Survey
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project
NETE0510 LANs and Hi-speed LANs Dr. Supakorn Kungpisdan [email protected] NETE0510: Communication Media and Data Communications 1 Outline LAN Overview Ethernet Token Ring FDDI NETE0510: Communication Media and Data Communications 2 LAN Topologies NETE0510: Communication Media and Data Communications 3 LAN Protocol Architecture NETE0510: Communication Media and Data Communications 4 IEEE 802 Layers Physical encoding/decoding of signals preamble generation/removal bit transmission/reception transmission medium and topology Logical Link Control interface to higher levels flow and error control Media Access Control on transmit assemble data into frame on receive disassemble frame govern access to transmission medium for same LLC, may have several MAC options NETE0510: Communication Media and Data Communications 5 LAN Protocols in Context NETE0510: Communication Media and Data Communications 6 Logical Link Control (LLC) transmission of link level PDUs between stations must support multi-access, shared medium but MAC layer handles link access details addressing involves specifying source and destination LLC users referred to as service access points (SAP) typically higher level protocol NETE0510: Communication Media and Data Communications 7 LLC Services based on HDLC 3 services provided: Unacknowledged connectionless service Simple, no flow- and error control, no data delivery guaranteed rely on higher layer protocols Connection-mode service Similar to that offered by HDLC Need connection setup, provide flow and error control Acknowledged connectionless service Hybrid approach No connection setup required, but require acknowledgement NETE0510: Communication Media and Data Communications 8 Media Access Control (MAC) MAC layer receives data from LLC layer fields MAC control destination MAC address source MAC address LLC CRC MAC layer detects errors and discards frames LLC optionally retransmits unsuccessful frames (link-to-link retransmission, not end-to-end) NETE0510: Communication Media and Data Communications 9 Outline LAN Overview Ethernet Token Ring FDDI NETE0510: Communication Media and Data Communications 10 Ethernet (CSMA/CD) most widely used LAN standard developed by Xerox - original Ethernet IEEE 802.3 Carrier Sense Multiple Access with Collision Detection (CSMA/CD) random / contention access to media NETE0510: Communication Media and Data Communications 11 Pure VS Slotted ALOHA Pure ALOHA Slotted ALOHA NETE0510: Communication Media and Data Communications 12 ALOHA developed for packet radio nets when station has frame, it sends then listens for a bit over max round trip time (RTT) if receive ACK then fine if not, retransmit if no ACK after repeated transmissions, give up uses a frame check sequence (as in HDLC) to check for errors frame may be damaged by noise or by another station transmitting at the same time (collision) any overlap of frames causes collision max utilization 18% NETE0510: Communication Media and Data Communications 13 Slotted ALOHA time on channel based on uniform slots equal to frame transmission time need central clock (or other sync mechanism) transmission begins only at the beginning of the slot So, frames either miss or overlap totally max utilization 37% both have poor utilization fail to use fact that propagation time (PT) is much less than frame transmission time (TT) If PT >> TT, a station may succeed in transmitting a frame If TT >> PT, none of the stations may not succeed NETE0510: Communication Media and Data Communications 14 CSMA 1. 2. 3. stations soon know transmission has started so first listen for clear medium (carrier sense) if medium idle, transmit if two stations start at the same instant, collision wait reasonable time if no ACK then retransmit collisions occur occur at leading edge of frame max utilization depends on propagation time (medium length) and frame length shorter PT, longer frame, higher utilization Also work well for the case that PT << TT Collision can occur only more than one user begins transmitting within PT NETE0510: Communication Media and Data Communications 15 CSMA Persistence and Backoff NETE0510: Communication Media and Data Communications 16 Non-persistent CSMA Non-persistent CSMA rules: 1. if medium is idle, transmit 2. if medium is busy, wait for amount of time drawn from probability distribution (retransmission delay) & retry random delays reduces probability of collisions capacity is wasted because medium will remain idle following end of transmission even stations are waiting to transmit frames NETE0510: Communication Media and Data Communications 17 1-persistent CSMA 1-persistent CSMA avoids idle channel time 1-persistent CSMA rules: 1. if medium idle, transmit; 2. if medium busy, listen until idle; then transmit immediately 1-persistent stations are selfish if two or more stations waiting, a collision is guaranteed NETE0510: Communication Media and Data Communications 18 P-persistent CSMA a compromise to try and reduce collisions and idle time p-persistent CSMA rules: 1. if medium idle, transmit with probability p, and delay one time unit (equal to max propagation delay) with probability (1–p) 2. if medium busy, listen until idle and repeat step 1 3. if transmission is delayed one time unit, repeat step 1 issue of choosing effective value of p to avoid instability under heavy load NETE0510: Communication Media and Data Communications 19 CSMA/CD with CSMA, collision occupies medium for duration of transmission better if stations listen whilst transmitting CSMA/CD rules: 1. 2. 3. 4. if medium idle, transmit if busy, listen for idle, then transmit if collision detected, jam and then cease transmission after jam, wait random time (backoff period) then retry NETE0510: Communication Media and Data Communications 20 CSMA/CD (cont’d) NETE0510: Communication Media and Data Communications 21 CSMA/CD Algorithm 1. Adaptor receives datagram from 4. If adapter detects another net layer & creates frame transmission while transmitting, aborts and sends 48-bit jam 2. If adapter senses channel idle (no signal signal energy entering adapter for 96 bit times), it starts to transmit 5. After aborting, adapter enters frame. If it senses channel busy, exponential backoff: after the waits until channel idle and then mth collision, adapter chooses a transmits K at random from {0,1,2,…,2m-1}. Adapter waits 3. If adapter transmits entire frame K·512 bit times and returns to without detecting another Step 2 transmission, the adapter is done with frame ! NETE0510: Communication Media and Data Communications 22 CSMA/CD (cont’d) Jam Signal: make sure all other transmitters are aware of collision; 48 bits Bit time: time to send 1 bit of data = 0.1 microsec for 10 Mbps Ethernet ; for K=1023, wait time is about 50 msec (1023 x 512 x 0.1 = 52378 microsec = 52.38 msec) Exponential Backoff: Goal: adapt retransmission attempts to estimated current load heavy load: random wait will be longer first collision: choose K from {0,1}; delay is K· 512 bit transmission times after second collision: choose K from {0,1,2,3}… after ten collisions, choose K from {0,1,2,3,4,…,1023} NETE0510: Communication Media and Data Communications 23 IEEE 802.3 Frame Format NETE0510: Communication Media and Data Communications 24 10Mbps Specification (Ethernet) 10BASE5 10BASE2 10BASE-T 10BASE-FP Transmission medium Coaxial cable (50 ohm) Coaxial cable (50 ohm) Unshielded twis ted pair 850-nm optical fiber pair Signaling techni que Baseband (Manch ester) Baseband (Manch ester) Baseband (Manch ester) Manches ter/on-off Topology Bus Bus Star Star Maximu m segment 500 length (m) 185 100 500 Nodes per segment 100 30 — 33 Cable diameter (mm) 10 5 0.4 to 0.6 62.5/125 µm NETE0510: Communication Media and Data Communications 25 100Mbps Fast Ethernet 100BASE-TX 100BASE-FX 100BASE-T4 Transmission medium 2 pair, STP 2 pair, Catego ry 5 UTP 2 optical fibers 4 pair, Catego ry 3, 4, or 5 UTP Signaling techni que MLT-3 MLT-3 4B5 B, NRZI 8B6 T, NRZ Data ra te 100 Mbps 100 Mbps 100 Mbps 100 Mbps Maximu m segme nt length 100 m 100 m 100 m 100 m Networ k span 200 m 200 m 400 m 200 m NETE0510: Communication Media and Data Communications 26 100BASE-X uses a unidirectional data rate 100 Mbps over single twisted pair or optical fiber link encoding scheme same as FDDI 4B/5B-NRZI two physical medium specifications 100BASE-TX uses two pairs of twisted-pair cable for tx & rx STP and Category 5 UTP allowed MTL-3 signaling scheme is used 100BASE-FX uses two optical fiber cables for tx & rx convert 4B/5B-NRZI code group into optical signals NETE0510: Communication Media and Data Communications 27 MTL-3 Encoding An MLT-3 interface emits less electromagnetic interference and requires less bandwidth than most other binary or ternary interfaces that operate at the same data rate NETE0510: Communication Media and Data Communications 28 100BASE-T Options NETE0510: Communication Media and Data Communications 29 Gigabit Ethernet Configuration NETE0510: Communication Media and Data Communications 30 Gigabit Ethernet – Physical NETE0510: Communication Media and Data Communications 31 10Gbps Ethernet Options NETE0510: Communication Media and Data Communications 32 Outline LAN Overview Ethernet Token Ring FDDI NETE0510: Communication Media and Data Communications 33 Token Ring Many types of token ring technology: IBM’s Token Ring IEEE802.5 Token Ring FDDI (Fiber Distribution Data Interface) IEEE802.17 Resilient Packet Ring A token ring network consists of nodes connected in a ring. Data always flows in a particular direction around the ring, with each node receiving frames from its upstream neighbor and then forwarding them to its downstream neighbor. NETE0510: Communication Media and Data Communications 34 Token Ring (cont’d) Different from Ethernet: ring-based VS bus topology Same single shared-medium network Two common features of Token Ring and Ethernet Involve a distributed algorithm that controls when each node is allowed to transmit All nodes see all frames; only the node identified in a frame as the destination will save a copy of the frame as it flows past. NETE0510: Communication Media and Data Communications 35 Token Ring specifications Data transfer rate is 4 or 16 Mbps Uses Twisted Pair cabling (Cat 3 for 4 MB/s, Cat 5 for 16 Mb/s) for IBM’s Token Ring, but not specified in IEEE802.5 Use Manchester encoding Access method is token passing Logical topology ring, physical topology is star Connector type is RJ-45 Maximum attachments per segment is 250 (IEEE 802.5) and 260 (IBM) per ring NETE0510: Communication Media and Data Communications 36 Token Token is a special sequence of bits circulating around the ring Token Ring operation: 1. 2. 3. 4. Each node receives and forwards the token When a node that has a frame to transmit sees the token, it takes the token off the ring, and insert its frame into the ring Each node along the way simply forwards the frame, with the destination node saving a copy and forwarding the message onto the next node on the ring. When the frame makes its way back around to the sender, this node strips its frame off the ring and reinserts the token. The media access algorithm is fair the token circulates around the ring, each node gets a chance to transmit. NETE0510: Communication Media and Data Communications 37 Physical Properties Link or node failure would render the whole network useless Solved by connecting each station into the ring using an electromechanical relay. NETE0510: Communication Media and Data Communications 38 Physical Properties (cont’d) Several of these relays are usually packed into a single box, known as a multi-station access unit (MSAU or MAU) NETE0510: Communication Media and Data Communications 39 Token Ring Frame Format NETE0510: Communication Media and Data Communications 40 Token Ring Frame Format (Cont’d) Access Control T is token bit, set to specify the token frame M is monitor bit, set by Active Monitor Frame Status A =1, Address recognized C = 1, Frame copied NETE0510: Communication Media and Data Communications 41 Token Ring Media Access Control As the token circulates around the ring, any station that has data to send may seize the token by simply modifying 1 bit (T bit) in the second byte token The first 2 bytes of the modified token now become the preamble for the subsequent data packet. NETE0510: Communication Media and Data Communications 42 Token Holding Time (THT) Specify how long a given node is allowed to hold the token How much data a given node is allowed to transmit each time it possesses the token Time limit, data limit, or no limit? Default THT for IEEE802.5 is 10 ms NETE0510: Communication Media and Data Communications 43 Token Rotation Time (TRT) The amount of time it takes a token to traverse the tine as viewed by a given node TRT ≤ ActiveNodes x THT + RingLatency Where, RingLatency denotes how long it takes to circulate around the ring where no one has data to send, ActiveNodes denotes the number of nodes that have data to send NETE0510: Communication Media and Data Communications 44 Reliable Delivery 802.5 provides a form of reliable delivery using 2 bits in the frame status field, A and C bits Initially A and C are 0s When a destination station sees a frame, it sets A bit When it copies the frame into its adaptor, it sets C bit If the sending station receives the frame with A bit still 0, the recipient is not functioning or absent If A bit is set, but C bit is 0, the destination could not accept the frame (may be the buffer is full). The sender may retransmit the frame NETE0510: Communication Media and Data Communications 45 Token Ring Priority The token contains a 3-bit priority field. It has certain priority n at any time Each station that has data to send assigns priority to that frame, and the station can only seize the token to transmit a packet if the packet’s priority is at least as great as the token’s The token’s priority changes over time due to 3 reservation bits in Access Control field NETE0510: Communication Media and Data Communications 46 Token Ring Priority (cont’d) For example, Station X waiting to send a priority n packet may set the reservation bit to n if it sees the a data frame going past an the bits have not been set these bits to a higher value So, the station that currently holds the token must reduce the priority of the token to n when it releases the token. NETE0510: Communication Media and Data Communications 47 Token Release Early release or delayed release Early release allows better bandwidth utilization NETE0510: Communication Media and Data Communications 48 Active and Standby Monitors Every station in a token ring network is either an active monitor (AM) or standby monitor (SM) station. However, there can be only one active monitor on a ring at a time. Becoming an AM is chosen by election. Once an AM is chosen, every other station becomes a standby monitor. All stations must be capable of becoming an active monitor station if necessary. NETE0510: Communication Media and Data Communications 49 Active Monitor Election Electing AM is done when the ring is first connected or on the failure of the current AM. The active monitor is chosen through an election or monitor contention process. a loss of signal on the ring is detected, an active monitor station is not detected by other stations on the ring, or when a particular timer on an end station expires such as the case when a station hasn't seen a token frame in the past 7 seconds. The station that detects the above situation will try to become a new AM by performs the following: NETE0510: Communication Media and Data Communications 50 Active Monitor Election (cont’d) 1. 2. 3. The station sends a “claim token” frame, saying it wants to become a new AM. This frame contains its MAC address If that token circulates back to the sender, it is assumed that it can become a new AM If other stations also want to become a new AM, they also send the claim tokens. The station with highest MAC address will become a new AM. NETE0510: Communication Media and Data Communications 51 Active Monitor The active monitor performs a number of ring administration functions: Operate as the master clock for the ring in order to provide synchronization of the signal for stations on the wire. Insert a 24-bit delay into the ring, to ensure that there is always sufficient buffering in the ring for the token to circulate. Ensure that exactly one token circulates whenever there is no frame being transmitted, and to detect a broken ring. Token may vanish for several reasons e.g. bit error Responsible for removing circulating frames from the ring. NETE0510: Communication Media and Data Communications 52 Detecting A Missing Token AM watches for a passing token and maintains a timer equal to the maximum possible token rotation time. The interval equals: NumStations x THT + RingLatency If the timer expires without the AM seeing a token, it creates a new token NETE0510: Communication Media and Data Communications 53 Detecting Errors AM checks for corrupted or orphaned frames Dealing with corrupted frames The corrupted frame is the frame with checksum error or invalid format. Without the AM intervention, it could circulate forever The AM removes it and reinsert a new token Dealing with orphaned frames The orphaned frame is a normal frame whose “parent” died the sending station is down after sending the frame This frame can be detected by using “monitor” bit in Access Control field Initially the monitor bit is 0. it is set to 1 for the first time it passes the AM. If the AM detects this frame with this bit set, it knows that this frames is going by for the second time. Then the AM drains the frame off the ring NETE0510: Communication Media and Data Communications 54 Outline LAN Overview Ethernet Token Ring FDDI NETE0510: Communication Media and Data Communications 55 FDDI Fiber Distribution Data Interface Requently used as high-speed backbone technology because of its support for high bandwidth and greater distances than copper. An implementation on copper is called CDDI An FDDI network consists of a dual ring transmitting data in opposite directions: primary and secondary rings Tolerate a single break in the cable or the failure of one station NETE0510: Communication Media and Data Communications 56 FDDI (cont’d) NETE0510: Communication Media and Data Communications 57 FDDI Specifications NETE0510: Communication Media and Data Communications 58 Station-attachment Types Because of the expense of dual-ring configuration, some node connects with a single cable single attachment station (SAS); their dual-connected counterpart is called dual attachment station (DAS) NETE0510: Communication Media and Data Communications 59 Concentrator A concentrator attaches several SASs to the dual ring analogous to MSAU used in 802.5 If an SAS fails it uses an optical bypass to isolate the failed SA, thereby keeping the ring connected NETE0510: Communication Media and Data Communications 60 Concentrator (cont’d) NETE0510: Communication Media and Data Communications 61 Dealing With Failures Cable failure Station failure NETE0510: Communication Media and Data Communications 62 Optical Bypass Switch Provides continuous dual-ring operation if a device on the dual ring fails. Prevent ring segmentation and eliminate failed stations from the ring. The optical bypass switch performs this function using optical mirrors that pass light from the ring directly to the DAS device during normal operation. If a failure of the DAS device occurs, e.g. a power-off, the optical bypass switch will pass the light through itself by using internal mirrors and thereby will maintain the ring's integrity. NETE0510: Communication Media and Data Communications 63 Optical Bypass Switch (cont’d) NETE0510: Communication Media and Data Communications 64 Dual Homing Critical devices, such as routers or mainframe hosts, can use a faulttolerant technique called dual homing to provide additional redundancy and to help guarantee operation. In dual-homing situations, the critical device is attached to two concentrators. NETE0510: Communication Media and Data Communications 65 FDDI Physical Characteristics Limit to 500 stations in a network, span over 100 km. FDDI uses 4B/5B encoding Primary ring offers the rate up to 100 Mbps NETE0510: Communication Media and Data Communications 66 Timed Token Algorithm Token Holding Time (THT) is calculated the same as that of 802.5 Target Token Rotation Time (TTRT): the amount of time whereby all nodes agree to live within Measured TRT (MTRT): the time where each node measures between successive arrivals of the token If MTRT > TTRT, the token is late, the node does not transmit any data If MTRT < TTRT, the token is early, the node is allowed to hold the token for the difference between TTRT-MTRT NETE0510: Communication Media and Data Communications 67 FDDI Frame Format The FDDI frame format is similar to the format of a Token Ring frame. FDDI frames can be as large as 4,500 bytes. NETE0510: Communication Media and Data Communications 68 FDDI Frame Format (cont’d) Preamble—Gives a unique sequence that prepares each station for an upcoming frame. Start delimiter—Indicates the beginning of a frame by employing a signaling pattern that differentiates it from the rest of the frame. Frame control—Indicates the size of the address fields and whether the frame contains asynchronous or synchronous data, among other control information. Destination address—Contains a unicast (singular), multicast (group), or broadcast (every station) address. FDDI destination addresses are 6 bytes long. NETE0510: Communication Media and Data Communications 69 FDDI Frame Format (cont’d) Source address—Identifies the single station that sent the frame. FDDI source addresses are 6 bytes long. Data—Contains either information destined for an upperlayer protocol or control information. Frame check sequence (FCS)— error detection End delimiter—Contains unique symbols; cannot be data symbols that indicate the end of the frame. Frame status—Allows the source station to determine whether an error occurred; identifies whether the frame was recognized and copied by a receiving station. NETE0510: Communication Media and Data Communications 70 Timed Token Algorithm (cont’d) However, if a node sees the token but it has lots of data to send, its MTRT > TTRT, it cannot transmit data To account for this possibility, FDDI defines 2 classes of traffic: synchronous and asynchronous For synchronous data, a node is allowed to send after receiving a token, no matter it is early or late Synchronous: traffic is delay sensitive, e.g. voice or video The total amount of data to send is bound by TTRT For asynchronous data, the token must be early Asynchronous: more suitable for non-delay-sensitive data e.g. file transfer NETE0510: Communication Media and Data Communications 71 Timed Token Algorithm (cont’d) Question: how a node determines if it can send asynchronous traffic? Answer: A node can send if MTRT < TTRT Question: what if TTRT is too small so that the node cannot transmit the full message without exceeding TTRT? Answer: the node is allowed to send the frame NETE0510: Communication Media and Data Communications 72 Token Maintenance All nodes monitor the time to ensure that the token has not been lost Each node should see a valid transmission: data frame or the token The idle time that each node can experience is equal to the ring latency plus the time it takes to send a full frame normally a bit less than 2.5 ms Normally each node sets a timer event to 2.5 ms If the timer expires, the node sends a “claim” frame NETE0510: Communication Media and Data Communications 73 Electing Active Monitor Bidding for TTRT the node with lowest TTRT wins. This node can hold the token and can transmit a frame If nodes have equal TTRTs, the node with higher address wins If a node receives a claim frame, it checks to see if the TTRT bid in the frame is less than its own. If so, the node reset its local TTRT and forward the frame to the next node If its TTRT < the bid TTRT, remove the claim frame and putting its own claim frame on the ring If the claim frame is back to the sender, it can safely claim the token NETE0510: Communication Media and Data Communications 74 Questions? Next Lecture ISDN NETE0510: Communication Media and Data Communications 75