direct link networks multiaccess protocols 2 7
play

Direct Link Networks: Multiaccess Protocols (2.7) CS/ECpE 5516: - PowerPoint PPT Presentation

Direct Link Networks: Multiaccess Protocols (2.7) CS/ECpE 5516: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams (CS) Virginia Tech courses.cs.vt.edu/~cs5516 Lecture Topics I Multiaccess control I IEEE 802.5


  1. Direct Link Networks: Multiaccess Protocols (2.7) CS/ECpE 5516: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams (CS) Virginia Tech courses.cs.vt.edu/~cs5516

  2. Lecture Topics I Multiaccess control I IEEE 802.5 Token Ring and FDDI ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 2

  3. Multiaccess Communication (1) I Previous discussion considered point-to-point links G Received signal is transmitted signal (plus noise) I Many networks are such that received signal at one node depends on transmitted signal at two or more other nodes G Satellite systems G Radio networks G Multi-tap bus systems ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 3

  4. Multiaccess Communication (2) I Multiaccess media are communication media where received signal is sum of attenuated transmitted signals plus effects of delay, distortion, and noise I Examples: Multitap bus (Ethernet) Radio (wireless) network ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 4

  5. Medium Access Control -- MAC (1) I With multiaccess media, protocol is needed to coordinate sharing of media I Medium access control (MAC) protocol performs this function I MAC is sublayer between data link control (DLC) layer and physical layer (usually grouped with DLC) ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 5

  6. Medium Access Control -- MAC (2) I LLC provides “link” to adjacent node I MAC coordinates access to shared media I Physical provides hardware interface Data LLC Link MAC physical ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 6

  7. Medium Access Control -- MAC (3) I Separation of layer functions in multiaccess networks is not as well-defined as in networks with point-to-point links G Feedback about errors is part of ARQ strategy of DLC, but may depend on how media is shared G Flow and congestion control needed to provide fair, efficient access to shared media G Broadcast nature of shared media implements some routing functions ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 7

  8. Token Ring Networks Token ring networks are common form of LAN & MAN G IEEE 802.5 (Token Ring): 4 Mbps or 16 Mbps G Fiber Distributed Data Interface (FDDI): 100 Mbps ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 8

  9. Nodes Arranged in Ring Topology 1 G Node… G receives bit stream 8 2 from last node G relays bit stream to next node 7 3 6 4 5 Point-to-point links between stations ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 9

  10. Nodes Arranged in Ring Topology Node can repeat or replace each 1 bit 8 2 interface 7 3 logic 6 4 5 At least 1 bit delay at each node: N Propagation N Processing N Regeneration & transmission ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 10

  11. Token (1) I To transmit its own data, node must discard input & output its data interface logic I But we can't discard data until it has reached its destination G Token is used to coordinate use of ring G Ring is shared medium, so network is multiaccess system ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 11

  12. Token (2) I Conceptually, token is passed from node to node G Only send your data when you've got token G Pass token when data reaches destination or you've got no data to send I So what is a token anyway? G Special pattern -- distinguished from data G Similar to framing flags � ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 12

  13. Token (3) I Token can be in 2 states G Free token (or idle token ): ring available N Discard bits following free token G Busy token : ring in use N Follow busy token with data I Token indicates G upcoming data (if busy ), as well as G permission to transmit (if free ) ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 13

  14. Basic Token Ring Operation (1) I When node with data to transmit receives free token, it marks token as busy and appends its own data I Subsequent nodes forward data since token is marked busy G Destination node both forwards and stores data G Destination node may mark data as received, but token is still busy I Data returns to originating node where it is discarded ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 14

  15. Basic Token Ring Operation (2) I After node finishes transmission, it G marks token as free G forwards token next node G follows token with idle fill (until it sees busy or idle token again) ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 15

  16. Ring Example (1) data busy 1 1 4 2 4 2 3 3 Node 1 transmits busy token Node 1 receives followed by data for node 3 free token ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 16

  17. Ring Example (2) 1 1 4 2 4 2 3 3 Busy token followed by Busy token completes data continues around round trip and is ring, node 3 stores data stripped at node 1 ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 17

  18. Ring Example (3) idle free 1 1 token 4 2 4 2 3 3 Node 1 strips old data When finished, node 1 from ring and puts free token on transmits new data ring, followed by idle until finished fill ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 18

  19. Ring Example (4) 1 1 4 2 4 2 3 3 Node 2 forwards free Node 3 receives all of token (no data to data from 1, forwards send), node 3 still free token (no data to storing data send) ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 19

  20. Ring Example (5) 1 1 4 2 4 2 3 3 Node 4 receives free Node 1 forwards bits token, transmits busy (busy token) after its token followed by data last data bit arrives ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 20

  21. Additional Details of Ring Operation I Propagation delay around ring must be long enough to “store” complete token G Otherwise first part of free token would be discarded to transmit last part I Error detection G Receiving node can check CRC and put an ACK or NAK in packet trailer on its way back to sender G Sending node can also check CRC since it sees all transmitted data I Numerous variations are possible in ring operation ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 21

  22. Token Holding Time I How long can node hold free token? I Option 1: Transmit only 1 packet G Lets token rotates at maximum rate G Minimizes latency I Option 2: Transmit all waiting packets G Reduces token transmission overhead G Maximizes throughput I 3: Transmit waiting packets up to time limit G Best of both worlds ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 22

  23. Retransmission Schemes (1) I 2 options in handling retransmissions… G Selfless operation (FDDI): Give up token when done transmitting; if error detected, reacquire token & retransmit G Selfish (IEEE 802.5): Hold token for round trip time, to be sure receiver got data correctly ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 23

  24. Retransmission Schemes (2) I Pros/Cons G Selfless (FDDI): N Penalty: higher latency on error G Selfish (802.5): N Ring transmits idle fill until sender gets ack N Penalty: lower throughput for low error rates N Advantage: Lower latency for retransmissions ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 24

  25. Type of Token Failures (1) I Lost token -- no node can transmit! G Corrupted by noise (bit errors alter token code) G Node holding token fails I Token is permanently marked busy -- no node can transmit G Idle token corrupted by noise (is marked busy) I Multiple tokens created -- conflicts for access G Non-token corrupted by noise to become token G Node failure I Ring protocol recognizes token failures & recovers (e.g. generating new token) ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 25

  26. Fiber Distributed Data I nterface -- FDDI I 100 Mbps timed token ring network based on fiber optics I Developed under auspices of ANSI committee X3T9 formed in 1982 I Limited popularity G Lack of high BW apps in 1980's G High cost of NIC's ($5000) and concentrators ($$) G Was popular for backbones & switching fabric ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 26

  27. FDDI Standard LLC Data Link MAC PHY SMT Physical PMD LLC Logical Link Control MAC Media Access Control PHY Physical PMD Physical Media Dependent SMT Station Management ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 27

  28. FDDI Versus Token Ring I Token Ring: sender waits until all of transmitted data goes round ring before releasing token I FDDI: sending node releases token after sending last bit of data G Busy token not sent G Data frame header recognized as “busy token” G Improves FDDI’s throughput I FDDI supports low-priority (asynchronous) and high-priority (synchronous) packets G Guarantees throughput and latency G Suitable for digitized voice, real-time control, etc. ECPE/CS 5516 (1/31/00) Direct Link Networks: Multiaccess Protocols - 28

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend