How To Communicate With A Token Ring Network (Dihon)



Similar documents
Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Ring Local Area Network. Ring LANs

Data Link Layer. Page 1. Ethernet

Controlled Random Access Methods

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

LIN (Local Interconnect Network):

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl

Network Categories. Network Types for the Local Range. Ethernet

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Fiber Distributed Data Interface

TCOM 370 NOTES LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Based on Computer Networking, 4 th Edition by Kurose and Ross

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Network Topologies. Network Topologies

Infrastructure Components: Hub & Repeater. Network Infrastructure. Switch: Realization. Infrastructure Components: Switch

Data Link Protocols. TCP/IP Suite and OSI Reference Model

CSMA/CA. Information Networks p. 1

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

Communication Networks. MAP-TELE 2011/12 José Ruela

RTT 60.5 msec receiver window size: 32 KB

Sol: Optical range from λ 1 to λ 1 +Δλ contains bandwidth

2 Basic Concepts. Contents

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

BROADBAND AND HIGH SPEED NETWORKS

In-Vehicle Networking

Telecommunications, Networks, and Wireless Computing

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

TCOM 370 NOTES 99-6 VOICE DIGITIZATION AND VOICE/DATA INTEGRATION

Level 2 Routing: LAN Bridges and Switches

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Appendix D T1 Overview

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

CS263: Wireless Communications and Sensor Networks

Objectives. Lecture 4. How do computers communicate? How do computers communicate? Local asynchronous communication. How do computers communicate?

DigiPoints Volume 1. Student Workbook. Module 4 Bandwidth Management

RFC 2544 Testing of Ethernet Services in Telecom Networks

Ethernet, VLAN, Ethernet Carrier Grade

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

From Fieldbus to toreal Time Ethernet

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

How To Encode Data From A Signal To A Signal (Wired) To A Bitcode (Wired Or Coaxial)

What is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts

LOCAL INTERCONNECT NETWORK (LIN)

Chapter 7 Low-Speed Wireless Local Area Networks

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Introduction to Ethernet

Analog vs. Digital Transmission

Advanced features on Ethernet networks. Fulvio Risso Politecnico di Torino

Documentation. M-Bus 130-mbx

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN


T1 Networking Made Easy

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

Data Transmission via Modem. The Last Mile Problem. Modulation of Digital Signals. Modem Standards (CCITT)

Process Control and Automation using Modbus Protocol

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

Data Link Layer Overview

Telecommunications Switching Systems (TC-485) PRACTICAL WORKBOOK FOR ACADEMIC SESSION 2011 TELECOMMUNICATIONS SWITCHING SYSTEMS (TC-485) FOR BE (TC)

EECC694 - Shaaban. Transmission Channel

Overview of Computer Networks

Course 12 Synchronous transmission multiplexing systems used in digital telephone networks

WAN Data Link Protocols

AE64 TELECOMMUNICATION SWITCHING SYSTEMS

Computer Networks Vs. Distributed Systems

Network support for tele-education

R2. The word protocol is often used to describe diplomatic relations. How does Wikipedia describe diplomatic protocol?

Voice and Delivery Data Networks

Direct Link Networks. Introduction. Physical Properties. Lecture - Ethernet 1. Areas for Discussion. Ethernet (Section 2.6)

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Lecture 3: Signaling and Clock Recovery. CSE 123: Computer Networks Stefan Savage

Performance Evaluation of Wired and Wireless Local Area Networks

Notes Odom, Chapter 4 Flashcards Set:

By: Mohsen Aminifar Fall 2014

Data Communication Networks

Real-Time (Paradigms) (51)

Introduction to Computer

Introduction to RACE FUELS Hans-Christian von der Wense Munich, Germany

WHITE PAPER December, 2001

(Refer Slide Time: 2:10)

CS 5516 Computer Architecture Networks

Computer Networks. By Hardeep Singh

WAN. Introduction. Services used by WAN. Circuit Switched Services. Architecture of Switch Services

The Impact of QoS Changes towards Network Performance

EPL 657 Wireless Networks

How To Use A Network Over The Internet (Networking) With A Network (Netware) And A Network On A Computer (Network)

FOUNDATION Fieldbus High Speed Ethernet Control System

Computers Are Your Future Prentice-Hall, Inc.

Serial Communications

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

Transcription:

Token us Token -procedure: Only someone who possesses a certain ken (= bit sequence), may send. One example for a ken network: IEEE 80. Token us All stations should be treated equally, i.e. they have pass on the ken cyclically or this: logical ordering of all stations a ring In a bus pology, ordering is made regarding station addresses: 9 Usage e.g. as a field bus (eldbus in German) in industrial environments with a high degree of noise. Purpose: e.g. roboter control; a few masters, many slaves (they only listen). Data rate is not that important, but guarantees in response times are necessary. 5 6 7 Page Message Exchange in Token us Two types of messages are used: Token messages T ID, nextid ID Data messages M ID ID Data Token messages are used for passing on the sending permission station ID station nextid Data messages contain the data be sent Having the ken, a station is allowed send a message. After this (or if nothing is be sent) the ken is passed on. Traffic on the bus e.g.: T 5,7 M 7 T 7, M T, T, T,6 M 6 T 6,9 T 9,5 M 5 T 5,7 High overhead for ken exchange: 5 it times for each ken message (a full small size Ethernet frame)! In contrast that, in Token Ring networks only one bit is be switched 0, i.e. only one bit time for a ken message. Thus, the number of participating stations should be low, or the number of masters should be low, you can lerate very many slaves nextid Page Problems with Token us irst problem: a station leaves the logical ring Easy solution: the leaving station sends a message its predecessor indicating the new successor Second problem: a station comes in the logical ring To allow new stations join, in periodically intervals, a window is opened between neighbors, e.g. between 5 and 7. New stations with IDs 6 6 now can apply. Problem: conflict risk! Several stations could apply join in this window Conflict resolution: survival of the fittest. Consider last bits of the IDs: send a request join with a duration specified by the last bits of your ID: 00 send short 0 send longer 0 send even longer send longest If you hear anybody else sending longer than you, give up. If you survive without conflict, join. If there is no resolution (two or more stations are sending for the same time, no one is sending longer), repeat with the second-last bit pair, etc. Page Example Assume a global window. Competirs: 5 6 5 0000 00 00000 0000000 00000 0 00 00 00 Winner! In case of some configuration error, two identical IDs are present: after checking all pairs of the IDs, continue by adding random bit pairs. Page

Token Ring Token -procedure: Only someone who possesses a certain ken (= bit sequence), may send. based on standard IEEE 80.5 Token Ring the stations share a ring of point--point connections the ken is cyclically passed on particularly for rings suitably Token Ring (/6/00 Mbit/s) Characteristics: guaranteed access, no collisions very good utilization of the network capacity, high efficiency fair, guaranteed response times possible: multiple kens however: complex and expensive Passing on the ken Page 5 Token Ring Data Medium: twisted pair, coaxial cable or optical fiber Capacity of resp. 6 Mit/s (00Mb/s with optical fiber) Differential Manchester Code on layer The stations are actively attached, i.e. received signals are regenerated (same principle as for repeaters, therefore no restriction of the ring s expansion) Point--Point Connection Active connecr the ring the ring Page 6 Sending and Receiving Access within a Token Ring Initial state Data are received the ring serially Data addressed a connecr s station are copied Data are serially passed on along the ring Transmission state The ring is divided Own data are sent serially Data coming in the ring are evaluated by the station the ring the ring the ring the ring Example: sends station. waits for free ken (transmission authorization, -yte- Token).. changes free ken in an occupied one (occupied ken = frame header). Afterwards, station sends the frame. ( may send further frames, if the ken holding timer (default 0 ms) is not exceeded). terminates the frame and waits until the frame passed the whole ring and arrives again.. copies the frame. removes it the ring and produces a new, free ken. remove entfernen kopieren copy Page 7 Page 8

Access within a Multiple Token Ring rame ormat for Token Ring Same example: sends station If the ring is inactive, only the -yte-token (SD, AC, ED) circulates. If a station wants send, it sets a certain bit in this ken 0.. waits for free ken (transmission authorization).. changes free ken in an occupied one (occupied ken = frame header). Afterwards, sends the frame. ( may send further frames, if the ken holding timer (default 0 ms) is not exceeded). terminates the frame and produces a new, free ken immediately.. copies the frame. removes it the ring. remove entfernen kopieren copy ree ken, if a certain bit within AC is set. /6 /6 any DA SA Data CS rame End Delimiter Control (ED) (C) Access Control (AC) Start Delimiter (SD) End Delimiter (ED) rame Status SD and ED serve for marking the frame. They contain invalid sequences of the differential Manchester code. Access control contains the ken bit, further a monir bit, priority bits and reservation bits. rame control marks the kind of the frame: Data, control, yte Page 9 Page 0 rame ormat for Token Ring Ring Maintenance rame status contains confirmation bits A and C. If a frame arrives at the station with the destination address, bit A is set. If the station processes the frame, also bit C is set. When the sending station gets the frame back, it can see whether the receiving station is not working (A = 0, C = 0), if the frame was not accepted (A =, C = 0), or whether the frame was received correctly (A =, C = ). To protect against bit errors, both bits are doubly present. The addresses and the checksum are identical Ethernet. its of access control: Themonir bit serves for recognition of a second frame circulation Thepriority bits make possible several priorities. They indicate the priority of the ken. If a station wants send with priority n, it must wait for a ken of priority n or higher. Thereservation bits permit a station reserve the next frame for itself. If a station wants do this, it registers its priority in the reservation bits. This is only possible, if not already a higher priority is registered. During the next ken generation, the priority is copied in the priority bits. To check the correct function of the ring, a monir station is introduced. If this station crashes, another station is raised as monir station: if a station recognizes that the monir is inactive, this station sends a certain ken (CLAIM_TOKEN). This can be done by several stations simultaneously. If such a message arrives with a smaller ID then suppress it. If a message arrives with larger ID then pass it on. If a CLAIM_TOKEN message arrives with own ID: this station is the new monir. Tasks of the monir station: New generation of the ken after a ken loss Reaction ring collapse Removal of frame fragments Deletion of old, circulating frames or each problem an own ken is defined. Additionally if necessary also timers are used. Page Page

iber Distributed Data Interface (DDI) DDI is a high performance ken ring LAN based on optical fibers ANSI standard XT9.5 Data rates of 00 Mit/s Range of up 00 km (MAN?) Support of up 000 stations, with distances of maximally km Often used as ackbone for small LANs Host 80.5 LAN ridge DDI ring ridge 80. LAN Structure of DDI Wiring within DDI: optical fiber rings with opposite transmission direction During normal operation, only the primary ring is used, the secondary ring remains in readiness If the ring breaks, the other one (also called protection ring) can be used. If both rings break or if a station precipitates, the rings can be combined in only one, which has double length: Successor: DDI-II, supports besides normal data also synchronous circuit switched PCM data (speech) and ISDN traffic Variant: CDDI (Copper Distributed Data Interface), with 00 Mit/s over Twisted Pair Page Two classes of stations exist: (Dual Attachment ) can be attached both rings, the cheaper (Single Attachment ) are only attached one ring. Page DDI Configurations Transmission within DDI Normaler asic double Doppel-Ring ring Double ring Doppelter with connected Ring mit Einzelring-Erweiterung single Einfacher Simple DDI DDI-Ring ring NAC Coding /5 code, thus coding of bits of data in 5 bits which are transferred Synchronization DAC SAC Transmission of a long preamble in order synchronize the receiver the sender clock pulse. The clocks of all stations must run stable on at least 0.005%. With such a stability, frames with up 500 byte of data can be transferred without the receiver losing the clock pulse. = Dual Attachment = Single Attachment DAC = Dual Attachment Concentrar NAC =Null Attachment Concentrar SAC = Single Attachment Concentrar SAC y means of the concentrars several rings can be linked. Page 5 Procols The fundamental procols of DDI are similar IEEE 80.5 (ken ring): in order transmit data, a station must acquire the ken. Then it transfers its frame and takes it the ring when it returns it. Due the expansion of DDI, a single ken is unpractical. Therefore, DDI transfers in the multiple ken mode. Ring and station management also are similar IEEE 80.5, additionally a function for deviating traffic the protection ring is included. Page 6

Synchronous Transmission of Data Original transmission principle within DDI: Use of asynchronous frames, i.e. sending can be started any time. Additionally, with DDI-II also the use of synchronous frames for circuit switched PCM or ISDN data (telephony) is possible: every 5 µs a master station produces synchronous frames for reaching the 8000 samples / second necessary for PCM. every frame consists of 6 byte for non-circuit-switched data and up 96 byte for circuit switched data (up 96 PCM channels per frame). if a station once uses fixed slots in a frame, these are considered for it as reserved until the station releases them expressly (implicit reservation). unused synchronous slots of the frame are assigned on request any station. Page 7 Data frames with DDI The data frames are similar those used in the ken ring format: 8 /6 /6 Up 80 Preamble DA SA Data CS rame Control (C) Start Delimiter (SD) End Delimiter (ED) rame Status yte Token Preamble Thepreamble is used for the synchronization as well as for the preparation of the stations a following transmission Start and end delimiter are being used for marking the frame rame control specifies the type of the frame: data, control, synchronously/asynchronously, Here, also several kens are differentiated for the possible traffic types. rame status contains confirmation bits as in IEEE 80.5 Addresses and the CS are as in IEEE 80.5 S D C E D Page 8