IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Similar documents
Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

CSE 461: Wireless Networks

IEEE Medium Access Control. Medium Access Control

Mohamed Khedr.

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Medium Access Control. MAC protocols: design goals, challenges, contention-based and contention-free protocols

CS/ECE 439: Wireless Networking. MAC Layer Road to Wireless

Lecture 16: QoS and "

ICE 1332/0715 Mobile Computing (Summer, 2008)

Chapter 12 Multiple Access 12.1

CMPE 257: Wireless and Mobile Networking

Multiple Access Links and Protocols

Data and Computer Communications. Chapter 13 Wireless LANs

Unit 7 Media Access Control (MAC)

Logical Link Control (LLC) Medium Access Control (MAC)

04/11/2011. Wireless LANs. CSE 3213 Fall November Overview

CSE 461: Multiple Access Networks. This Lecture

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CSE 6811 Ashikur Rahman

Wireless Local Area Network (IEEE )

Rahman 1. Application

MAC in /20/06

Computer Communication III

1999, Scott F. Midkiff

CSE/EE 461 Wireless and Contention-Free Protocols

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Lecture 25: CSE 123: Computer Networks Alex C. Snoeren. HW4 due NOW

Multiple Access Protocols

Wireless Communications

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CSC344 Wireless and Mobile Computing. Department of Computer Science COMSATS Institute of Information Technology

The MAC layer in wireless networks

Data always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Media Access Control in Ad Hoc Networks

Lecture 24: CSE 123: Computer Networks Stefan Savage. HW4 due NOW

MAC. Fall Data Communications II 1

Data Communications. Data Link Layer Protocols Wireless LANs

Wireless LANs. ITS 413 Internet Technologies and Applications

CSCD 433 Network Programming Fall Lecture 7 Ethernet and Wireless

Multiple Access Channels

The MAC layer in wireless networks

standard. Acknowledgement: Slides borrowed from Richard Y. Yale

CSE/EE 461 Section 2

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks -IV

CMPE 257: Wireless and Mobile Networking

Wireless Local Area Networks. Networks: Wireless LANs 1

Introduction to Wireless Networking CS 490WN/ECE 401WN Winter Lecture 4: Wireless LANs and IEEE Part II

Unit II. Part A (2 Marks)

Wireless Local Area Networks (WLANs) Part I

Lesson 2-3: The IEEE x MAC Layer

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Introduction to IEEE

Outline. CS5984 Mobile Computing. IEEE 802 Architecture 1/7. IEEE 802 Architecture 2/7. IEEE 802 Architecture 3/7. Dr. Ayman Abdel-Hamid, CS5984

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

Nomadic Communications WLAN MAC Fundamentals

Mohammad Hossein Manshaei 1393

Topics for Today. More on Ethernet. Wireless LANs Readings. Topology and Wiring Switched Ethernet Fast Ethernet Gigabit Ethernet. 4.3 to 4.

Shared Access Networks. Media Access Protocols. Ethernet (802.3) Ethernet cont...

Wireless Local Area Networks (WLANs)) and Wireless Sensor Networks (WSNs) Computer Networks: Wireless Networks 1

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

4.3 IEEE Physical Layer IEEE IEEE b IEEE a IEEE g IEEE n IEEE 802.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

6th Slide Set Computer Networks

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Local Area Networks NETW 901

Redes de Computadores. Medium Access Control

CS 348: Computer Networks. - WiFi (contd.); 16 th Aug Instructor: Sridhar Iyer IIT Bombay

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Link Layer: Retransmissions

Medium Access Control Sublayer

Shared Access Networks Wireless. 1/27/14 CS mywireless 1

Chapter 6 Wireless and Mobile Networks. Csci 4211 David H.C. Du

MULTIPLE ACCESS PROTOCOLS 2. 1

Multi-Channel MAC for Ad Hoc Networks: Handling Multi-Channel Hidden Terminals Using A Single Transceiver

Performance anomaly of b

EE 122: Ethernet and

Embedded Internet and the Internet of Things WS 12/13

MAC protocols. Lecturer: Dmitri A. Moltchanov

Wireless Protocols. Training materials for wireless trainers

SENSOR-MAC CASE STUDY

Wireless Communication and Networking CMPT 371

Strengthening Unlicensed Band Wireless Backhaul

CS 455/555 Intro to Networks and Communications. Link Layer

Chapter 4. The Medium Access Control Sublayer

CSMC 417. Computer Networks Prof. Ashok K Agrawala Ashok Agrawala. Fall 2018 CMSC417 Set 1 1

15-441: Computer Networking. Wireless Networking

The Link Layer and LANs. Chapter 6: Link layer and LANs

Midterm Review EECS 122. University of California Berkeley

IEEE WLAN (802.11) Copyright. Nomadic Communications

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

WLAN (802.11) Nomadic Communications. Renato Lo Cigno - Tel: Dipartimento di Ingegneria e Scienza dell Informazione

Computer Networks. Wireless LANs

original standard a transmission at 5 GHz bit rate 54 Mbit/s b support for 5.5 and 11 Mbit/s e QoS

Wireless Communication and Networking CMPT 371

Wireless LAN -Architecture

ECE 4450:427/527 - Computer Networks Spring 2017

Transcription:

IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1

Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06 CS/ECE 438 - UIUC, Fall 2006 2

Ethernet MAC Algorithm Node A Node B Listen for carrier sense before transmitting Collision: What you hear is not what you sent! 10/11/06 CS/ECE 438 - UIUC, Fall 2006 3

Ethernet MAC Algorithm Node A Node B Listen for carrier sense before transmitting Collision: What you hear is not what you sent! 10/11/06 CS/ECE 438 - UIUC, Fall 2006 3

CSMA/CD in WLANs? Most (if not all) radios are half-duplex Listening while transmitting is not possible Collision might not occur at sender Collision at receiver might not be detected by sender! 10/11/06 CS/ECE 438 - UIUC, Fall 2006 4

Hidden Terminal Problem A B C A s signal strength C s signal strength A B C space 10/11/06 CS/ECE 438 - UIUC, Fall 2006 5

Hidden Terminal Problem Node B can communicate with both A and C A and C cannot hear each other When A transmits to B, C cannot detect the transmission using the carrier sense mechanism If C transmits, collision will occur at node B A B C A s signal strength C s signal strength A B C space 10/11/06 CS/ECE 438 - UIUC, Fall 2006 5

Hidden Terminal Problem Node B can communicate with both A and C A and C cannot hear each other When A transmits to B, C cannot detect the transmission using the carrier sense mechanism If C transmits, collision will occur at node B A B C DATA A s signal strength C s signal strength A B C space 10/11/06 CS/ECE 438 - UIUC, Fall 2006 5

Hidden Terminal Problem Node B can communicate with both A and C A and C cannot hear each other When A transmits to B, C cannot detect the transmission using the carrier sense mechanism If C transmits, collision will occur at node B A B C DATA DATA A s signal strength C s signal strength A B C space 10/11/06 CS/ECE 438 - UIUC, Fall 2006 5

Hidden Terminal Problem Node B can communicate with both A and C A and C cannot hear each other When A transmits to B, C cannot detect the transmission using the carrier sense mechanism If C transmits, collision will occur at node B A B C DATA DATA A s signal strength C s signal strength A B C space 10/11/06 CS/ECE 438 - UIUC, Fall 2006 5

MACA Solution for Hidden Terminal Problem When node A wants to send a packet to node B Node A first sends a Request-to-Send (RTS) to A On receiving RTS Node A responds by sending Clear-to-Send (CTS) provided node A is able to receive the packet When a node C overhears a CTS, it keeps quiet for the duration of the transfer A B C 10/11/06 CS/ECE 438 - UIUC, Fall 2006 6

MACA Solution for Hidden Terminal Problem When node A wants to send a packet to node B Node A first sends a Request-to-Send (RTS) to A On receiving RTS Node A responds by sending Clear-to-Send (CTS) provided node A is able to receive the packet When a node C overhears a CTS, it keeps quiet for the duration of the transfer RTS A B C 10/11/06 CS/ECE 438 - UIUC, Fall 2006 6

MACA Solution for Hidden Terminal Problem When node A wants to send a packet to node B Node A first sends a Request-to-Send (RTS) to A On receiving RTS Node A responds by sending Clear-to-Send (CTS) provided node A is able to receive the packet When a node C overhears a CTS, it keeps quiet for the duration of the transfer RTS CTS CTS A B C 10/11/06 CS/ECE 438 - UIUC, Fall 2006 6

Exposed Terminal Problem A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 7

Exposed Terminal Problem B talks to A C wants to talk to D C senses channel and finds it to be busy C stays quiet (when it could have ideally transmitted) A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 7

Exposed Terminal Problem B talks to A C wants to talk to D C senses channel and finds it to be busy C stays quiet (when it could have ideally transmitted) RTS RTS A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 7

Exposed Terminal Problem B talks to A C wants to talk to D C senses channel and finds it to be busy C stays quiet (when it could have ideally transmitted) RTS RTS CTS A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 7

MACA Solution for Exposed Terminal Problem Sender transmits Request to Send (RTS) Receiver replies with Clear to Send (CTS) Neighbors See CTS - Stay quiet See RTS, but no CTS - OK to transmit A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 8

MACA Solution for Exposed Terminal Problem Sender transmits Request to Send (RTS) Receiver replies with Clear to Send (CTS) Neighbors See CTS - Stay quiet See RTS, but no CTS - OK to transmit RTS RTS A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 8

MACA Solution for Exposed Terminal Problem Sender transmits Request to Send (RTS) Receiver replies with Clear to Send (CTS) Neighbors See CTS - Stay quiet See RTS, but no CTS - OK to transmit RTS RTS CTS A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 8

MACA Solution for Exposed Terminal Problem Sender transmits Request to Send (RTS) Receiver replies with Clear to Send (CTS) Neighbors See CTS - Stay quiet See RTS, but no CTS - OK to transmit RTS RTS RTS CTS A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 8

Collisions Still possible RTS packets can collide! Binary exponential backoff Backoff counter doubles after every collision and reset to minimum value after successful transmission Performed by stations that experience RTS collisions RTS collisions not as bad as data collisions in CSMA Since RTS packets are typically much smaller than DATA packets 10/11/06 CS/ECE 438 - UIUC, Fall 2006 9

Reliability Wireless links are prone to errors High packet loss rate detrimental to transport-layer performance Mechanisms needed to reduce packet loss rate experienced by upper layers 10/11/06 CS/ECE 438 - UIUC, Fall 2006 10

A Simple Solution to Improve Reliability - MACAW When node B receives a data packet from node A, node B sends an Acknowledgement (ACK) If node A fails to receive an ACK Retransmit the packet A B C 10/11/06 CS/ECE 438 - UIUC, Fall 2006 11

A Simple Solution to Improve Reliability - MACAW When node B receives a data packet from node A, node B sends an Acknowledgement (ACK) If node A fails to receive an ACK Retransmit the packet RTS A B C 10/11/06 CS/ECE 438 - UIUC, Fall 2006 11

A Simple Solution to Improve Reliability - MACAW When node B receives a data packet from node A, node B sends an Acknowledgement (ACK) If node A fails to receive an ACK Retransmit the packet RTS CTS CTS A B C 10/11/06 CS/ECE 438 - UIUC, Fall 2006 11

A Simple Solution to Improve Reliability - MACAW When node B receives a data packet from node A, node B sends an Acknowledgement (ACK) If node A fails to receive an ACK Retransmit the packet RTS CTS DATA CTS A B C 10/11/06 CS/ECE 438 - UIUC, Fall 2006 11

A Simple Solution to Improve Reliability - MACAW When node B receives a data packet from node A, node B sends an Acknowledgement (ACK) If node A fails to receive an ACK Retransmit the packet RTS CTS DATA CTS A ACK B ACK C 10/11/06 CS/ECE 438 - UIUC, Fall 2006 11

Revisiting the Exposed Terminal Problem Problem Exposed terminal solution doesn't consider CTS at node C With RTS-CTS, C doesn t wait since it doesn t hear A s CTS With B transmitting DATA, C can t hear intended receiver s CTS C trying RTS while B is transmitting is useless RTS RTS RTS CTS CTS A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 12

Revisiting the Exposed Terminal Problem - MACAW One solution Have C use carrier sense before RTS Alternative B sends DS (data sending) packet before DATA: Short packet lets C know that B received A s CTS Includes length of B s DATA so C knows how long to wait 10/11/06 CS/ECE 438 - UIUC, Fall 2006 13

Deafness For the scenario below Node A sends an RTS to B While node C is receiving from D, Node B cannot reply with a CTS B knows that D is sending to C A keeps retransmitting RTS and increasing its own BO timeout A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 14

Deafness For the scenario below Node A sends an RTS to B While node C is receiving from D, Node B cannot reply with a CTS B knows that D is sending to C A keeps retransmitting RTS and increasing its own BO timeout RTS A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 14

Deafness For the scenario below Node A sends an RTS to B While node C is receiving from D, Node B cannot reply with a CTS B knows that D is sending to C A keeps retransmitting RTS and increasing its own BO timeout RTS CTS CTS A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 14

Deafness For the scenario below Node A sends an RTS to B While node C is receiving from D, Node B cannot reply with a CTS B knows that D is sending to C A keeps retransmitting RTS and increasing its own BO timeout RTS RTS CTS CTS A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 14

Deafness For the scenario below Node A sends an RTS to B While node C is receiving from D, Node B cannot reply with a CTS B knows that D is sending to C A keeps retransmitting RTS and increasing its own BO timeout RTS RTS CTS CTS A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 14

Interframe Spacing Interframe spacing Plays a large role in coordinating access to the transmission medium Varying interframe spacings Creates different priority levels for different types of traffic! 802.11 uses 4 different interframe spacings DIFS medium busy DIFS PIFS SIFS contention next frame direct access if medium is free DIFS t 10/11/06 CS/ECE 438 - UIUC, Fall 2006 15

IEEE 802.11 - CSMA/CA Sensing the medium If free for an Inter-Frame Space (IFS) Station can start sending (IFS depends on service type) If busy Station waits for a free IFS, then waits a random back-off time (collision avoidance, multiple of slot-time) If another station transmits during back-off time The back-off timer stops (fairness) contention window DIFS DIFS (randomized back-off mechanism) medium busy next frame direct access if medium is free DIFS slot time 10/11/06 CS/ECE 438 - UIUC, Fall 2006 16 t

Types of IFS SIFS DIFS Short interframe space Used for highest priority transmissions RTS/CTS frames and ACKs DCF interframe space Minimum idle time for contention-based services (> SIFS) 10/11/06 CS/ECE 438 - UIUC, Fall 2006 17

Types of IFS PIFS EIFS PCF interframe space Minimum idle time for contention-free service (>SIFS, <DIFS) Extended interframe space Used when there is an error in transmission 10/11/06 CS/ECE 438 - UIUC, Fall 2006 18

Backoff Interval When transmitting a packet, choose a backoff interval in the range [0,cw] cw is contention window Count down the backoff interval when medium is idle Count-down is suspended if medium becomes busy When backoff interval reaches 0, transmit RTS 10/11/06 CS/ECE 438 - UIUC, Fall 2006 19

DCF Example B1 = 25 B2 = 20 cw = 31 B1 and B2 are backoff intervals at nodes 1 and 2 10/11/06 CS/ECE 438 - UIUC, Fall 2006 20

DCF Example B1 = 25 wait B2 = 20 data cw = 31 B1 and B2 are backoff intervals at nodes 1 and 2 10/11/06 CS/ECE 438 - UIUC, Fall 2006 20

DCF Example B1 = 25 wait B1 = 5 B2 = 20 data B2 = 15 cw = 31 B1 and B2 are backoff intervals at nodes 1 and 2 10/11/06 CS/ECE 438 - UIUC, Fall 2006 20

DCF Example B1 = 25 wait B1 = 5 data data wait B2 = 20 B2 = 15 cw = 31 B1 and B2 are backoff intervals at nodes 1 and 2 10/11/06 CS/ECE 438 - UIUC, Fall 2006 20

DCF Example B1 = 25 wait B1 = 5 data B2 = 20 data B2 = 15 wait B2 = 10 cw = 31 B1 and B2 are backoff intervals at nodes 1 and 2 10/11/06 CS/ECE 438 - UIUC, Fall 2006 20

Backoff Interval The time spent counting down backoff intervals is a part of MAC overhead Large cw Large backoff intervals Can result in larger overhead Small cw larger number of collisions (when two nodes count down to 0 simultaneously) 10/11/06 CS/ECE 438 - UIUC, Fall 2006 21

Backoff Interval The number of nodes attempting to transmit simultaneously may change with time Some mechanism to manage contention is needed IEEE 802.11 DCF Contention window cw is chosen dynamically depending on collision occurrence 10/11/06 CS/ECE 438 - UIUC, Fall 2006 22

Binary Exponential Backoff in DCF When a node fails to receive CTS in response to its RTS, it increases the contention window cw is doubled (up to an upper bound) When a node successfully completes a data transfer, it restores cw to Cw min cw follows a sawtooth curve 10/11/06 CS/ECE 438 - UIUC, Fall 2006 23

Token Ring Example Token Ring Networks IBM: 4Mbps token ring IEEE 802.5: 16Mbps 10/11/06 CS/ECE 438 - UIUC, Fall 2006 24

Token Ring Example Token Ring Networks IBM: 4Mbps token ring IEEE 802.5: 16Mbps 10/11/06 CS/ECE 438 - UIUC, Fall 2006 24

Token Ring Focus on Fiber Distributed Data Interface (FDDI) 100 Mbps Was (not is) a candidate to replace Ethernet Used in some MAN backbones (LAN interconnects) Outline Rationale Topologies and components MAC algorithm Priority Feedback Token management 10/11/06 CS/ECE 438 - UIUC, Fall 2006 25

Token Ring 10/11/06 CS/ECE 438 - UIUC, Fall 2006 26

Token Ring Why emulate a shared medium with pointto-point links? 10/11/06 CS/ECE 438 - UIUC, Fall 2006 26

Token Ring Why emulate a shared medium with pointto-point links? Why a shared medium? Convenient broadcast capabilities Switches costly 10/11/06 CS/ECE 438 - UIUC, Fall 2006 26

Token Ring Why emulate a shared medium with pointto-point links? Why a shared medium? Convenient broadcast capabilities Switches costly Why emulation? Simpler MAC algorithm Fairer access arbitration Fully digital (802.3 collision detection requires analog) 10/11/06 CS/ECE 438 - UIUC, Fall 2006 26

Token Ring: Topology and Components Relay Single Relay Multistation access units 10/11/06 CS/ECE 438 - UIUC, Fall 2006 27

Token Ring: Topology and Components Relay Single Relay Multistation access units Host From Previous Host Relay To Next Host 10/11/06 CS/ECE 438 - UIUC, Fall 2006 27

Token Ring: Topology and Components Relay Single Relay Multistation access units Host Host From Previous Host Relay To Next Host From Previous Host Relay To Next Host 10/11/06 CS/ECE 438 - UIUC, Fall 2006 27

Token Ring: Topology and Components Relay Single Relay Multistation access units Host Host Host From Previous Host Relay To Next Host From Previous Host Relay To Next Host Host From Previous MSAU Host Host To Next MSAU 10/11/06 CS/ECE 438 - UIUC, Fall 2006 27

Token Ring: Dual Ring Example Token Ring Networks FDDI: 1000Mbps Fiber Distributed Data Interface 10/11/06 CS/ECE 438 - UIUC, Fall 2006 28

Token Ring: Dual Ring Example Token Ring Networks FDDI: 1000Mbps Fiber Distributed Data Interface 10/11/06 CS/ECE 438 - UIUC, Fall 2006 28

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

FDDI Dual ring configuration Self-healing Normal flow in green direction Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

Multistation Access Unit Each station imposes a delay E.g. 50 ms Maximum of 500 Stations Upper limit of 100km Need 200km of fiber Uses 4B/5B encoding Can be implemented over copper 10/11/06 CS/ECE 438 - UIUC, Fall 2006 30

Token Ring: Basic Concepts Frames flow in one direction Token Upstream to downstream Special bit pattern rotates around ring Stations Must capture token before transmitting Must remove frame after it has cycled Must release token after transmitting Service Stations get round-robin service 10/11/06 CS/ECE 438 - UIUC, Fall 2006 31

Token Ring: Basic Concepts Immediate release Used in FDDI Token follows last frame immediately Delayed release Used in IEEE 802.5 Token sent after last frame returns to sender 10/11/06 CS/ECE 438 - UIUC, Fall 2006 32

Token Release Delayed Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

Token Release Delayed Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

Token Release Delayed Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

Token Release Delayed Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

Token Release Delayed Release Early Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

Token Release Delayed Release Early Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

Token Release Delayed Release Early Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

Token Release Delayed Release Early Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

Token Ring: Media Access Control Parameters Token Holding Time (THT) Upper limit on how long a station can hold the token Each station is responsible for ensuring that the transmission time for its packet will not exceed THT Token Rotation Time (TRT) How long it takes the token to traverse the ring. TRT ActiveNodes x THT + RingLatency Target Token Rotation Time (TTRT) Agreed-upon upper bound on TRT 10/11/06 CS/ECE 438 - UIUC, Fall 2006 34

802.5 Reliability Delivery status Trailer A bit C bit Set by recipient at start of reception Set by recipient on completion on reception 10/11/06 CS/ECE 438 - UIUC, Fall 2006 35

802.5 Monitor Responsible for Inserting delay Token presence Should see a token at least once per TRT Check for corrupted frames Check for orphaned frames Header Monitor bit Monitor station sets bit first time it sees packet If monitor sees packet again, it discards packet 10/11/06 CS/ECE 438 - UIUC, Fall 2006 36

Token Maintenance: 802.5 Monitoring for a Valid Token All stations should periodically see valid transmission (frame or token) Maximum gap = ring latency + max frame < = 2.5ms Set timer at 2.5ms send claim frame if timer expires 10/11/06 CS/ECE 438 - UIUC, Fall 2006 37

Timing Algorithm: 802.5 Each node measures TRT between successive tokens If measured-trt > TTRT Token is late Don t send If measured-trt < TTRT Token is early OK to send Worse case: 2xTTRT between seeing token Back-to-back 2xTTRT rotations not possible 10/11/06 CS/ECE 438 - UIUC, Fall 2006 38

Traffic Classes: FDDI Two classes of traffic Synchronous Real time traffic Can always send Asynchronous Bulk data Can send only if token is early 10/11/06 CS/ECE 438 - UIUC, Fall 2006 39

Timing Algorithm: FDDI Each station is allocated S i time units for synchronous traffic per TRT TTRT is negotiated S 1 + S 2 + + S N + RingLatency TTRT Algorithm Goal Keep actual rotation time less than TTRT Allow station i to send S i units of synchronous traffic per TRT Fairly allocate remaining capacity to asynchronous traffic Regenerate token if lost 10/11/06 CS/ECE 438 - UIUC, Fall 2006 40

Timing Algorithm: FDDI When a node gets the token Set TRT = time since last token Set THT = TTRT TRT If TRT > TTRT Token is late Send synchronous data Don t send asynchronous data If TRT < TTRT Token is early OK to send any data Send synchronous data, adjust THT If THT > 0, send asynchronous data 10/11/06 CS/ECE 438 - UIUC, Fall 2006 41

FDDI example Assume RingLatency=12 µs Three active stations Each with Si=20 µs TTRT=100 µs Stations have unlimited supply of asynchronous traffic. 10/11/06 CS/ECE 438 - UIUC, Fall 2006 42

FDDI example Arrival time TRT s/a 0 0 0/0 12 12 20/88 172 160 20/0 252 140 20/0 344 132 20/0 432 120 20/0 Arrival time TRT s/a 4 0 0/0 124 120 20/0 196 92 20/8 276 80 20/20 368 92 20/8 456 88 20/12 Arrival time TRT s/a 8 0 0/0 148 140 20/0 228 120 20/0 320 112 20/0 400 92 20/8 492 92 20/8 10/11/06 CS/ECE 438 - UIUC, Fall 2006 43

FDDI example Arrival time TRT A Arrival time TRT A Arrival time TRT A 0 0 0 4 0 0 8 0 0 12 12 88 124 120 0 148 140 0 172 160 0 196 92 8 228 120 0 252 140 0 276 80 20 320 112 0 344 132 0 368 92 8 400 92 8 432 120 0 456 88 12 492 92 8 524 112 0 548 92 8 580 88 12 616 104 0 640 92 8 672 92 8 704 92 8 736 96 4 764 92 8 796 92 8 828 92 8 860 96 4 888 92 8 920 92 8 952 92 8 984 96 4 1012 92 8 1044 92 8 1076 92 8 1108 96 4 1136 92 8 1168 92 8 1200 92 8 1232 96 4 1260 92 8 1292 92 8 1324 92 8 1356 96 4 1384 92 8 1416 92 8 1448 92 8 1480 96 4 1508 92 8 10/11/06 CS/ECE 438 - UIUC, Fall 2006 44

FDDI Performance Synchronous traffic may consume one TTRT worth of time TRT > TTRT Worst case ϒ TRT < 2*TTRT Any asynchronous traffic plus RingLatency TTRT Synchronous traffic < TTRT 10/11/06 CS/ECE 438 - UIUC, Fall 2006 45

FDDI Performance Can t have two consecutive TRT = 2*TTRT After a cycle with TRT = 2*TTRT, no asynchronous traffic will be sent 10/11/06 CS/ECE 438 - UIUC, Fall 2006 46

Token Maintenance: FDDI Lost Token No token when initializing ring Bit error corrupts token pattern Node holding token crashes Monitoring for a valid token Should see valid transmission (frame or token) periodically within 2*TTRT Maximum gap = RingLatency + MaxFrame 2.5ms 10/11/06 CS/ECE 438 - UIUC, Fall 2006 47