Академический Документы
Профессиональный Документы
Культура Документы
Slide Set 6
In this set....
Token Ring Networks FDDI -- Fiber Distributed Data Interface
Token Ring
Specified by the IEEE 802.5 standard.
Set of nodes are connected in a ring.
Features
Distributed algorithm dictates when each node can transmit. All nodes see all frames : destination saves a copy of the frame when it flows past. Token used to control who transmits.
The Token
The token allows a host to transmit -contains a special sequence of bits. When a node that wishes to send sees the token, it
When frame traverses ring and returns, the sender takes frame off and reinserts token.
picks up the token inserts its own frame instead on the ring.
Physical Properties
Electromechanical relays are used.
Host Host Host Host
To next host
To next host
Relay
Protection against failures -- single node failure should not cause the entire ring to fail.
Units that can interconnect stations. Looks like a star topology. Easy to add/remove stations.
MSAU Host Host
Some details
Remember -- nodes use network adaptor. Contains a receiver, transmitter and storage. 802.5 token is 24 bits in size. Total storage in the network must be enough to hold token.
THT (cont)
In 802.5, THT is specified to be 10 milliseconds. Each node keeps track of how much time is left. It then checks to see if it is enough to transmit next packet (depends on length of packet). If yes, transmit, else, defer.
1. The A bit set to zero, it will deduce that the recipient is absent / non-functional. 2. If A bit =1 but C bit = 0, it deduces that for some reason destination could not accept frame and tries to retransmit.
Priorities in 802.5
802.5 supports priorities -- token has 3 bit priority field. If priority is specified, a node can seize the token only if its own frames priority is > priority specified. In addition, frames have three reservation bits that allow hosts to set priorities.
Token Release
Fr am e
Token
Token
Fra m
(a)
(b)
The Monitor
A special node that ensures the health of the ring. Any station can become the monitor. If monitor is healthy, it periodically announces its presence. If no message seen for awhile, a node will assume that the monitor has failed and will try to become a monitor -- same for new ring/failed monitor. It transmits a claim token --> intent to become monitor. More than one claim -- highest address wins.
Use of a monitor bit, monitor sets this to 1 to see if the frame keeps circulating.
Nuggets: Frame control is the demultiplexing key -- which higher layer protocol. Access control -- frame priority and reservation priority bits.
Manchester coding.
Address -- 48 bits -- as in Ethernet.
FDDI
Fiber Distributed Data Interface Similar to Token ring -- optical fiber. Two rings instead of one; second used if first fails.
FDDI can tolerate single node or link failures.
(a)
(b)
SAS
SAS
SAS
SAS
FDDI Specs
Read book. Important nugget -- there is a maximum number of stations and maximum distance between stations and length of network
Impose time restrictions on token rotation time.
Token is late, do not transmit data Token is early; hold token for difference between TTRT and measured TRT.
Thus....
In the worst case:
First async. traffic use TTRT worth of time. Next sync. traffic use TTRT worth of time. So, total < = 2 x TTRT.
Note: If Sync. traffic was transmitted first and used TTRT, no async. traffic can be sent. Thus, note -- back to back rotations cannot take 2 x TTRT.
In addition...
What if remaining time is only slightly less than TTRT ? -- in other words, it takes longer to transmit an async. frame ? Node will send ! Thus, measured TTRT actually bounded by TTRT + time it takes to transmit a frame.
Token Maintenance
How does one set the TTRT ? How does one ensure that valid token is present ?
Every node monitors ring for valid token. If operations are correct, a node must observe a token or a data frame every so often.
Claim frames
Greatest idle time = Ring latency + frame transmission time. If nothing seen, a node suspects something is wrong and sends a claim frame. Nodes bid for the TTRT using the claim frame. Why bid ? TTRT set to that the node needs so that applications running can meet timing constraints.
Rest of FDDI -- please read book. Next: Wireless/802.11, Chapter 4 -- Network layer and IP.