Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1



Similar documents
Ring Local Area Network. Ring LANs

Controlled Random Access Methods

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Fiber Distributed Data Interface

How To Encode Data From A Signal To A Signal (Wired) To A Bitcode (Wired Or Coaxial)

How To Communicate With A Token Ring Network (Dihon)

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Data Link Layer. Page 1. Ethernet

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Real-Time (Paradigms) (51)

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

BROADBAND AND HIGH SPEED NETWORKS

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Based on Computer Networking, 4 th Edition by Kurose and Ross

Lecture 3: Signaling and Clock Recovery. CSE 123: Computer Networks Stefan Savage

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Introduction to Ethernet

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

Network Topologies. Network Topologies

Network Categories. Network Types for the Local Range. Ethernet

Introduction to Optical Networks

LAN / WAN Technologies

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Analog vs. Digital Transmission


Introduction, Rate and Latency

11/22/

DigiPoints Volume 1. Student Workbook. Module 4 Bandwidth Management

Computer Networks. By Hardeep Singh

Switch Fabric Implementation Using Shared Memory

Network Design. Yiannos Mylonas

Process Control and Automation using Modbus Protocol

Introduction To Computer Networks

Algorithms for Interference Sensing in Optical CDMA Networks

Ethernet/IEEE evolution

8B/10B Coding 64B/66B Coding

RFC 2544 Testing of Ethernet Services in Telecom Networks

FIBER OPTIC APPLICATION IN A PROFIBUS NETWORK

DATA COMMUNICATION AND NETWORKS

INTRODUCTION TO 100BASE-T: FAST (AND FASTER) ETHERNET

Gigabit Ethernet: Architectural Design and Issues

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Level 2 Routing: LAN Bridges and Switches

Sol: Optical range from λ 1 to λ 1 +Δλ contains bandwidth

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Implementing Fast Ethernet

Making Ethernet Over SONET Fit a Transport Network Operations Model

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Latency on a Switched Ethernet Network

CS263: Wireless Communications and Sensor Networks

Cisco Network Performance Evaluation Using Packet Tracer

SFWR 4C03: Computer Networks & Computer Security Jan 3-7, Lecturer: Kartik Krishnan Lecture 1-3

(Refer Slide Time: 2:10)

What You Will Learn About. Computers Are Your Future. Chapter 8. Networks: Communicating and Sharing Resources. Network Fundamentals

A network is a group of devices (Nodes) connected by media links. A node can be a computer, printer or any other device capable of sending and

Data Communications & Networks. Session 3 Main Theme Data Encoding and Transmission. Dr. Jean-Claude Franchitti

Assessment of Traffic Prioritization in Switched Local Area Networks Carrying Multimedia Traffic

IT4405 Computer Networks (Compulsory)

Using High Availability Technologies Lesson 12

The Telephone Network. An Engineering Approach to Computer Networking

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

Communication Networks. MAP-TELE 2011/12 José Ruela

ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1

RTT 60.5 msec receiver window size: 32 KB

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Computer Networks Vs. Distributed Systems

Communications and Computer Networks

Candidates should attempt FOUR questions. All questions carry 25 marks.

FOUNDATION Fieldbus High Speed Ethernet Control System

Course 12 Synchronous transmission multiplexing systems used in digital telephone networks

WAN Data Link Protocols

Protocol Overhead in IP/ATM Networks

Telecommunications, Networks, and Wireless Computing

Mathatma Gandhi University

CHAPTER 8 MULTIPLEXING

LAN Switching Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, , PPP. Interconnecting LANs

Fundamentals of Telecommunications

Note monitors controlled by analog signals CRT monitors are controlled by analog voltage. i. e. the level of analog signal delivered through the

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

Contents. Connection Guide. What is Dante? Connections Network Set Up System Examples Copyright 2015 ROLAND CORPORATION

FIBER OPTIC COMMUNICATIONS. Optical Fibers

MANAGEMENT INFORMATION SYSTEMS 8/E

EPL 657 Wireless Networks

EECC694 - Shaaban. Transmission Channel

EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

ATM. Asynchronous Transfer Mode. Networks: ATM 1

Multiplexing on Wireline Telephone Systems

2.0 System Description

Token-ring local area network management

The WestNet Advantage: -- Textbooks, ebooks, ecourses -- Instructor Resourse Center -- Student Resource Center

LLC: Frame Construction. Layer 2: Division into two Parts. Error-detecting and -correcting Codes. Error-correcting Codes

Transcription:

Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations connected by transmission links in a ring topology. Information flows in one direction along the ring from source to destination and back to source. Medium access control is provided by a small frame, the token, that circulates around the ring when all stations are idle. Only the station possessing the token is allowed to transmit at any given time. Networks: Token Ring and FDDI 2

Token Ring Operation When a station wishes to transmit, it must wait for token to pass by and seize the token. One approach: change one bit in token which transforms it into a start-of-frame sequence and appends frame for transmission. Second approach: station claims token by removing it from the ring. Frame circles the ring and is removed by the transmitting station. Each station interrogates passing frame, if destined for station, it copies the frame into local buffer. {Normally, there is a one bit delay as the frame passes through a station.} Networks: Token Ring and FDDI 3

Token Ring Network with star topology A Wiring center E B C D Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.58 Networks: Token Ring and FDDI 4

Re-inserting token on the ring Choices: 1. After station has completed transmission of the frame. 2. After leading edge of transmitted frame has returned to the sending station. The essential issue is whether more than one frame is allowed on the ring at the same time. Networks: Token Ring and FDDI 5

(a) Low Latency Ring A A A A t=0, A begins frame (b) High Latency Ring t=90, return of first bit t=400, transmit last bit t=490, reinsert token A A A A t=0, A begins frame t=400, last bit of frame enters ring t=840, return of first t=1240, reinsert bit token Networks: Token Ring and FDDI 6 Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.59

(a) Low Latency Ring A A A A t=0, A begins frame (b) High Latency Ring t=90, return of first bit t=210, return of header t=400, last bit enters ring, reinsert token A A A A t=0, A begins frame t=400, transmit last bit Copyright 2000 The McGraw Hill Companies t=840, arrival first frame bit t=960, reinsert token Networks: Token Ring and FDDI 7 Leon-Garcia & Widjaja: Communication Networks Figure 6.60

IEEE 802.5 Token Ring 4 and 16 Mbps using twisted-pair cabling with differential Manchester line encoding. Maximum number of stations is 250. Waits for last byte of frame to arrive before reinserting token on ring {new token after received}. 8 priority levels provided via two 3-bit fields (priority and reservation) in data and token frames. Permits 16-bit and 48-bit addresses (same as 802.3). Networks: Token Ring and FDDI 8

Token Ring Under light load delay is added due to waiting for the token {on average delay is one half ring propagation time}. Under heavy load ring is round-robin. Performance is fairer and better than Ethernet!! The ring must be long enough to hold the complete token. Advantages fair access Disadvantages ring is single point of failure, ring maintenance is complex due to token malfunctions. Networks: Token Ring and FDDI 9

Token Maintenance Issues What can go wrong? Loss of token (no token circulating) Duplication of token (forgeries or mistakes)!the need to designate one station as the active ring monitor. Persistently circulating frame Deal with active monitor going down. Networks: Token Ring and FDDI 10

IEEE 802.5 Token and data frame structure Token Frame Format SD AC ED Data Frame Format 1 1 1 2 or 6 2 or 6 4 1 Destination Source SD AC FC Information FCS Address Address ED 1 FS Starting delimiter J K 0 J K 0 0 0 J, K non-data symbols (line code) Access control P P P T M R R R PPP Priority; T Token bit M Monitor bit; RRR Reservation Frame control Ending delimiter F F Z Z Z Z Z Z J K 1 J K 1 I E FF frame type ZZZZZZ control bit I intermediate-frame bit E error-detection bit Frame status A C x x A C x x Copyright 2000 The McGraw Hill Companies A address-recognized bit xx undefined C frame-copied bit Networks: Token Ring and FDDI 11 Leon-Garcia & Widjaja: Communication Networks Figure 6.61

Fiber Distributed Data Interface (FDDI) FDDI uses a ring topology of multimode or single mode optical fiber transmission links operating at 100 Mbps to span up to 200 kms and permits up to 500 stations. Employs dual counter-rotating rings. 16 and 48-bit addresses are allowed. In FDDI, token is absorbed by station and released as soon as it completes the frame transmission {release token after transmission}. Networks: Token Ring and FDDI 12

FDDI Dual Token Ring A B E C D Networks: Token Ring and FDDI 13 Copyright 2000 The McGraw Hill Companies Leon-Garcia & Widjaja: Communication Networks Figure 6.62

FDDI Repair Networks: Token Ring and FDDI 14

FDDI Ring Operation Networks: Token Ring and FDDI 15

FDDI To accommodate a mixture of stream and bursty traffic, FDDI is designed to handle two types of traffic: Synchronous frames that typically have tighter delay requirements (e.g., voice and video) Asynchronous frames have greater delay tolerances (e.g., data traffic) FDDI uses TTRT (Target Token Rotation Time) to ensure that token rotation time is less than some value. Networks: Token Ring and FDDI 16

FDDI Data Encoding Cannot use differential Manchester because 100 Mbps FDDI would require 200 Mbaud! Instead each ring interface has its own local clock. Outgoing data is transmitted using this clock. Incoming data is received using a clock that is frequency and phase locked to the transitions in the incoming bit stream. Networks: Token Ring and FDDI 17

FDDI Data Encoding Data is encoded using a 4B/5B encoder. For each four bits of data transmitted, a corresponding 5- bit codeword is generated by the encoder. There is a maximum of two consecutive zero bits in each symbol. The symbols are then shifted out through a NRZI encoder which produces a signal transition whenever a 1 bit is being transmitted and no transition when a 0 bit is transmitted! guarantees a signal transition at least every two bits. Local clock is 125MHz. This yields 100 Mbps (80% due to 4B/5B). Networks: Token Ring and FDDI 18

FDDI Networks: Token Ring and FDDI 19

Networks: Token Ring and FDDI 20

FDDI frame structure Token Frame Format PRE SD FC ED Data Frame Format 8 1 1 2 or 6 2 or 6 4 1 Destination Source PRE SD FC Information FCS Address Address ED Preamble 1 FS Frame Control CLFFZZZZ C = Synch/Asynch L = Address length (16 or 48 bits) FF = LLC/MAC control/reserved frame type Leon-Garcia & Widjaja: Communication Networks Figure 6.63 Networks: Token Ring and FDDI 21

More FDDI Details Transmission on optical fiber requires ASK The simplest case: coding is done via the absence or presence of a carrier signal {Intensity Modulation}. Specific 5-bit codeword patterns chosen to guarantee no more than three zeroes in a row to provide for adequate synchronization. 1300 nm wavelength specified. Dual rings (primary and secondary) transmit in opposite directions. Normally, second ring is idle and used for redundancy for automatic repair (self-healing). Networks: Token Ring and FDDI 22

Differences between 802.5 and FDDI Token Ring Shielded twisted pair 4, 16 Mbps No reliability specified Differential Manchester Centralized clock Priority and Reservation bits New token after receive FDDI Optical Fiber 100 Mbps Reliability specified (dual ring) 4B/5B encoding Distributed clocking Timed Token Rotation Time New token after transmit Networks: Token Ring and FDDI 23