Escolar Documentos
Profissional Documentos
Cultura Documentos
STANDARDS
LAN
A LAN consists of number of computers
and network devices interconnected by
a shared transmission medium,
typically a cabling system which is
arranged in a bus, ring or star topology.
The cabling system may use twisted
pair, coaxial cable or optical fiber
transmission media. In some cases the
cabling system is replaced by wireless
transmission based on radio or infrared
signals.
LAN standards define physical layer
protocols that specify the physical
properties of the cabling or wireless
system.
The computers and network devices are
connected to the cabling system
through network interface card(NIC) or
LAN adapter card.
LAN
3
Uses:
LAN
4
LAN protocols function at the lowest two layers of the OSI reference
organization.
The IEEE has subdivided the data link layer into two sub layers :
The header contains a control field used for error and flow control.
The other two header fields define the upper layer protocol at the source and destination
2. Media Access Control (MAC): Defines specific access method for each LAN. For
example it defines CSMA/CD as media access
method for Ethernet LAN.
It contains a number of distinct modules, each
defining the access method and the framing format
specific to the corresponding LAN protocol.
Physical
Layer: it is dependent on the
implementation and type of physical media used.
IEEE defines detailed specifications for each LAN
implementation.
Prepared by:Shruthi.K,Dept. of E&C, MIT,
Manipal.
11
802.1:
o
o
o
o
17
18
19
(OR)
MAC FRAME
FORMAT
27
on an ethernet network
has its NIC. The NIC fits
inside the station and
provides the station with
a 6byte physical address.
It
is
written
in
hexadecimal notation.
unicast,multicast or broadcast.
If the LSB of the first byte in a
defines
only
one
receipient.(i.e one sender and
one receiver)
A
multicast
destination
address defines a group of
addresses.(i.e one sender and
many receivers).
The broadcast address is a
special case of the multicast
address. The receipients are
all stations on the LAN. It is a
address with all bits as 1s. (48
1S)
CSMA/CD.
Slot time: The round trip time required for a frame to
travel from one of a maximum length network to the
other and the time required to send the jam sequence.
Slot time = round trip time + time required to send the
jam sequence
Slot time is defined in bits. It is the time required for a
station to send 512 bits. This means the actual slot time
depends on the data rate. For example for a 10Mbps
ethernet it is 51.2 s.
Prepared by:Shruthi.K,Dept. of E&C, MIT,
Manipal.
Case1: frame size = 512 bits. The sender must know about
the collision before it sends the entire frame. Hence it is
required to have slot time less than the time required to
send minimum frame of 512bits.
Case2: frame size >512 bits (ex: 1518bits). The signal will
reach the destination before one-half of the slot time.
Hence stations following CSMA/CD scheme will sense that
medium as busy and will stay away from sending their
frames. In case they try to send then collision will happen.
Collision will occur during first half of the slot time. If the
first 512 bits are sent then it is guaranteed that collision
will not occur during the rest transmission.
Prepared by:Shruthi.K,Dept. of E&C, MIT,
Manipal.
Slot
Problem
37
Problem
38
Problem
39
Problem
40
Network (LAN) in which the stations on the bus or tree form a logical ring.
Each station is assigned a place in an ordered sequence, with the last station in
the sequence being followed by the first.
Each station knows the address of the station to its "left" and "right" in the
sequence.
This type of network, like a Token Ring network, employs a small data frame
only a few bytes in size, known as a token, to grant individual stations exclusive
access to the network transmission medium.
A token-passing system in which each station takes turns to transmit a frame
was considered a better option, because if there are n stations, and each station
takes T seconds to send a frame, no station has to wait longer than nT seconds
to acquire the token.
access to the network, with each node playing an active role in the process.
When a station acquires control of the token, it is allowed to transmit one
or more data frames, depending on the time limit imposed by the network.
When the station has finished using the token to transmit data, or the time
limit has expired, it relinquishes control of the token, which is then
available to the next station in the logical sequence.
When the ring is initialised, the station with the highest number in the
sequence has control of the token.
Since only one station at a time holds the token no collisions do not occur.
There is no relation between the physical location of the station on the bus
and its logical sequence number.
Acknowledgement is returned to the sender.
If there is an error in delivering the information, a request for
retransmission is attached to the token and it is sent to the sender.
Frames can be prioritised.
The token bus standard specifies 3 physical layer options in terms of transmission
medium, signaling technique, data rate and maximum electrical cable segment length.
The table below summarizes these options defined for the standard.
Sl.No Medium
Options
Transmission
medium
Signaling
Data
Technique Rate(Mbps)
Maximum
Segment
length
Broad band
Coaxial cable
(75 ohm)
Broad band
(AM/PSK)
1,5,10
Not specified
Carrier
band
Coaxial cable
(75 ohm)
Broad band
(FSK)
1,5,10
7600m
Optical
fiber
Optical fiber
ASK
Manchester
5,10,20
Not specified
Each station in the ring has knowledge of - TS: This Station's address, NS: Next Station's address, PS:
Previous Station's address
When the ring is initialised, tokens are inserted into it in station address order, starting with the
highest. The token itself is passed from higher to lower addresses. Once a station acquires the token, it
has a fixed time period during which it may transmit frames, and the number of frames which can be
transmitted by each station during this time period will depend on the length of each frame. If a
station has no data to send, it simply passes the token to the next station without delay.
The Token Bus standard defines four classes of priority for traffic - 0, 2, 4, and 6 - with 6 representing
the highest priority and 0 the lowest. Each station maintains four internal queues that correspond to
the four priority levels.
As a frame is passed down to the MAC sublayer from a higher-layer protocol, its priority level is
determined, and it is assigned to the appropriate queue. When a station acquires the token, frames are
transmitted from each of the four queues in strict order of priority. Each queue is allocated a specific
time slot, during which frames from that queue may be transmitted. If there are no frames waiting in a
particular queue, the token immediately becomes available to the next queue. If the token reaches level
0 and there are no frames waiting, it is immediately passed to the next station in the logical ring.
The whole process is controlled by timers that are used to allocate time slots to each priority level. If
any queue is empty, its time slot may be allocated for use by the remaining queues.
Each station has a timer that is reset whenever it acquires the token. When the token arrives, the
existing value of this timer is inspected before the timer is reset.
There is no guaranteed time limit set on how long a station has to wait to enter the ring when traffic is
heavy, but in practice it is not normally longer than a few seconds.
MAC Sublayer
IEEE specific frame format
46
Ring initialisation is a special case of
adding new stations. When the first
station comes on line, it registers the fact
that there is no traffic for a specified
period.
It
then
broadcasts
a
CLAIM_TOKEN frame. Not receiving a
reply, it creates a token and sets up a ring
consisting of just itself, and periodically
allows other new stations to join the ring.
Periodically, a station will transmit a
SOLIT_SUCCESSOR
frame
allowing
stations wishing to join the ring. The
frame includes the sender's address, and
that of its current successor in the ring.
Only stations with an address falling
between these two addresses are allowed
to enter the ring (in order to maintain the
logical order of station addresses on the
ring). If no station enters within a slot
time, the response window is closed, and
the token holder returns to its normal
business. If only one station enters, it is
inserted into the ring and becomes the
token holder's successor.
Preamble
S 00000
D 000
D
A
Preamble
S 00000
D 001
D
A
Preamble
S 00000
D 010
D
A
S
A
0,2,4,
6
F
C
S
E
D
S
A
0,2,4,
6
F
C
S
E
D
0,2,4,
6
F
C
S
E
D
S
A
MAC Sublayer
IEEE specific frame format
47
Preamble
S 00000
D 100
D
A
Preamble
S 00000
D 011
D
A
Preamble
S 00000
D 110
D
A
Preamble
S 00001
D 000
D
A
S
A
0,2,4,
6
F
C
S
E
D
S
A
0,2,4,
6
F
C
S
E
D
S
A
0,2,4,
6
F
C
S
E
D
S
A
0,2,4,
6
F
C
S
E
D
Name
Meaning
00000000
Claim_token
00000001
Solicit_successor_1
00000010
Solicit_successor_2
00000011
Who_follows
00000100
Resolve_contention
00001000
Token
00001100
Set_successor
Token passing is the method of medium access, with only one token allowed to exist on the network at any one time.
Network devices must acquire the token to transmit data, and may only transmit a single frame before releasing the
token to the next station on the ring.
When a station has data to transmit, it acquires the token at the earliest opportunity, marks it as busy, and attaches the
data and control information to the token to create a data frame, which is then transmitted to the next station on the
ring.
The frame will be relayed around the ring until it reaches the destination station, which reads the data, marks the frame
as having been read, and sends it on around the ring.
When the sender receives the acknowledged data frame, it generates a new token, marks it as being available for use,
and sends it to the next station.
If there is a error then a request for retransmission is attached to the token. Token carries the message for
retransmission to the sender. The data is thus retransmitted
In this way, each of the other stations on the ring will get an opportunity to transmit data (even if they don't have any
data to transmit!).
If a station receiving the token has no information to send, it passes the token to the next end station.
In a Token Ring network, one station is arbitrarily selected to be the active monitor. The active monitor acts as a source
of timing information for other stations, and performs various maintenance functions, such as generating a new token
as and when required, or preventing rogue data frames from endlessly circulating around the ring.
All of the stations on the ring have a role to play in managing the network. However any station that detects a serious
problem will generate a beacon frame that alerts other stations to the fault condition, prompting them to carry out
diagnostic activities and attempt to re-configure the network.
o
o
o
o
o
It permits certain user-designated, high-priority stations to use the network more frequently.
Token Ring frames have two fields that control priority: the priority field and the reservation
field.
Only stations with a priority equal to or higher than the priority value contained in a token can
seize that token.
After the token is seized and changed to an information frame, only stations with a priority
value higher than that of the transmitting station can reserve the token for the next pass around
the network.
When the next token is generated, it includes the higher priority of the reserving station.
Stations that raise a token's priority level must reinstate the previous priority after their
transmission is complete.
tokens,
and
data/command
frames.
The token is three bytes long and
consists of a start delimiter, an
access control byte, and an end
delimiter.
A data/command frame has the
same fields as the token, plus
several additional fields.
Data frames carry information
for upper-layer protocols
Command
frames
contain
control information and have no
data for upper-layer protocols.
53
If the network is quiet and none of the stations has any data to
59
IBM Token Ring v. IEEE 802.5
IBM Token Ring
IEEE 802.5
Data rate
4 or 16 Mbps
4 or 16 Mbps
STP - 260
UTP - 72
250
Topology
Star
Not specified
Media
Twisted pair
Not specified
Signalling
Baseband
Baseband
Access method
Token passing
Token passing
Encoding
When the traffic on the ring is light, the token spends most of the time circulating around
the ring until a station has a frame to transmit.
As the traffic becomes heavy many stations have frames to transmit and the token
mechanism provides stations with a round robin access to the ring.
Suppose there are M stations and each station introduces a b bits delay between
receiving the frame and forwarding it to the outgoing line of the interface, then total
delay introduced by all interfaces is Mb bits.
A typical value of b is 2.5 is chosen.
If the total length of the links around the ring is d meters then an additional delay of d/v
secs or Rd/v bits is caused because of propagation delay.
Ring latency is defined as number of bits that can be simultaneously in transit around the
ring.
Ring latency () = d/v + Mb/R secs and R = dR/v + Mb bits ,
where Mb is the total delay introduced by the M station interfaces and R is the data rate.
The ring must be long enough to hold the complete token.
ring
If frame size > ring latency, a complete frame cannot be on the ring
at one time
If frame size < ring latency, complete frame is on transition in the
ring.
Approaches to Token Reinsertion:
1. Single token operation (delayed token release): in which the token
is released only after a complete frame is received by the
transmitting station. Suitable when frame size is nearly equal or
greater than ring latency.
2. Multiple token operation (early token release): in which token is
released after the transmission of a frame is completed by the
transmitting station. Suitable when frame size is less than ring
latency.
FDDI
67
FDDI
The dual-ring system consists of a
primary and a secondary ring, in which
traffic on each ring flows in opposite
directions. In normal operation, the
primary ring is used for data
transmission and the secondary ring
remains idle.
There are various ways in which FDDI
devices can be connected to the
network. A single attachment station
(SAS) is attached to the primary ring,
usually via a concentrator.
Concentrators are devices which are
similar in many ways to hubs on an
Ethernet network, and are usually dual
attachment concentrators, attached to
both rings.
A dual attachment station (DAS) is
attached directly to both the primary
and secondary rings.
68
FDDI
The
69
FDDI
An alternative to wrapping is to
70
FDDI operation
72
FDDI
Physical Layer
73
FDDI
Physical Layer
74
16 out of 32
FDDI
MAC Layer
76
FDDI frame structure is very similar to that of IEE 802.5. the FC field is
FDDI
MAC Layer
77
FDDI
MAC Layer
78
FDDI
MAC Layer
79
Token Ring
Shielded twisted pair
4, 16 Mbps
No reliability specified
Differential Manchester
Centralized clock
Priority and Reservation
bits
New token after receive
FDDI
Optical Fiber
100 Mbps
Reliability specified (dual
ring)
4B/5B encoding
Distributed clocking
Timed Token Rotation Time
New token after transmit