A comparison of DQDB and FDDI for the interconnection of LANs
|
|
- Adela Hensley
- 5 years ago
- Views:
Transcription
1 Distributed Systems Engineering A comparison of DQDB and FDDI for the interconnection of LANs To cite this article: R Ahmad and F Halsall 1994 Distrib. Syst. Engng View the article online for updates and enhancements. Related content - Totally ordered gigabit multicasting X Chen, L E Moser and P M Melliar-Smith - Performance engineering of the Totem group communication system R K Budhia, L E Moser and P M Melliar- Smith - Design and evaluation of a connection management mechanism for an ATMbased connectionless service Geert Heijenk and Boudewijn R Haverkort This content was downloaded from IP address on 13/08/2018 at 21:25
2 Distrib. Syst. Engng i(1994) A comparison of DQDB and FDDl for the interconnection of LANs Riaz Ahmad and Fred Halsall Communications Research Group, Department of Electrical and Electronic Engineering, University College of Swansea, Swansea, SA2 8PP, UK Received 5 November 1993 Abstract. This paper identifies the design issues that must be considered when interconnecting IEEE 802 LANs through either DQDB or FDDI backbone subnetworks using MAC bridges. A series of simulation results are presented that compare the performance of both subnetwork types for various types of LAN traffic, backbone subnetwork sizes (physical coverage and number of LANs) and other performance-critical parameters. The paper concludes with some guidelines to be followed to achieve an optimal performance to meet specific application requirements. 1. Introduction The interconnection of LANs over a complete site, without any performance loss, is currently a major issue being addressed by network designers. The emerging IEEE DQDB [l] and ANSI FDDI [2] standards are the two candidate networks being considered to meet such requirements. Among the alternative interconnection methods, MAC bridges are popular since they are transparent to end stations and can provide a high throughput 131. Moreover, they are now being standardized [4]. One of the prefkrred ways to interconnect LANs that are distributed over a site is by the connection of each LAN, via a bridge, to a high-speed backbone subnetwork [5]. The general scheme is shown in figure 1. Bridges are being proposed also for interconnecting highspeed LANs and backbones [6]. This paper is concerned with a detailed performance comparison of DQDB and FDDI when each is being used as a backbone subnetwork. In the next section, the essential features of both subnetwork types and bridges are presented and this is followed by a description of the issues relating to the interconnection of IEEE 802 LANs that must be addressed. This is followed by a set of performance results which have been obtained from a series of computer simulations. The paper concludes with some guidelines to be followed to achieve an optimum performance to meet specific application requirements. Figure 1. A typical network comprising a high-speed backbone interconnecting several heterogeneous LANs /94/ $19.50@1994 The British Computer Society, The institution of Electrical Engineers and IOP Publishing Ltd
3 R Ahmad and F Halsall 2. FDDI The architecture of a fibre distributed data interface (FDDI) subnetwork consists of two independent optical fibre rings. These are referred to as the primary ring and the secondary ring, each carrying data in opposite directions at a rate of 100Mbps. The proposed standard specifies the maximum fibre path length to be 200km with up to 500 physical connections. A typical FDDI network configuration is shown in figure 2. As can be seen, there are two types of station: a dual attachment station, which is connected to both rings, and a single attachment station, which is attached only to the primary Mg. In practice, most stations are attached to the ring via a wiring concentrator. Further information on the FDDI standard can be found in [7,8]. FDDI uses a timed token rotation protocol to control access to the medium. Each station measures the time that has elapsed since a token was last received. As part of the ring initialization prmess, all stations negotiate a target token rotation time (TTRT). The asynchronous service allows the use of a token only when the time since a token was last received has not exceeded the established TTRT. Each station on the ring measures the time since it last received the token. The time interval between two successive receptions of the token by a station is called the I /U -.\ I Secondary Ring U Figure 2. FDDl network schematic layout. token rotation time (TRT). On receipt of the token, if a station has asynchronous (data) traffic to send, it computes the difference in the time between the TTRT and the actual token rotation time (TRT); that is (TTRT - 'RT). The difference is known as the token holding time (THT). If THT is positive, the station can transmit for this interval prior to releasing the token. As can be deduced from this, the TTRT establishes a guaranteed maximum response time for the ring since, in the worst case, the time between the arrival of two successive tokens will never exceed twice the TTRT value. Various performance studies of FDDI parameters have been reported in [9, IO], where the performance of FDDI has been shown to be dependent on the TTRT, the size of the network (length of cable), the total number of stations and the frame size. The TTRT, however, has been shown to be the key parameter that can be used to optimize the performance of network. As will be seen, unlike DQDB, FDDI provides fair access for all users for any network size and traffic load. 3. DQDB The architecture of a distributed queue dual bus (DQDB) subnetwork consists of two unidirectional buses as shown in figure 3. Both buses, referred to as bus A and bus B, cany data in opposite directions allowing full duplex communication between any pair of stations connected to the network. As both buses are operational at all times, the total available bandwidth is up to twice the bandwidth of a single bus. The operation of the two buses in the transfer of data is independent. The head of each bus generates fixedlength slots which are used to cany data between stations on their respective buses. All data flow on both buses terminates at the end of the bus. As specified in the IEEE standard, a station cannot remove data and can only alter it when permitted by the access protocol. The DQDB layer provides two modes of access control to the dual buses: prearbitrated (PA) and queued arbitrated (QA), which are used to provide isochronous and asynchronous services respectively. This paper quantifies the performance of a single DQDB subnetwork for the interconnection of LANs carrying connectionless data only. The following Bus A Slotwithdirectionof flow U-- Figure 3. DQDB dual bus architecture. AU, access unit: 8, busy bit; R, request bit. 128
4 A comparison of DQDB and FDDI for the interconnection of LANs Bus A.1 <., & Count down for each empty QA slot on bus A.._..._ Transfer RQ count Counter (RQ) 't Count new requests on bus B counter (CO) Bus E Figure 4. DQDB access control using busy and request bits. description, therefore. refers to the DQDB protocol for the QA access mode only. The operation of the access control protocol is based upon two control bits contained in the access control field of the slot header: the BUSY bit and the REQUEST (REQ) bit. The BUSY bit indicates the slot status whether empty or occupied. The REQ bit is used to indicate when a segment has been queued for transmission on the opposite bus. Each station, by counting REQ bits from bus B and empty slots that pass on bus A, can determine the number of segments that are ahead of it in the distributed queue for bus A. The distributed queue uses two counters in each station: a request (RQ) counter and a count down (CD) counter as shown in figure 4. The RQ counter is used to maintain a count of the number of stations downstream on bus A which have requested access to bus A via REP bits on bus B. A station that has a segment to transmit on bus A sets a REQ bit on bus B, and transfers the current value of the RQ counter into the CD counter. The CD counter thus indicates the number of segments which are queued by the downstream stations before the current request was made and hence the number of empty slots the station must allow to pass on bus A. For each empty slot allowed to pass downstream on bus A, the CD counter is decremented. When the CD counter becomes zero, the station can send its segment in the next empty slot that passes on bus A. Each station can place only one segment at a time in the distributed queue. A separate queue is operated for each of the two buses, with separate counters at each station for each bus. A performance study of the DQDB protocol reported in [ll] shows that the basic access protocol has unfair bandwidth sharing for users when there are heavy traffic demands; especially at higher network speeds and larger station separations. The proposed IEEE standard specifies a bandwidth balancing (BWB) mechanism to ensure fair sharing of bandwidth between stations operating at a single priority. The impact of the bandwidth balancing mechanism on network performance will be expanded upon later. 4. Transparent bridges Bridges operate at the medium access control (MAC) sublayer and are transparent to end stations. A description of the detailed operation of transparent bridges is given in [3]. A bridge receives and buffers all frames in their entirety before performing the relaying (interconnection) function. During normal operation, the MAC address of each end station is leamt by the bridge and retained in a routing table known as the forwarding database. After the learning phase, when a frame is received at a bridge port, the forwarding database is searched to determine whether the destination address is present for this port. If so, the frame is discarded, otherwise it is relayed to the appropriate port for forwarding. The bridges do not inspect or change the data carried by the MAC frame and end stations perceive the bridged network as a single, extended LAN. 5. LAN interconnection issues The various IEEE 802 LAN standards differ at the physical layer and medium access control (MAC) sublayer, but are compatible at the logical link control (LLC) sublayer [12]. The relationship between FDDI, BEE and the different 802 LANs within the three lower layers of the IS0 reference model is shown in figure 5. Both FDDI and IEEE provide a connectionless MAC service to the LLC sublayer in a manner consistent with other 802 LANs. I Network Laver I Figure 5. Position of IEEE 802 LANs, FDDl and IEEE in IS0 reference model. LLC, logical link control; MAC, medium access control. 129
5 R Ahmad and F Halsall This makes both network types suitable for use as backbones for LAN intekonnection using MAC bridges. The maximum frame size specified in FDDI is 4500 bytes and in 802.6,9188 bytes, both of which are greater than the maximum frame size range of (CSMAKD) LANs (1518bytes). Although the= is no specifiedframe size limit in (token ring) when interconnected via MAC bridges the frame size with these LANs must not exceed the allowable limits of the backbones. Moreover, FDDI, IEEE and each of the 802 LANs use and can recognise only unique frame formats specific to their MAC protocol. Hence, in the same way that frames between dissimilar 802 LANs cannot be relayed, LAN frames cannot be transmitted directly onto either an FDDI or DQDB backbone. The bridge, therefore, must encapsulate a LAN frame within a FDDI or DQDB MAC frame before forwarding it onto the backbone. Then, prior to forwarding the frame onto the destination LAN subnetwork, the MAC frame must be decapsulated and retransmitted in the correct format. In order to encapsulate a LAN frame within a FDDI MAC frame, 27 bytes are added. For DQDB, at least 28 bytes are added to form an initial MAC protocol data unit (TMPDU). In FDDI, MAC frames are transmitted on the medium without segmentation. In the w e of DQDB, each JMPDU is segmented into fixed length (44byte) units. Control and message identifier fields are then added to each segment prior to transmission in a 53-byte DQDB slot. These are used by the destination stations to reassemble segments into the original IMPDU. To avoid the unnecessary use of both buses, the source bridge must know which of the two buses to use for transmitting each frame. One suggestion E In 8 50 m m 30 v) s 20 5l 10.,.... _ I..... _ I _ _....._._.... I.. given in the standard is the generation of a bus selection table for evely end station on the entire bridged network. With this scheme, however, table maintenance can become unacceptably large as the size of the bridged network increases. In general, therefore, this is not used and each frame is transmitted on both buses. All bridges then reassemble all segments received back into their initial MAC PDU and, from thejr stored forwarding database, relay appropriate frames onto their required LAN subnetwork. As can be concluded from the foregoing, DQDB requires additional segmentation/reassembly overheads compared with FDDI. Moreover, if both rings in FDDI are used, this yields a more efficient utilization of transmission bandwidth. To enhance the performance of the DQDB, a scheme known as destination release has been proposed A special bit, called previous slot received (PSR), is defined in the slot header which indicates whether or not the previous slot has been read. Some special access nodes, called eraser nodes, 'erase' all the slots that have been marked as 'read' so that they can be reused downstream by other users. In practice, however, because of the similar reasons meddoned before, bridges cannot set PSR bits. Hence, with bridges, the total available bandwidth of a DQDB backbone remains equal to the transmission rate of a single bus. 6. Simulation environment The results presented in the following section have all been derived using a commercial simulation packag- NETWORK II.5 [14]. For comparison purposes, both FDDI and DQDB have been modelled for similar network configurations and similar LAN traffic. Both run at the. I....'....'. L....,.. I...-. A..... I.... _ I -... _I.. ~. L... I -. -.,... _ I_ _ ~. _ _.,...~..., ". ~ User location..,., t 1 0 k m +50km +100hm-+r200km Figure 6. Unfair behaviour of DQDB for various stations at different positions on the bus. 130
6 A comparison of DQDB and FDDl for the interconnection of LANs Node Number -+ Unbalanced + 6W6-M = 8 BWB-M = 4 Figure 7. impact of bandwidth balancing mechanism on the fairness of DQDB Total Load (Mbps) I DQDB(BWB-M = 6) + FDDlmRT =4 ms) X FDDI(TTRT= 8 ms) I Figure 8. Performance comparison of DQDB and FDDl subnetworks (frame size = 64 bytes, network size = 100 km). transmission rate of 100Mbps. In DQDB, each frame is transmitted on both buses and, to keep the same bandwidth, a single FDDI ring is used. The physical size of the backbone is varied from 1!un to 300 b. The TTRT values used for FDDI are 4 and 8 milliseconds. The bandwidth balancing modulus (BWB- M) values for DQDB vary from 4-8. Each backbone contains 10 bridges and each bridge connects two similar LANs to the backbone. The performance of each backbone type was measured for three frame and 1218bytes (to represent 131
7 ~ ~ R Ahmad and F Halsall Total Load (Mbps) + DODB(BW8-M-6) -e- FDDI(TRT=4mS) + FDDI(lTRT=BmS) Figure 9. Performance comparison of DQDB and FDDl subnetworks (frame size = 1218 bytes, networksize = 100 km). m 0 I Total Load (Mbps) + DQDB(BW5M = 6) + FDDl(rTRTr4 ms) X F DDIWT =8 ms) Figure 10. Performance comparison of DQDB and FDDl subnetworks (fmme size = 4000 bytes, network size = 100 km). CSMA/CD frames) and 4000bytes (to represent token ring.) The anival of frames at bridges from each of the LANs is exponentially distributed and the total traffic over the backbones is uniformly distributed between the bridges. The performance measures are. the mean response time of the backbone with varying offered load and the maximum effective throughput for various backbone sizes and varying traffic. The mean backbone response time is 132
8 A comarison of DQDB and FDDI for the interconnection of LANs defined as the delay between the frame arriving at the source bridge and the corresponding destination bridge receiving the entire frame. For the comparison of the two backbone subnetworks, the bridge processing overheads are assumed to be negligible. The presented simulation results are after the steady state network conditions have been reached. 7. Simulation results As indicated earlier, a feature of a DQDB subnetwork is that, under heavy load conditions, the access delay of stations varies depending on their position on the bus. This is shown in figure 6. Station numbers indicate their relative position on the bus; station 1 is close to the head of bus A and station 10 is close to the bead of bus B. To simulate heavy load conditions, all stations always have a segment ready to transmit on bus A. As seen from the graphs the stations located in the middle experience longer access delays. Also the extent of unfairness increases with increasing network size. Stations located next to the bus heads always show a better performance. Such unfairness is unacceptable for backbone networks and it is for this reason that the bandwidth balancing (BWB) mechanism has been introduced. To implement the BWB mechanism, each station has a BWB counter which is incremented after every transmission. Then, whenever the BWB counter reaches a limit known as the BWB-modulus, M, the RQ counter is incremented by one thereby forcing the station to let a free slot pass. The impact of using a BWB - M = 4 and 8 for a 200km network is shown in figure 7. The network still shows a level of unfairness with a BWB - M = 8 and completely fair with a BWB - M = 4. From other simulation results it was found that a BWB - M = 6 for lookm and 8 for smaller network sizes is suitable. Hence in the rest of the simulation results presented, these BWB - M values have been used for corresponding network sizes. The performance comparison of FDDI and DQDB backbones for various frame sizes is presented in figures The backbone size is lookm and the total offered load varies from 1 to 100Mbps. A frame size of 64bytes has been used for the results in figure 8. The effective throughput of a FDDI backbone is 60.5 Mbps with a TTRT = 4 and 65.5 Mbps with a ltrt = 8. The DQDB backbone gives a throughput of only 39.6Mbps with this frame size. The MAC frame encapsulation overheads are responsible for the low throughputs in both types of backbone. The segmentation overheads in DQDB further reduce the effective throughput. After encapsulation, the 64 byte MAC frame size is increased to 92 bytes to form an IMPDU with DQDB which, in turn, requires 3 slots. For larger frames, the impact of encapsulation overheads is relatively small as shown in figures 9 and 10. These are for 1518byte and 4000 byte frame sizes respectively. Similar results have also been reported in 1151 for a different traffic model. For both FDDI and DQDB, the backbone response times are Backbone Size (km) (byte) (byte) -e, (byte) Figure 11. Maximum throughput of DQDB and FDDI subnetworks at various frame and network sizes. 133
9 R Ahmad and F Halsall relatively low. The DQDB has relatively lower delays within its effective bandwidth range compared to FDDI. Using a "RT=8, the FDDI throughput is further increased compared with a TTRT = 4. The maximum throughput obtained for different frame sizes with varying backbone lengths is shown in figure 11. As can be seen, for a 1 km FDDI backbone (TTRT = 4), 99 Mbps throughput can be obtained with a 4000 byte frame size. Also, the throughput of FDDI decreases with longer distances whilst there is almost no change 'U the throughput with DQDB. 8. Conclusions This paper has presented simulation results relating to the use of FDDI and DQDB networks for the interconnection of LANs. Both networks have been used as backbone subnetworks and the effect on their performance of veing operational parameters investigated. In the case of DQDB, the unfair access delay of stations in relation to their position on the bus has been identified and the effect of the use of a bandwidth balancing mechanism demonstrated. It may be concluded from the throughput delay graphs that both networks give a low access delay up to their throughput limits. However the FDDI backbone gives a higher maximum throughput for all frame sizes providing the network size is less than 140km. This is particularly the case with the lowest frame size because of the larger segmentation overheads with DQDB. For distances greater than 140!un, then DQDB gives a better throughput for the larger frame sizes which demonstrates its appeal for metropolitan area networks. References [I] Draft of Proposed IEEE Standard Distributed Queue Dual Buses (DQDB) Subnetwork of a Metropolitan Area Network (MAN) 1990 Media Access Control (MACJ and Physical Luyer Protocol Documents Draft P802.6D12 [2] American National Standard 1989 FDDI Token-Ring Media Access Control (MAC) ANSI X [3] Backes F 1988 Transparent bridges for interconnection of leee SO2 LANs IEEE Network 2 (1) 5-9 [4] Draft of Proposed IEEE standard MAC Bridges 1989 DraftP802.1 dd8 [51 Ahmad R and Halsall F 1992 Performance analysis of bridged LANs IEE Proc. E [6] Ahmad R and Halsall F 1993 Interconnecting high-speed LANs and backbones IEEE Network 7 (5) [q Ross F E and Hamstra I R 1993 Forging FDDI IEEE J. Selected Areus Commun Jain R 1993 FDDI: Current issues and future plans IEEE Commun.Mug.31(31) Dykeman D and Bux W 1988 Analysis and tuning of the FDDI media access control protocol IEEE J. Selected Areas Commun Jain R 1991 Performance analvsis of FDDI token rinr networks: effect of paramete& and guidelines for setting TTRT IEEE LTS 2 (2) [ll] Hahne E L, Choudhuy A K and Maxemchuk N F 1992 DODB networks with and without bandwidth balancinr IEEE Trans. Commun Halsall F 1992 Data Communications, Comouter Networks and Open Systems 3rd edn (Reading, 'MA Addison- Wesley) [13] Zukerman M and Potter P 1990 A protocol for eraser node implementation within the DQDB framework Proc. IEEE GLOBECOM' 90 Vo13 (New York: IEEE) pp 1400 [14] Network D User's Manual, Version 7.0 CACI Producs Company, La Jolla, California 1151 Wainwright N and Myles A 1989 A comparison of FDDI Fiber Optic Network with the Engineering IEEE Metropolitan Area. Network IEE Coll. on Fiber Optic LANs and Techniques for the Local Loop (London) (London: IEE) Digest No
Local Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationDQDB. Distributed Queue Dual Bus (DQDB) DQDB is a MAN. Unlike FDDI, DQDB is an IEEE standard: 802.6
DQDB Distributed Queue Dual Bus (DQDB) DQDB is a MAN. Unlike FDDI, DQDB is an IEEE standard: 802.6 1 Topology: Dual Bus DQDB (cont d) Head End Host Host Host Host Head End 2 DQDB Frame Format 53-byte frame
More informationECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII
ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing
More informationSwitched Multimegabit Data Service (SMDS)
CHAPTER 14 Switched Multimegabit Data Service (SMDS) Background Switched Multimegabit Data Service (SMDS) is a high-speed, packet-switched, datagram-based WAN networking technology used for communication
More informationSwitched Multimegabit Data Service
CHAPTER 14 Chapter Goals Tell how SMDS works, and describe its components. Describe the operational elements of the SMDS environment, and outline its underlying protocol. Discuss related technologies.
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationPerformance Analysis of FDDI. By Raj Jain
Performance Analysis of FDDI By Raj Jain This paper is a modified version of "Performance Analysis of FDDI Token Ring Networks: Effect of Parameters and Guidelines for Setting TTRT," by Raj Jain, published
More informationTHROUGHPUT IN THE DQDB NETWORK y. Shun Yan Cheung. Emory University, Atlanta, GA 30322, U.S.A. made the request.
CONTROLLED REQUEST DQDB: ACHIEVING FAIRNESS AND MAXIMUM THROUGHPUT IN THE DQDB NETWORK y Shun Yan Cheung Department of Mathematics and Computer Science Emory University, Atlanta, GA 30322, U.S.A. ABSTRACT
More informationFigure 10.1 Cell switching principles: (a) routing schematic; (b) VP routing; (c) VC routing.
Figure. Cell switching principles: (a) routing schematic; (b) VP routing; (c) VC routing. (a) PCI =,,, 4 4 PCI =, 4 4 6 PCI = 6, Link/Port RT Link/Port RT Link/Port RT In Port PCI 4 Out Port PCI 4 6 Port
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More information1999, Scott F. Midkiff
Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationCSE/EE 461 Wireless and Contention-Free Protocols
CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application
More informationFDDI. L26 - Fibre Distributed Data Interface (FDDI) L26 - Fibre Distributed Data Interface (FDDI) FDDI - Fiber Distributed Data Interface
FDDI - Fiber Distributed Data Interface FDDI Fiber Distributed Data Interface Principles, Framing and Procedures set of standards defining a shared media 100 Mbps LAN (MAN) main topology: dual ring of
More informationComputer Communication Networks
Chapter 3 Computer Communication Networks Objective of this chapter: The performance of any distributed system is significantly dependent on its communication network. The performance of the computer network
More informationChapter 15 Local Area Network Overview
Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard
More informationLecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren
Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits
More informationDESIGN AND IMPLEMENTATION OF A CAN / ETHERNET BRIDGE
DESIGN AND IMPLEMENTATION OF A CAN / ETHERNET BRIDGE H.Ekiz, A.Kutlu, M.D.Baba, E.T.Powner University of Sussex, Brighton BN1 9QT, United Kingdom Abstract The Controller Area Network (CAN) is a serial
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationDistributed Queue Dual Bus
Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover
More informationLocal Area Network Overview
Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and
More informationBridging and Switching Basics
CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device
More informationSIMULATION OF PACKET DATA NETWORKS USING OPNET
SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationPart3. Local Area Networks (LAN)
Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly
More informationFDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC
FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC Kang G. Shin Real-time Computing Laboratory EECS Department The University of Michigan Ann Arbor, Michigan 48109 &in Zheng Mitsubishi
More informationData Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs
Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs Hello and welcome to today s lecture on high speed
More informationLocal Area Network(LAN)
Local Area Network(LAN) A local area network (LAN) is a computer network that interconnects computers within a limited area. Example: a residence, school, laboratory, university campus,office building
More informationThe Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.
The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)
More informationGood day. In the last lecture, we talked about various multiple access schemes and one of this set of schemes is token bus DQD etc.
Computer Networks Prof. Sujoy Ghosh Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 14 Token-Based MAC Good day. In the last lecture, we talked about various
More informationIntroduction to LAN Protocols
CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationIntroduction to LAN Protocols
CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various
More informationFDDI by default supports Early Token Release. Below is the operation of FDDI ring.
Lecture 9 Fault Tolerance FDDI is also built for fault tolerance. It is actually two networks, one going counter-clockwise and the other clockwise (as usually drawn). Normally only the primary links, i.e.
More informationContent. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control
Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media
More informationLAN Interconnection. different interconnecting devices, many approaches Vasile Dadarlat- Local Area Computer Networks
LAN Interconnection different interconnecting devices, many approaches 1 Need for ability to expand beyond single LAN; appears concept of Extended LAN, extending the number of attached stations and maximum
More informationChapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of
More informationDQDB Networks with and without Bandwidth Balancing
DQDB Networks with and without Bandwidth Balancing Ellen L. Hahne Abhijit K. Choudhury Nicholas F. Maxemchuk AT&T Bell Laboratories Murray Hill, NJ 07974 ABSTRACT This paper explains why long Distributed
More informationEthernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub
Campus Network Design Thana Hongsuwan Ethernet Hub 2003, Cisco Systems, Inc. All rights reserved. 1-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 1-2 Sending and receiving Ethernet frames
More informationCH : 15 LOCAL AREA NETWORK OVERVIEW
CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating
More informationIntroductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.
Introductory to Computer Networks Local Area Networks Lecture 16 Fall 2010 Isfahan University of technology Dr. Faramarz Hendessi What is a LAN? Local area means: Private ownership freedom from regulatory
More informationUnit II. Part A (2 Marks)
Unit II Part A (2 Marks) 1. Differentiate fast Ethernet and Gigabit Ethernet. Fast Ethernet increased speed from 10 to 100 megabits per second (Mbit/s). Gigabit Ethernet was the next iteration, increasing
More informationChapter 11 in Stallings 10 th Edition
Local Area Network Overview Chapter 11 in Stallings 10 th Edition CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationLocal Area Networks CONSYL Introduction to Computer Communications and Networks
Local rea Networks 4/11/40 page 1 Faculty of Engineering, Kasetsart University Local rea Networks 1-1 LN characteristics confined within geographical area relatively high data rate under single management
More informationM242 COMPUTER NETWORS AND SECURITY
M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location
More informationThe random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure
Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of
More informationComputer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and
Computer Communications and Network Basics p. 1 Overview of Computer Communications and Networking p. 2 What Does Computer Communications and Networking Technologies Mean? p. 3 What Is a Computer Network?
More informationReal-Time (Paradigms) (47)
Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed
More informationCSE/EE 461 Section 2
CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan
More information1. Data Link Layer Protocols
1. Data Link Layer Protocols Purpose of the Data Link Layer The Data Link Layer Purpose of the Data Link Layer Data Link Sublayers Network LLC Sublayer Data Link Physical MAC Sublayer 802.3 Ethernet 802.11
More informationChapter 4 NETWORK HARDWARE
Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.
More informationLocal Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring
Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring Networks: Local Area Networks 1 Network Layer Network Layer LLC 802.2 Logical Link
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More informationModelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks
Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:
More informationChapter 8 LAN Topologies
Chapter 8 LAN Topologies Point-to-Point Networks In a Point-to-Point network, each wire connects exactly two computers Point To Point Link Machine A Machine B Figure 1: Each line connects two machines
More informationMore on LANS. LAN Wiring, Interface
More on LANS Chapters 10-11 LAN Wiring, Interface Mostly covered this material already NIC = Network Interface Card Separate processor, buffers incoming/outgoing data CPU might not be able to keep up network
More informationDesign and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan
Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan
More informationLecture 9: Bridging & Switching"
Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationData Transport Networks
DC 8-1 DATACOMM John Abbott College JPC Data Transport Networks M. E. Kabay, PhD, CISSP Director of Education, ICSA President, JINBU Corp Copyright 1998 JINBU Corp. All rights reserved DC 8-2 Data Transport
More informationToken Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1
Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations
More informationPerformance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation
Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Sanjay P. Ahuja, Kyle Hegeman, Cheryl Daucher Department of Computer and Information Sciences University
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More information1. Data Link Layer (Layer 2)
1. Data Link Layer (Layer 2) The Data Link layer provides a means for exchanging data over a common local media. The Data Link layer performs two basic services: Allows the upper layers to access the media
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control
More informationLLC and Bridges. Raj Jain. Professor of CIS. The Ohio State University
LLC and Bridges Professor of CIS Columbus, OH 43210 Jain@ACM.Org This presentation is available on-line at: http://www.cis.ohio-state.edu/~jain/cis677-00/ 7-1 Overview Logical Link Control Bridges Path
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationCHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS
CHAPTER 15 LOCAL AREA NETWORKS ANSWERS TO QUESTIONS 15.1 Computer room networks require very high data rates and usually are concerned with transfer of large blocks of data. 15.2 Backend LAN: Backend networks
More informationA LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,
CBCN4103 A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers, servers, and other devices. LANs offer computer
More informationCampus Network Design
Campus Network Design Thana Hongsuwan 2003, Cisco Systems, Inc. All rights reserved. 1-1 Content Ethernet Standard Transparent Bridges LAN Switches LAN and Switch Operation Loop Resolution Virtual LANs,
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for
More informationTroubleshooting Transparent Bridging Environments
Troubleshooting Transparent Bridging Environments Document ID: 10543 This information from the Internetwork Troubleshooting Guide was first posted on CCO here. As a service to our customers, selected chapters
More informationLocal Area Network. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7. Review of Lecture 7.
Review of Lecture 7 Local rea Network! Question - What are the station types supported by HDLC? Describe each. References: Chapters 15 and 16 Stallings Chapters 14 and 16 Forouzan Study Guide 8 Review
More informationCSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!
CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also
More informationLAN Overview (part 2) Interconnecting LANs - Hubs
LAN Overview (part 2) CSE 3213 Fall 2011 1 November 2011 Interconnecting LANs - Hubs active central element of star layout each station connected to hub by two UTP lines hub acts as a repeater limited
More informationBROADBAND AND HIGH SPEED NETWORKS
BROADBAND AND HIGH SPEED NETWORKS INTRODUCTION TO DATA COMMUNICATION NETWORKS Data communications are the exchange of data between two devices via some form of transmission medium such as a wire cable.
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationGrowth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
More informationPERFORMANCE OF INTERCONNECTING FDDI NETWORKS THROUGH ATM WHEN MANAGING VIDEO TRAFFIC *
PERFORMANCE OF INTERCONNECTING FDDI NETWORKS THROUGH ATM WHEN MANAGING VIDEO TRAFFIC * David Andrés, Joan Vila, Jordi Domingo and Josep Solé Departament d Arquitectura de Computadors, Universitat Politècnica
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationLocal Area Networks. Ethernet LAN
Local Area Networks Ethernet 802.3 LAN -7-1 Local Area Networks (Lokale Netze) Wide Area Network LAN -7-2 Local Area Networks What is a LAN? Multiple systems attached to an often shared medium high total
More informationIEEE 802 LANs SECTION C
IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationMetro technologies GE, SRP, RPR and more abbreviations. Lars Hanson, Stefan Lindeberg,
Metro technologies GE, SRP, RPR and more abbreviations Lars Hanson, lha@cisco.com Stefan Lindeberg, stefan@lindeberg.net Agenda Introduction Gigabit Ethernet Cisco Spatial Reuse Protocol, SRP Building
More informationLocal Area Networks. Lecture 17 Fall Token Ring and FDDI
Local Area Networks Lecture 17 Fall 2010 Token Ring and FDDI IEEE 802.5 Ring LAN Unidirectional ring network 4 Mbps and 16 Mbps on twisted pair Differential Manchester line coding Token passing protocol
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationLAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science
1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we
More informationChapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 3 Underlying Technology TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To briefly discuss the technology of dominant
More informationData Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies
Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services
More informationData and Computer Communications. Chapter 11 Local Area Network
Data and Computer Communications Chapter 11 Local Area Network LAN Topologies Refers to the way in which the stations attached to the network are interconnected Bus Topology Used with multipoint medium
More informationTest Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair
Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/
More informationImplement VTP. LAN Switching and Wireless Chapter 4 Modified by Tony Chen 10/01/2008
Implement VTP LAN Switching and Wireless Chapter 4 Modified by Tony Chen 10/01/2008 ITE I Chapter 6 2006 Cisco Systems, Inc. All rights reserved. Cisco Public 1 Notes: If you see any mistake on my PowerPoint
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationThroughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1
455 Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1 Assistant Professor, Department of Computer Science and Engineering Punjabi University
More information