support up to 8 stations
![Page 85: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/85.jpg)
Combining MAUs
![Page 86: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/86.jpg)
Other issues Coding: differential Manchester Special code violations for some signal sequences
Cabling: UTP/STP UTP has data rate of 4 Mbps STP has data rate of 4 to 16 Mbps
Stations With STP: up to 250, with UTP: up to 72
![Page 87: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/87.jpg)
Ring management Damaged frame By noise Destination station informs sender of the error Sender station should retransmit the frame
Errant (orphan) frame Frame that repeatedly circulates the ring Occurs when sender station crashes before frame
comes back Solved by the monitor station It sets the monitor bit in AC field to 1 the first round When (in a subsequent round) it finds a frame with monitor
bit 1, it drains that frame
![Page 88: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/88.jpg)
Ring management 2 No frame/token When a station receives a frame and crashes
before forwarding it / generating a new one Solved by monitor station Monitor has timer When a frame passes the monitor, timer is set When timer expires with no frame back to monitor, this one
creates a new token
![Page 89: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/89.jpg)
Priority and reservation levels Optional priority mechanism defined in 802.5 Allows the overriding of the equal opportunity right Allows different priority levels to station => stations
with higher priority get access to token earlier Stations with high priority get data in real time When (almost) all stations involved, no real time
![Page 90: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/90.jpg)
3 levels Station priority level (StPr): 0 – 7 Defined by network manager, is part of station
Current priority level (CurPr) at any moment, the ring operates at one specific
priority level, named CurPr Current reservation level (CurRv) Value of last reservation made by a station
![Page 91: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/91.jpg)
Current reservation level - more When a frame circulates, station with data to
send can make a reservation If StPr > CurRv Different strategies if frame is data/token
Hence, a station can override a reservation made by a station with lower StPr
![Page 92: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/92.jpg)
Implementing priorities
Data frame sent by another station arrives
2nd condition: StPr > CurRv Λ StPr ≠ CurPr
![Page 93: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/93.jpg)
Implementing priorities 2
Data frame originated by station arrives
![Page 94: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/94.jpg)
Implementing priorities 3
Token frame arrives
If this is the responsible station, then LOWER priority (not raise)
$1 -> ≥ $2 -> >
![Page 95: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/95.jpg)
Other procedures in the reservation process
Making a reservation CurRv := StPr, in AC field of received frame
Resetting CurRv CurRv := 0
Sending a data/token frame
![Page 96: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/96.jpg)
Raising CurPr Responsible station Keeps track of 2 levels, the
old CurPr and the present CurPr
Uses 2 stacks for this
![Page 97: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/97.jpg)
Lowering CurPr
Only by the responsible station
An extra step 2 missing: CurRv := 0
![Page 98: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/98.jpg)
Example A has 2 data frames to send to C B has 2 data frames to send to A C has one data frame to send to D Token is first captured by A, when CurPr=1 and
CurRv=0.
![Page 99: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/99.jpg)
Exp cont 1) A captures token and sends data to C (can do it, since its priority (2) is bigger
than CurPr) CurPr=1, CurRv=0 2) B forwards data frame and makes reservation (its priority bigger than CurRv) CurPr=1, CurRv=4 3) C copies data, sets frame (those 4 bits) and forwards data frame (cannot make
reservation, since its priority is smaller than CurRv) CurPr=1, CurRv=4 4) D forwards data frame CurPr=1, CurRv=4 5) A gets its frame back, drains it, then modifies CurPr to 4, CurRv to 0 (and so
becomes responsible station: OldPrSt is 1, CrtPrSt=4); it then releases token CurPr=4, CurRv=0 6) B captures token and sends data to A CurPr=4, CurRv=0 7) C forwards data frame and makes reservation (its priority bigger than CurRv) CurPr=4, CurRv=3
![Page 100: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/100.jpg)
Exp cont 8) D forwards data frame CurPr=4, CurRv=3 9) A copies data, sets frame and forwards it; cannot make reservation CurPr=4, CurRv=3 10) B gets its frame back, drains it, releases the token CurPr=4, CurRv=3 11) C forwards token CurPr=4, CurRv=3 12) D forwards token CurPr=4, CurRv=3 13) A gets token and is responsible station so it lowers the priority, CurPr
:= 3 (=max(OldPrSt, CurRv)), CurRv:=0; OldPrSt is 1, CrtPrSt=4, 3 CurPr=3, CurRv=0 14) B gets token and sends data to A (can do it, since its priority (4) is
bigger than CurPr) CurPr=3, CurRv=0
![Page 101: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/101.jpg)
Exp cont 15) C does not need reservation (only a free token) so it forwards data frame CurPr=3, CurRv=0 16) D forwards data frame CurPr=3, CurRv=0 17) A copies data, sets frame and forwards it; and makes reservation CurPr=3, CurRv=2 18) B gets its frame back, drains it, releases the token CurPr=3, CurRv=2 19) C captures token and sends data to D CurPr=3, CurRv=2 20) D copies data, sets frame and forwards it CurPr=3, CurRv=2 21) A forwards data frame CurPr=3, CurRv=2 22) B forwards data frame CurPr=3, CurRv=2
![Page 102: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/102.jpg)
Exp cont 23) C gets its frame back, drains it, releases the token CurPr=3, CurRv=2 24) D forwards token CurPr=3, CurRv=2 25) A responsible to lower priority: CurPr:=2 (=max(OldPrSt, CurRv)),
CurRv:= 0; A sends data to C; OldPrSt is 1, CrtPrSt=4, 3, 2 CurPr=2, CurRv=0 26) B forwards data frame CurPr=2, CurRv=0 27) C copies data, sets frame, forwards it CurPr=2, CurRv=0 28) D forwards it CurPr=2, CurRv=0 29) A gets its frame back and drains it; it’s responsible so it sets CurPr :=
1, CurRv:= 0, and pops both stacks, no longer responsible CurPr=1, CurRv=0
![Page 103: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/103.jpg)
Token ring requirements To be used in commercial and light industrial
environments There is a somewhat large installed base,
especially with IBM-affiliated organizations Not as popular as Ethernet More complex Eventually Ethernet caught up in terms of speed
![Page 104: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/104.jpg)
FDDI Fiber distributed data interface 100 Mbps token ring LAN/MAN specification Introduced before Fast Ethernet Never made it to the desktop, used as backbone
network A standard on its way out Copper version abbreviated CDDI
![Page 105: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/105.jpg)
ATM LAN
![Page 106: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/106.jpg)
ATM LANs ATM: asynchronous transfer mode Cell relay protocol designed by ATM forum, adopted
by ITU-T Mainly a WAN Technology can be adapted to LANs
Plan We first discuss ATM technology We then study how the above applies to LANs
![Page 107: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/107.jpg)
ATM Introduced in the early 90s, very advertised In current use WAN links inside telephone networks Broadband access lines such as DSL
Designed to Optimize the use of high-rate transmission media Provide an interface with existing systems Move functions from software to hardware domain
![Page 108: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/108.jpg)
Problems with existing systems Packet networks Packet: overhead bits + data Various/variable sizes and intricacies of packets Packets of 65545 bytes coexist with packets of 200
bytes Consequence Unpredictable traffic Devices have elaborate software to manage
packets Internetworking among different packet networks is
slow + expensive at best, impossible at worst
![Page 109: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/109.jpg)
Cell networks Cell Small data unit of fixed size Basic unit of data exchange
Advantages Cell routing done in hardware (=> fast) Hardware can be set up to handle broadcast Small cells do not block lines for long => quality of
service Cells appear as delivered continuously and in order
=> real-time transmission
![Page 110: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/110.jpg)
An ATM cell
![Page 111: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/111.jpg)
Switches ATM is a cell-switched network End points: user access devices Switches UNI: user network interface Connects end points to switches
NNI: network-to-network interface Connects the switches
![Page 112: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/112.jpg)
Virtual circuits ATM networks are connection-oriented Sending a data requires sending 1st a packet to set
up the connection Connections = virtual circuits In analogy to physical circuits used in telephone systems Have unique identifiers
Permanent virtual circuits allowed in ATM networks Similar to leased lines of telephones
![Page 113: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/113.jpg)
A virtual circuit
![Page 114: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/114.jpg)
Elements of a virtual connection Transmission paths (TP) Physical connection between switches or a switch
and an end point Intuitively: set of all highways between 2 cities
Virtual paths (VP) Provides a connection/set of connections between
switches Intuitively: one highway connecting 2 cities
Virtual circuits (VC) Basis of cell networks Relays all cells of a message, in order Intuitively: highway lane
![Page 115: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/115.jpg)
TP, VP, VC
![Page 116: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/116.jpg)
Identifiers Virtual connection defined by a pair of IDs A virtual path identifier (VPI) A virtual circuit identifier (VCI)
For UNI interface VPI is 8 bits, VCI 16 bits
For NNI interface VPI is 12 bits, VCI 16 bits
![Page 117: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/117.jpg)
Routing Switches route the cells between the end points 2 types of switches (for efficiency) VP switches VPC switches
Allow for hierarchical routing Mostly VP switches (use only VPI for routing) Switches interacting with end points: VPC
![Page 118: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/118.jpg)
ATM reference model
![Page 119: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/119.jpg)
ATM layers usage End points Use all three levels
Switches Use only the 2 bottom layers
![Page 120: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/120.jpg)
ATM layers usage illustration
![Page 121: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/121.jpg)
Physical layer Defines: transmission medium, voltages, bit
transmission, encoding, electrical-to- optical transformation
Not a particular set of rules ATM cells could be sent by themselves or packaged
inside the payload of other carriers => ATM independent of the transmission medium
![Page 122: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/122.jpg)
ATM layer Deals with cells and transport Layout of cells Management of connections and traffic Routing Congestion control
Accepts 48-byte segments from AAL (application adaptation layer), adds header (5 bytes) and produces the cells (53 bytes)
![Page 123: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/123.jpg)
Application Adaptation Layer (AAL) Most applications do not want to work directly
with cells AAL allows users to send packets larger than a
cell
![Page 124: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/124.jpg)
High data rate in ATM 155 and 622 Mbps, higher speeds also supported 155 Mbps: what is needed for high-definition TV 622 Mbps: four 155 Mbps channels Attractive speed to be used in a LAN
![Page 125: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/125.jpg)
Other ATM advantages for a LAN ATM technology supports different types of
connections between end users Permanent and temporary connections
ATM technology supports multimedia communication Variety of bandwidths for different applications Guarantees a bandwidth of several Mbps for real-
time video Easily adaptable for expansion
![Page 126: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/126.jpg)
ATM LAN architecture
![Page 127: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/127.jpg)
Pure ATM Architecture ATM switch connects stations of a LAN Like in Ethernet
Stations Can communicate at 155/622 Mbps Use VPI and VCI instead of source/destination address
Drawback System has to be built from scratch Existing LANs cannot be upgraded into pure ATM LANs
![Page 128: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/128.jpg)
Pure ATM
![Page 129: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/129.jpg)
Legacy LAN architecture ATM technology is used as a backbone to
connect traditional LANs Stations on the same LAN can use format and
data rate of their own LAN Stations on different LANs use a converter to
change the frame format Output from several LANs can be multiplexed to
create a high data rate input to ATM switch
![Page 130: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/130.jpg)
Legacy LAN
![Page 131: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/131.jpg)
Mixed architecture Best solution: mix the pure and the legacy Existing LANs are kept New stations can be connected directly to the ATM switch Gradual migration of legacy LANs onto ATM LANs
Question How stations in traditional Ethernet communicate with
stations directly connected to the switch (or vice versa)
![Page 132: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/132.jpg)
Mixed architecture ATM LAN
![Page 133: Special Course in Computer Science: Local Networksusers.abo.fi/lpetre/localnet12/lecture6.pdf · If nothing happens B sends token again, to be sure there is no transmission problem](https://reader034.fdocuments.in/reader034/viewer/2022042104/5e81cecfbe700511e177045a/html5/thumbnails/133.jpg)
We continue ATM LANs next time!