Вы находитесь на странице: 1из 10

An Architecture for Inteanetworking Integrated Services LANs

Vinod Mirchandarii and David Everitl Department of Elfectrkal,and Electronic Enginreering University of ibfelboume, Parkvile, VIC 3052 A USTRALIA

Abstract
The introduction of ATM technology in the customer premises is being propelled by the need for la seamless interconnection between end subnetworks. Fwthemre, integrated services over the end LANs in the customer premises are envisaged to gain momentum with the advent of efSTcient data compression techniques and high performance computers. In this paper, we first propose a distributed communications network architecr'ure based on an AIM switch fabric for internetworking IEEE 802.3 and 802.5 LANs carrying integrated voice and data services. In the second section of this paper, pc.rfo m n c e analysis of the integrated services LANs, which form the end subnetworks in the architecture, is carried out. The principal objectives of this performance analysis are to determine the magnitude of the mean frame transji?r delay contributed by the L A N s as well as to confirm that a satisfactory number of Integrated Voice and Da,ta Stations (IVDSs) could be supported on the LAN subnetworks. The performance evaluation of the IEEE 802.3 and 802.5 L A N s for the transfer of asynchronous data is validated by extensive stochastic simulations. Simulation results obtained for the trmsfer of isochronous data on the IEEE 802.5 LAN are abio presented.
1

data networks they are currently gaining an increasing matnentum towards use in the Customer Remises Networks (CPNs). A significant application of ATM in the CPNs would be to interconnect the IEEE 802.3 and the 802.5 LANs. Below in section 2.0, we first identify the issues associated with LAN intemetworking and then discuss the proposed in-building architecture. The proposed architectme is based on an Asynchronous Transfer Mode (ATM) switch fabric backbone for offering the users a seamless integrated voice and data communications service in the "intemetworked" 802.3 and 802.5 LAN environment. In section 3 the performance analysis of the IEEE 802.3 and 802.5 LANs for the transfer of asynchronous dab and isochronous data has been carried out. Furthermo~,the results obtained from extensive stochastic simulations of the IEEE 802.3 and 802.5 LANs are presented to validate the perfomance analysis of the LANs for the transfer of asynchronous data. Simulation results obtained for isochronous data transfer on the IEEE 802.5 LAN are also presented.

2.0 LAN Inteanetworking Issues


The principal issues which constitute the problem of internetworking lbetween heterogenous IEEE LANs are Data frame incompatibilities - Different MAC (Medium Access Control) protocols have frames with some differing fields. Bit order difference - 802.3 frame transmissions commence with the Least Significant Bit (LSB) of each data byte, whereas 802.5 LANs transmit frames in the reverse order. Mismatch in length of frame size - The maximum frame size of 802.3 LANs is 1526 octets, whereas 802.5 LAN$ operating at 4 Mb/s and 16 Mb/s have a maximum frame size of 4900 and 17,800 octets, respectively.. Furthermore, 802.3 requires a minimum frame size of 64 octets [2].

1.0 Introduction
LANs have emerged as ubiquitous data networks i n business organisations, hospitals and university campuses. A common preference of businesses in buildings is 10 use IEEE 802.3 Carrier Sense Multiple Access wiih Collision Detection (CSMNCD) ar 802.5 (Token Ring) LANs rather than the more industrially applicable 802.4 (Token Bus) LAN. The intemetworking of these LAhls within such a building is necessary for the Isharing of data, file servers and communication devices and for accessing important extemal public networks. Although ATM based networks were initially envisaged to replace contemporary heterogenous public

0742-1303/95 $4.00 0 1995 IEEE

433

Authorized licensed use limited to: UNIVERSITI UTARA MALAYSIA. Downloaded on January 26, 2009 at 21:17 from IEEE Xplore. Restrictions apply.

Acknowledgment mismatch - The 802.5 MAC protocol requires fi-ame acknowledgments whereas the 802.3 MAC does not. Priority mismatch - The 802.3 MAC protocol does not support data priority whereas the 802.5 MAC protocol can provide up to eight priority levels.

2 . 1 Network Architecture
The network topology proposed for intemetworking IEEE 802.3 and 802.5 LANs in the integrated voice and

data communication environment is shown in Fig. 1. An Asynchronous Transfer Mode (ATM) switch fabric would form a backbone network to interconnect EEE 802.3 and 802.5 LANs within &e building. To discuss the in-building network topology illustrated in Fig 1, we assume an ATMI switch fabric k i z g .;sa! as a backbone network within a building containing diversified LANs. FU)(3R 1 .................................................. FLOOR5

high data throughput can be Offered on the network. High throughput on the network is particularly useful for the transfer of time constrained traffic, such as voice. The IEEE 802.3 and 802.5 LANs may have been installed on an ad hoc basis within the building. It is proposed that each of the LANs in the building will be interconnected to the backbone ATM network by means of an IEEE 802.1G remote bridge 151 having an ATM interface. In this paper, we refer to a remote bridge with an ATM interface as an ATM remote bridge. OS1 level 3 based routers [61 and converting bridges are other possible alternative methods for internetworking. However, the routers involve more complex processing and are less cost-effective than the bridges. Converting bridges also result in increased processing times due to frame conversion at each of the peer converting bridges. For transmitting both isochronous and asynchronous traffic, it is considered that the smaller processing overheads introduced by a remote bridge means that a remote bridge is a more viable alternative to the routers and converting bridges. Thus, the remote bridge has been used in the proposed architecture. presented herein. The ATM remote bridge depicted in Fig. 2 is a simplified form of the IEEE 802.1G draft standard remote bridge architecture [5,7].
BRIDGE PORT

PORT

VIRTUAL

PSTN

vmsm
YGATEWAY

BROADBAND ISDN
KEY :
I

CS :Convergence Sublayer

$- IEEE 802.5 LAN 17- LEEE 802.3 LAN

ATMREMOTEBRJDGE

S A R :Segmentation and Reassembly Sublayer AAL :A T M Adaptation Layer

CLNAP :Connectionless Network Access Protocol


SNAP :Subnetwork Access Prolocol

Figure 1. Paoposed in-building communications network architecture. ATM is a connection-oriented, low delay and high bandwidth switching and multiplexing technique adopted by ITU-T (formerly CCI'IT) for the expected B-ISDN [3,41. In addition to supporting the connection-oriented service type, ATM can support connectionless service [4]. In an ATM network the information is transferred in fixed size packets of 53 octets called cells each of which has a 5 octet header field and a 48 octet information field. As the ATM cells are of fixed size, the port switching function of an ATM switch can be implemented in hardware resulting in fast cell switching speeds. Furthermore, as data can be simultaneously transmitted on different links of the ATM network, a

Figure 2. ATM remote bridge architecture [5,7]. The ATM remote bridge would interface with the ATM network at the virtual port and to an individual LAN by means of a bridge port. The Subnetwork Access Protocol (SNAP) and Connectionless Network Access Protocol (CLNAP) would together form the OS1 Network layer [8]; and for a Connectionless type of Network service (CLNS) the C L " should form the uppermost sublayer in the Intemal Organisation of the Network layer (IONL) [8]. Furthermore, the presence of a Network layer just above the ATM Adaptation Layer ( a at) the virtual port of an ATM remote bridge (refer to Fig. 2) conforms with the ITU-T recommendation for obtaining a connectionless type of service from the AAL [9].

434

Authorized licensed use limited to: UNIVERSITI UTARA MALAYSIA. Downloaded on January 26, 2009 at 21:17 from IEEE Xplore. Restrictions apply.

A. Asynchronous Communications

The network topology assumes a single LAN linked


to the bridge port of each ATM remote bridge. As

an

example, consider a five storey building, as depicted in Fig. 1. Also consider that a user A of an 802.3 LAN based Integrated Voice and Data Station (IVDS) (refer to Fig. 1) would like to initiate a data transfer, is well c i s simultaneously engage in an interactive voitz conuniunication with a user B of an 802.5 LAN based1 IVDS on the 5th floor. A l l the LAN IVDSs can be assumed to be instantiated into OSI-IS0 protocol stacks. First of all, fcr an asynchronous data transfer, the upper laycm in the protocol stack of user A's IVDS will request from the LLC (Logical Link Control) sublayer below an E E E 802 LLC connectionless service. The MAC prototml in the IVDS will then encapsulate the LLC Protocol Data Unit (PDU) to form a 802.3 MAC frame with a 48 bit MAC address (source address) of user A's IVDS and a 48 bit MAC address (destination address) of user El's IVDSi. The ATM remote bridge would maintain an address filtering table to determine if the destination and the source MAC addresses of the frame received on the bridge port reside on the same bridge port LANI. Consequently, the address filtering would avoid wastage of ATM network capacity as well as reduce frame delay (the latter in the case of a frame transmitted on the 802.5 LAN) by preventing the transmission of laical LAN traffic onto the backbone network.
Al.1 ATM Remote Bridge Functionality

the AAL would then segment the Network PDU obtained at the virtual port into 44 octet information blocks. In addition to appending control fields, the S A R would also append a field for Message Identification (MID) to identify i n f o m ~ o nblocks obtained from the same Network PDU [lO]. After these appendations by the S A R the 4 4 octet Nemork PDU segments would form 48 octet blocks. A 1 3 Routing

In the pposed architecture, each LAN in the building would maintain a semi-permanent connection to every other LAN in the building (refer to Fig. 3). Such semi-permanent connections between LANs in the building would result in small mute set-up delays and deazise the sigsdliiz req~rements between ATM nodes. The destination ATM remote bridge address contained in the Beginning of Message (BOM) cell would be mappedl using a VCI-VPI mapping table to an appropriate outgoing Virtual Channel Identifier (VCI) and/or Virtual Path Identifier (VPI) [7]. All the cells containing the same MID would be mapped to the same VCI andor VPI. The 48 octet blocks, formed as a consequence of Network PDU segmentation and control field appendations by the AAL-SAR sublayer, would then be appended by a 5 octet ATM header which includes the VCI and/or VPI for routing to the destination ATM remote bridge in the building.
FLOOR 3

If the destination MAC address of the frame is noit present in the address filtering table, then Ibe MAC frame, after being relayed from the bridge port to the virtual port, will be appended by the Connectionless Network Access Protocol (CLNAP) fields and Subnetwork Access Protocol (SNAP) fields at the virtuial port o f the remote bridge. As mentioned in section 2.1, the OSI Network layer [8] consists of the CLNAP and Ihe SNAP sublayers. The network layer has been placed just above the AAL layer in accordance with the KU-T recommendation for obtaining a connectionless type of service from the AAL layer below [9]. The SNAP fields consist o f a 3 octet LAN Organisationally Unique Identifier (OUI) and an adjacent 2 octet LAN Protocol Identification (PID) [5]. These field lengths have been standardised by the IEEE 802.1 working group. The SNAP Protocol Data Unit (PDU) would then be passed to the AAL layer below. The AAL would provide a typc: 3/4 AAL service to the Network layer above. This
service is suitable for the transfer of connectionless data

KEY:

-&
c, vp~ 1-5

I ATM REMOTEBRIDGE W- V I R N A L P A m
IEEE8025LAN

IEEEBOZJLAN
yps betrecm Flwr 1 LANs Rwr 5 LANs

g s

ATM SWTCII betweenDoor3 Subnelwork

-Server "c"

Figure 3. Vimal path connections to connectionless server "C". However, in instances where the destination ATM
remote bridge address cannot be found in the VPI-VCI

on an ATM network [9]. The Segmentation and Reassembly ( S A R ) sublayer o i f

mapping table maintained at the source ATM remote bridge, the absent destination ATM remote bridge

435

Authorized licensed use limited to: UNIVERSITI UTARA MALAYSIA. Downloaded on January 26, 2009 at 21:17 from IEEE Xplore. Restrictions apply.

addresses would be mapped to the VCI andor VPI of a semi-permanent connection to a central connectionless server "C" as shown in Fig. 3. In addition to routing the data, the connectionless ATM server can also provide destination and source address screening for each message received. This would provide data confidentiality to the users of the network. A similar type of address screening facility could also be provided by a Connectionless Broadband Data Service (CBDS) [ll]. The ATM switches in the network would route the cells to the destination ATM node according to the routing information in the cell header. While routing the cells, the VCI andor VPI in the cell header will also be translated at each ATM switch [lo]. The destination ATM node i.e. destination ATM remote bridge will pass the received cells to the ATM layer which will strip gff the 5 octet header from the cells and pass the 48 octet segment to the AAL. The AAL-SAR sublayer would reconstruct the entire transmitted Network PDU from the related segments. The different appendations of the embedded PDUs will be successively stripped off by the receiving peer protocol layers at the virtual port until the actual bridged frame is obtained. While stripping off the frame, the ATM remote bridge will check the Protocol Identification (PID) field. If the PID of the source LAN conforms with the PID of the LAN linked to the bridge port side, the bridged frame will be relayed unchanged to the bridge port. In the event of a PID mismatch, frame conversion should take place to suit the MAC protocol of the LAN connected to the bridge port.
B. Isochronous Communications

sublayer above in t h e protocol stack. A call accept or call rejection frame will be sent back to caller A depending on the availability of user B's IVDS. On receiving a call accept frame, the layers above the LLC in user A's IVDS would request the LLC for a C O M K ~ ~ O ~ ~ data SS transfer over the same SSAP and DSAP logical connection for which the call accept frame was received. This would imply setting up a Connectionless LLC service on a connection-oriented LLC e r vice, necessitated due to the LLC connection-oriented service functionality. According to the IEEE 802 LLC Connection-oriented data transfer protocol, the source LLC sublayer, after sending up to a maximum of seven frames, should wait for an acknowledgment of the transmitted window else after a set default time retransmit the entire window [121. For real time data transfer such z s vsice where + h e dekiy is more important than frame acknowledgment, the transfer of voice packets should be done through the IEEE 802 LLC connectionless service.
B1.l Isochronous and Asynchronous Data Segregation

While transferring data on the ATM network backbone it will be necessary for the ATM remote bridges t o distinguish between isochronous voice traffic and asynchronous data. The identification of voice packets by the ATM remote bridges will facilitate in separately buffering the time critical voice packets f r o m the asynchronous data For the purpose of distinguishing between voice and asynchronous data, the Network layer in the ATM remote bridge can be augmented by an Isochronous Entity (E) as shown in Fig. 4.
E " B
PORT VIRTUAL PORT

A connection-oriented LLC service is required to establish a voice circuit on the proposed in-building network. The initiation of connection-oriented LLC service between users A and B may be performed by the upper layers in user A's IVDS protocol stack. This is implemented using service primitives passed to the lower LLC sublayer requesting a connection-oriented data transfer. In response to the service primitives, user A's LLC sublayer will place a call setup indication in the control field of the LLC PDU along with the Destination and Source Service Access Points @ S A P and SSAP respectively). The DSAP and SSAP are the addresses of peer entities in layers above the source and destination stations LLC respectively. The call setup MAC frame, generated by user A's IVDS and addressed to user B's IVDS, would then be transmitted as an asynchronous datu frame over the in-building network, in a manner described in section 2.1(A). The call setup frame from user A's IVDS would be received by the 802.5 MAC layer of user B's IVDS and forwarded to the LLC

hT3TWORK

T'
A M

KEY : ACK :Acknowledgement Entity IE :Isochronous Entity FCE :Frame Conversion Entity CS :Convergence Sublayer SAR :Segmentationand Reassembly Sublayer AAL :ATM Adaptation Layer

Figure. 4 Proposed sublayers (shown shaded) in ATM remote bridge's virtual port.

A f t e r receiving a MAC frame from the lower layers, the Isochronous Entity, as explained by us in [13] will check the control field of the encapsulated LLC PDU.

436

Authorized licensed use limited to: UNIVERSITI UTARA MALAYSIA. Downloaded on January 26, 2009 at 21:17 from IEEE Xplore. Restrictions apply.

Only on determining a call accept indication in the control field will the IE store in a table the DSAP and the SSAP of the LLC PDU as well as the associated 48 bit destination and source MAC addresses. The tablle generated would facilitate the ATM remote bridge in keeping track of the IVDSs and the entities therein engaged in an isochronous data transfer. Consider a frame received by the IE from the bridge port of the ATM remote bridge. The IE will first compare the fiames source and destination MAC addresses against the list of IVDS MAC addresses stored in its table. If the comparison c o n f i the existence 1 6 the received frames MAC addresses in the table, the IE will then compare the encapsulated LLC PDUs DSAS and SSAP with the associated DSAP and SSAlP stored in the table. Validation of the received DSAP and SSAS addresses in the table for the cxrcsponding XAC addresses will indicate to the ATM remote bridge that the entities within the source and destination IVDSs are engaged on a voice circuit, whereas invalidation of DSAP and SSAP addresses would occur for nonisochronous frames. A similar validation process to segregate the isochronous data from the asynchronoi~s data will be conducted by the IE for packets received ;at the virtual port from the ATM network backbone.
C. LAN Internetworking Issues

Summary of Prtr

and Data Stations (IVDSs) could be supported on the LANs before their intemetworking b) to confirm that the performance metrics show a specific trend with the variation in the: number of IVDSs. The reasons for carrying out stochastic simulations of the end subnetworks formed by LANs are a) to obtain the magnitude of mean transfer delay - which is one of the key performance meuics b) to validate the general trends observed in the results obtained from the performance analysis. As the LAN subnetworks will be offering integrated voice and data service to the users, we have considered hybrid protocols on the IEEE 802.3 and 802.5 LANs. The hybrid protocol considered on the LANs comprises of the standard IEEE 802 protocol for the corresponding end LAN types and a protocol targeted towards isochronous data transfer. These protocols along with the results obtained From the performance of the EEE 802.5 and 802.3 LANs for the transfer of asynchronous and isochronous data are explained in sections 3.1 and 3.2 below, respectively. The data obtained from the simulation of IEEE 802.5 and 802.3 LANs for asynchronous data transfer is also presented in sections 3.1 and 3.2, respectively for comparison with the corresponding analytical data. Further, in section 3.1 the simulation result pertaining to the transfer of isochronous data on the 802.5 LAN is also presented.
3.1 IEEE 802.5 (Token ring) LAN

posed Schemes

A possible method proposed by us in [14] lor solving the above mentioned LAN intemetworking issues lis based on augmentation of the Subnetwork Access Protocol (SNAP) layer at the ATM remote bridges virtual port as shown in Fig. 4. The 802.3 frame received at the virtual port would be converted by Ihe Frame Conversion Entity (FCE) to the frame format of the 802.5 LAN linked to the bridge port of the ATM remole bridge. The ACK entity would convert the 802.5 frame received at the virtual port to the format of the 802.3 LAN linked to the bridge port. If required, segmentation of the 802.5 frame will be carried out by the ACK entity. The ACK entity would further solve the issues of acknowledgment and priority mismatches. Both FCE and ACK entities would also solve the issue of bit order differences. Functionality details regarding the FCE and ACK entities can be referred to in [14].

A) Analytical results Asynchronous data

The asynchronous data on the IEEE 802.5 LAN is transferred based on the IEEE 802.5 LAN protocol. According to this protocol A station that has completed transmission will not issue a new token until the busy token retums. 1 1 1 2 1 This is called the single-token mode. The average .frame transfer time to transfer a frame from a source station to an arbitrary destination station along the IEEE 802.5 ring supporting N stations is given by equation 1 [8511:

3.0 Performance of End Subnetworks


The main objectives for carrying out the performance analysis of the end subnetworks formed by the integrateld
services LANs are : a) to determine whether, fair

where; L = Ring latency I = Tom1 average traffic, (f?atnes/sec) m = Avg. frame length (units of time) = 2G2 (Second moment of the fiatne length) p = Effective trYffic intensity = Am is assumed as 0.8 (1)

different network attributes such as frame lengths and utilisations, a satisfactory number of Integrated Voice

where the fist two terms represent the accem delay which is measured from the time the data packet arrives

437

Authorized licensed use limited to: UNIVERSITI UTARA MALAYSIA. Downloaded on January 26, 2009 at 21:17 from IEEE Xplore. Restrictions apply.

at one of the stations to the time the packet begins transmission. The ring latency L is [151:
L = . F + - A% ---

average for the token to propagate to the next active stations. At the same time the mean time to transfer data on the 802.5 LAN increases with an increase in the number of active stations on the LAN. The normalised throughput vs. mean frame delay data for the transfer of asynchronous frames of mean size 40oO octets by different number of stations on the 802.5 LAN obtained by analysis and simulation is shown in Fig. 6.

0.045

The asynchronous data is assumed to have the exponential packet distribution. For the single-token mode some of the f r a m e s will be longer than the latency of the ring L and some will have frame lengths less th2n L. The average of the resultant frame length distribution to be used in place of m In equation 1 is given by [15]:

0.041

I
-

Analylical result

.$ 0.03I

L+m exp(--)L m

(3)

m U

0.025

By definition the normalised throughput S on the IEEE 802.5 LAN is obtained to be [121 :

0.020.015

0.01 ,999

'

,9991

,9992 .9993 .9994 Normalised throughput

.9995

3 96

Fig. 5 shows the normalised throughput vs. mean frame delay which has been obtained by varying the number of stations N and for asynchronous mean frame sizes ranging from lo00 to 4OOO octets.

+ + + + +

Figure 6. Normalised throughput vs frame transfer delay data on 802.5 LAN for asynchronous mean frame size of 4OOO octets obtained by analysis and simulation.

4000 cctets mcctets 2000 octets

B) Simulation Results - Asynchronous data


Stochastic simulations of the IEEE 802.5 LAN were carried out using the OPNET (Optimised Network o d e l simulated Engineering Tools) simulation tool. The m for asynchronous data transfer on the IEEE 802.5 LAN had the following key attributes : a) exponentially distributed packet arrival times and packet lengths b) ring utilisation of 0.8 c) a l l the packets were generated with the same priority value (as the analysis also assumes packets of equal priority) d) all the stations were considered to have the same token threshold time e) all the stations were considered to have a single bit latency f) Channel capacity of 4 Mb/s. It can be seen from Fig. 6 above that there is a small difference in the values of the mean frame transfer delay obtained analytically and those obtained by simulations. This could be attributed to the variation in the value of queue delay within a confidence interval due to the stochastic nature of the simulation. Fig. 7 shows the variation in the queue delay obtained during the entire run of a simulation as compared to the steady state value obtained by"&ysis.

1000cctets

Transfer delay in sec.

0.01 -0.9996

Normalisedthroughput

Figure 5. Normalised throughput vs. frame delay on 802.5 LAN for various frame sizes. It can be seen from Fig. 5 that the throughput on the 802.5 LAN increases with an increase in the number of active stations. This is because less time is spent on an

438

Authorized licensed use limited to: UNIVERSITI UTARA MALAYSIA. Downloaded on January 26, 2009 at 21:17 from IEEE Xplore. Restrictions apply.

0.08

0'071i
0.06
20
10
L

1.26

128

13

132 134 Mean frame L delay (sec)

136

8 x lo"

138

Simulation value

0.01

'

Figure 8. Number of stations vs. frame delay for the voice traffic m s f e r on 802.5 LAN obtained by analysis and simulation.
250

50

100 150 200 Simulation time

300

D) Simulation results - Isochronous data

Figure 7 . Time variance of the queue delay during simulations of the 802.5 LAN model compared with tile steady state queue delay value obtained analytically.

The model simulated consisted of a l l stations being in an active state and generating only isochronous data. Further, the voice source in the simulation model was modelled as outlined above in section 3.1 C. Fig. 8 shows the graph obtained for the number of stations vs. C) Analytical results Isochronous data mean frame delay for the transfer of isochronous traffic The protocol adopted in this paper to ~ C C Q I I U I I O ~ ~on ~ the simulated model of the 802.5 LAN. The simulated the transfer of time constrained voice data on the same model of the 802.5 LAN used the protocol mentioned in IEEE 802.5 LAN requires that the source staition, &x section 3.1 (C), which is targeted towards isochronous transmitting voice data, immediately ! " f e r ! ; the new data transfer on ithe 802.5 LAN. The results depicted in token. This mode of token transfer suits the chuacterisoic Fig. 8 validate ?he analytically obtained results shown in the same figure for the transfer of isochronous frames on of voice data which is time constrained in contrast 10 the variant of 802.5 LAN. asynchronous data which is sensitive to errors. The voice traffic from each active voice station cam . 2 IEEE 8023 (CSMNCD) LAN Performance be modelled as having alternating talkspurts arid silencta 3 which occur in an exponentially distributed mamner [16]. Analysis If speech activity detection is used voice plackets are -Asynchronous data produced by an active station in a deterministic way A) Analytical ~esults during talkspurts, whereas voice packets are not A variant of rhe CSMNCD protocol as suggested by generated during silence intervals. According to tbie litemme [161 the duration of talkspurts arid silence Maxemchuk I181 has been adopted for transfer of both intervals are exponentially distributed with a mean of 1.2 voice and data. This protocol yields movable TDM and 1.8 s respectively. Furthermore, the duration of each (Time Division Multiplexing) slots and is based on a voice packet has been considered to be 15 ms [17]. Thu!s, variation of the CSMNCD protocol. According to this considering a 32 kbps voice source each isochronouis protocol each station having asynchronous data to transmit accesses the LAN by using the CSMNCD packet from the voice source will contain 60 octets. The delay vs. number of stations data obtained protocol and the station having isochronous data to analytically for the transfer of isochronous traffic on the transmit uses the TDM scheme. However, such a station IEEE 802.5 LAN is shown below in Fig. 8. It can be might get delayed by an asynchronous packet transfer seen from Fig. 8 that the obtained magnitude of the from one of the stations on the LAN, hence the slot time average frame transfer delay will not affect the quality cif for the TDM transmission from the periodic station will voice service. Furthermore, as the number of slations are be moved back in time corresponding to the increased f r o m 10 to 50 the variation in the mean frame asynchronous packet delay thus resulting in movable TDM slots. transfer delay is low.

439

Authorized licensed use limited to: UNIVERSITI UTARA MALAYSIA. Downloaded on January 26, 2009 at 21:17 from IEEE Xplore. Restrictions apply.

The approximate mean frame transfer delay on the variant of the CSMAlCD LAN for asynchronous packets is :

B) Simulation results Asynchronous data

Extensive stochastic simulations of the IEEE 802.3 LAN were carried out using the OPNET (Optimised Network Engineering T o o l s ) simulation tool. The model simulated for asynchronous data transfer on the IEEE where; (5) 802.3 LAN had the following key attributes a) exponentially distributed packet arrival times b) N = Nwnber o f Sratlons maximum utilisation of 0.6 c) random generation of p = Udusadon addresses for source and destination stations d) binary A = 51.2 p sec = Minimumframc t r e n lime exponential backoff scheme e) Average frame size of f i r couision detccdon by the trrurmtf#hg smzion m = % " i d o n delay 1500 octets. Assuming as an approximation an M/M/l queuing system The graph of normalised throughput vs. mean frame for the asynchronous packets arriving at the aperiodic delay obtained by simulating 802.3 LAN for different station nodes, the first term represents the total delay number of stations and the key attributes mentioned time in the queue for a packet in the station nodes [19]. above is shown in Fin. 10. The second term represents the LAN access &!ay 1201 ntin frame transfer d e l a y (sec) (~0.0011 1.9 and the last term represents the average propagation i 1 I ! delay on the LAN. The throughput for the asynchronous j j i l 1.8 packets on the variant of CSMNCD LAN is obtained to l ! j ! be:
S =
m

Fig. 9 shows a comparison of throughput vs. delay for asynchronous packets of 500, loo0 and 1500 octets on the LAN as a functiun of different number of stations N

tctu 1500 m e l s
lcHlilu 1OWOCIets

Normalised Throughput

500 m e 1 5

Figure 10. Normalised throughput vs. frame delay for the transfer of asynchronous frames of mean size 1500 octets on the simulated model of 802.3 LAN. delay is shown within a The mean frame "fer 95% confidence interval using the T-distribution. The throughput obtained from the IEEE 802.3 simulation is lower than that obtained analytically (refer Fig. 9). This is due to the mean contention interval term in the expression for throughput (refer eq 6). The mean contention interval term produces a higher value of the analytical throughput because in the derivation of the mean contention interval it is assumed that a station gains access to the channel with a maximum probability [20] due to which there are less number of collisions. Consequently, the throughput obtained due to the analytical method is higher than that obtained by simulation. For different number of stations on the 802.3 LAN transmitting asynchronous frames; the throughput vs. mean transfer delay data obtained from the simulation and analysis are compared in Fig. 11.

01
NormabsedmrwOtput

Figure 9. Throughput vs. transfer delay for asynchronous data of different packet sizes on the IEEE 802.3 LAN. From Fig. 9, it can be inferred that the throughput of the asynchronous data on the LAN using the CSMNCD protocol decreases with an increase in the number of stations on the LAN. This occurs due to an increase in the likelihood of frame collisions on the LAN with an increase in the number of stations on the LAN. Furthermore, increasing the number of stations on the LAN also causes the mean access delay on the LAN to increase.

440

Authorized licensed use limited to: UNIVERSITI UTARA MALAYSIA. Downloaded on January 26, 2009 at 21:17 from IEEE Xplore. Restrictions apply.

50
40

L 0

;30
20

Fig. 12 shows the throughput vs. delay for isochronous packets of 60 octets on the variant of the CSMNCD LAN as a function of different number of stations. It can be seen from Fig. 12 that for the isochronous packet transfer the transfer delay on the LAN increases linearly with an increase, in the number of stations.

10

3 . 5

Figure 11. Comparison of analytical and simulation dala represented by throughput vs mean frame delay for different number of stations on the 802.3 LAN. Both the analytical and simulation data have been obtained for asynchronous fames of 1500 octets. It can be seen from Fig 11 that the general trend of the throughput vs. mean transfer delay graph obtained analytically and by simulations are in agreement.
C ) Analytical results Isochronous data

Figure 12. Normalised throughput vs. frame transfer delay for isochnous frame of 60 octets on the EEE 802.3 LAN.

4.0 Summary and Conclusions


T h i s paper has proposed an in-building distributed communications network, based on the ATM network backbone, for intemetworking variants of IEEE 802.3 and 802.5 LANs offering mixed voice and data services. The augmentations introduced in the network layer of the ATM remote bridge architecture will address the issues arising as a consequence of intemetworking the IEEE 802.3 and 802.5 LANs. Furthermore, a performance analysis of the integrated services I E E E 802.3 and 802.5 LAN subnetworks which form the end networks in the architecture has been carried for the individual transfer of asynchronous and isochronous data. Based on the results obtained for asynchronous and isochronous data transfer on each of the LANs considered; it can be inferred that a satisfactory number of integrated voice and data stations can be supportedl on the LANs. Also, the analytically obtained results for asynchronous data transfer on IEEE 802.3 and 802.5 L A N s have been validated by stochastic simulations. In addition, the analytically obtained data for the case of isochronous data transfer on the variant of 802.5 LAN has also been validated by stochastic simulations.

As mentioned above, the transmission of isochronous packets on the LAN would be carried out using the TDM scheme. Thus, the transfer delay for the case cif isochronous packet transmission on the variant of 802.3 LAN has been obtained to be:
nmfir
=

a(-)+-+--+e x' 51.2*106 Nx'


2(1-p) - -.

where; x' = Frame length

( 7 ' )

N c

p = Utilisation = Number of Stations = C h l capacity = 1 0 Mlps

The first term [19] represents the waiting time of the M/D/1 queue since the packets would be transmitted by the TDM scheme. The second and the third terms in equation 7 represent the transmission time of Ibe packet and the average propagation delay respectively. The last term in equation 7 represents the TDM channel access delay. The normalised throughput for the islochronous packets on the LAN is given by [19]:

Acknowledgment
where; I = Mean a w i d rate of pnckzt
This work was partially supported by a grant from the Australian Research Council (ARC).

44 3

Authorized licensed use limited to: UNIVERSITI UTARA MALAYSIA. Downloaded on January 26, 2009 at 21:17 from IEEE Xplore. Restrictions apply.

5.0 References
G. Schatzberg, "Internetworking Dissimilar LANs with FDDI," Proceedings - 15th Conference on Local Computer Networks, Minneapolis, pp. 163-171, Sept/Oct 1990. W.S. Currie, LANs Explained: A Guide to Local Area Networks. New Y o r k ;Wiley, 1988. S.E. Minzer, "Broadband ISDN and Asynchronous Transfa M o d e (ATM)," IEEE Communications Magazine, pp. 17-24, Sept. 1989. J.P. Vorstermans and A.P. D e Vleeschouwer, "Layered ATM Systems and Architecture Concepts for Subscribers' FVemises Networks," IEEE Journal on Selected Areas in Communications, vol. 6, No. 9, pp. 1545-1555, December 1988. G.H. Clapp, "LAN Interconnection Across SMDS," IEEE Network, pp. 25-32, Sept. 1991. A. Danthine, "A Backbone Wideband Network for LAN Interconnection," EFOC/LAN 86, Amsterdam, pp. 266-273, JUM 1986. S.L. Sutherland and . I . Burgin, "B-ISDN Interworking," IEEE Communications Magazine, vol. 31, No. 8, pp. 60-63, August 1993. F.M. Burg and N. D i 10130, "Networking of Networks: Interworking according to OSI," IEEE Journal on Selected Areas in Communications,Vol. 7, No. 7, pp. 1131-1142, Sept. 1989. M. de Prycker, R. Peschi, and T.Van Landegem "B-ISDN and the OS1 Protocol Reference Model," IEEE Network, pp. 10-18, March 1993. M. de Prycker, Asynchronous Transfer Mode Solution for Broadband ISDN, Ellis Hawood, 1991.

[ l l ] M. de Prycker, "ATM Switching on Demand," IEEE Network, pp. 25-28, March 1992. [12] W. Stallings, Local Networks: An Introduction, 2nd edition. New York Macmillan, 1984. [13] Vinod Mirchandani and David Everitt, An Internetworking Architecture for Integrated Voice and Data Communications," Proceedings-IEEE TENcoN'94, August 1994 [14] Vinod Mirchandani and David Everitt, "An InBuilding Network Architecture for Integrated Voice and Data Communications," Proceedings o f the 8th

Australian Teletraffic Research Seminar, Melbourne, 1993. [15] M.Schwartz, Telecommunication Networks: Protocols, Modelling and Analysis, AddisonWesley, 1987. [16] B d y P.T.,"A Technique for Investigating On-Off patterns of Speech," The Bell System Technical Journal, Vol. XLIV, pp. 1-22, Jan. 1965. [171 Ibrahim W. Habib and Tarek N. Saadawi, "Multimedia T M i c Characteristics in Broadband Networks," IEEE Communications Magazine, vol. 30, NO. 7, pp. 48-54, July 1992. U81 N.F. Maxemchuk, "A variation on CSMNCD that yields movable TDM slots in Integrated VoiceData Local Networks", Bell System Technical Journal, vol61, Sept 1982. [191 J.L. Hammond and P.J.P. OReilly, Performance Analysis of Local Computer Networks, AddisonWesley, 1986. [201 A.S. Tanenbaum, Computer Networks, 2nd edition. New Jersey; Prentice Hall, 1988.

442

Authorized licensed use limited to: UNIVERSITI UTARA MALAYSIA. Downloaded on January 26, 2009 at 21:17 from IEEE Xplore. Restrictions apply.

Вам также может понравиться