Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

Similar documents
Token Ring/IEEE 802.5

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded

FDDI. L26 - Fibre Distributed Data Interface (FDDI) L26 - Fibre Distributed Data Interface (FDDI) FDDI - Fiber Distributed Data Interface

Internet Architecture and Protocol

Integrating Information Systems: Technology, Strategy, and Organizational Factors

The Network Access Layer. In This Lecture. Network Access Layer. Hour 3

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

Local Area Networks (LANs) SMU CSE 5344 /

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Token Bus. Message Exchange in Token Bus. Example. Problems with Token Bus

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Real-Time (Paradigms) (47)

M242 COMPUTER NETWORS AND SECURITY

Multiple Access Protocols

CARRIER SENSE MULTIPLE ACCESS (CSMA):

Good day. In the last lecture, we talked about various multiple access schemes and one of this set of schemes is token bus DQD etc.

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Chapter 8 LAN Topologies

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

Outline: Connecting Many Computers

Unit II. Part A (2 Marks)

Data Link Layer, Part 5. Medium Access Control

Network Topology. By Dr. Piya Techateerawat. Bus Topology Ring Topology Star Topology Fully Connected Topology. Combined Topology

Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs

Data Link Layer Technologies

Introduction to Networks and the Internet

Contention Protocols and Networks

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Link Layer and Ethernet

CS 455/555 Intro to Networks and Communications. Link Layer

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer -2- Network Access

IEEE 802 LANs SECTION C

ECE 4450:427/527 - Computer Networks Spring 2017

Link Layer and Ethernet

Data Link Layer -2- Network Access

FDDI by default supports Early Token Release. Below is the operation of FDDI ring.

Medium Access Protocols

LAN Systems. Bus topology LANs

Lecture 4b. Local Area Networks and Bridges

Redes de Computadores. Medium Access Control

Module 15: Network Structures

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

The Link Layer and LANs. Chapter 6: Link layer and LANs

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2)

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

Introduction to LAN Topologies Cabling. 2000, Cisco Systems, Inc. 3-1

Chapter 10: Local Area Networks

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Multiple Access Channels

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

Links. CS125 - mylinks 1 1/22/14

CCNA Exploration1 Chapter 7: OSI Data Link Layer

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Different network topologies

Data always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

RMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN

Summary of MAC protocols

CSE 461: Multiple Access Networks. This Lecture

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Part3. Local Area Networks (LAN)

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Data and Computer Communications

Chapter 5 Link Layer and LANs

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

Local Area Networks. Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

Medium Access Control

High Speed LANs. Range of technologies. Fast and Gigabit Ethernet Fibre Channel High Speed Wireless LANs. CS420/520 Axel Krings Page 2

PON Functional Requirements: Services and Performance

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Highly Available Networks

A LAN is a high-speed data network that covers a relatively small geographic area. It typically connects workstations, personal computers, printers,

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

Introduction Computer Networks. Applications Requiring High Speed LANs. Why High Speed LANs? IEEE802.3 Medium Access Control

Embedded Systems. 8. Communication

Paper Number: Architecting Highly Available Networking Environments. Pamela Williams Dickerman. Advanced Technology Consultant.

Distributed System Chapter 16 Issues in ch 17, ch 18

10- and 100-Mbps Ethernet

Computer Networks. Medium Access Sublayer (Part I)

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

Module 16: Distributed System Structures. Operating System Concepts 8 th Edition,

Local Area Networks CONSYL Introduction to Computer Communications and Networks

Introductory to Computer Networks Local Area Networks. Lecture 16 Fall Isfahan University of technology Dr.

Networks Homework # 2

Lecture 9: Bridging & Switching"

Medium Access Control Sublayer Chapter 4

Transcription:

Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media Access Principles ( Deterministic) Master-Slave Approaches (Polling) Time based solutions Token based solutions (Token Ring) FDDI 50 Polling(1) Master-Slave principles: Master works as coordinator. He organises the communication: determines, who is allowed to transmit Typical solution: Master polls different slave (e.g. Bluetooth) 51

Polling (2): Multi-Slot packets Bluetooth Packets can cover multiple Slots (1,3,5 Slots) 52 Polling (3), LIN 53 LIN Cluster: one master, serveral slaves Frame: Header (from master) + Response (from slave)

Polling (4), LIN Frame Break + Byte-Fields (4-11) Byte-Field recessive 54 dominant Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media Access Principles ( Deterministic) Master-Slave Approaches (Polling) Time based solutions Token based solutions (Token Ring) FDDI 55

Time Slots (1) The node knows, when a message has to be transmitted. Needs an internal clock Needs time-syncronisation between nodes 56 Time Slots (2), Principle Ref. Msg Basic Cycle Time Windows for Messages Ref. Msg Time Master generates Reference Message Timewindows are relative to Reference-Message (Sync) Fault Tolerance-> potential Time Master TTCAN Level 1: Ref Msg only has some control Info TTCAN Level 2: Ref. Msg has global time Information Global Time 57

Time Slots (3), Principle(2) Ref. Msg MsgA Arbitrating Window Basic Cycle Free MsgB MsgB Ref. Msg Exclusive Time Window Cyclic messages (predefined) No automatic repeat allowed Arbitrating Window Different messages try to access (CSMA) Node specific knowledge is a minimum MsgA 1 2 3 4 5 6 1 Global Time 58 Time Slots (4) One TDMA Frame Preamble Information Message Trail Bits Slot 1 Slot 2 Slot 3... Slot N Trail Bits Sync. bits Information Data Guard Bits Master transmits Syncronisation Frame Each node has a timeslot to transmit its message Sync-Frame is cyclically repeated over time 59

TDMA (4) 60 Total number of bits per frame T f : frame duration R : channel bit rate Number of Overhead bits per frame b = N b + N b + N b + N b OH r r t p = T R Nr: Number of reference bursts per frame Nt: Number of traffic Bursts per frame br: number of overhead bits per reference burst bp: number of overhead bits per preamble bg: number of equivalent bits in each guard-time interval b = Efficiency 1 OH η f 100% b T t g r g b T f Time Slots (5), Flexray 61

Time Slots (6), Flexray 62 Time Slots (7), Flexray 63

Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media Access Principles ( Deterministic) Master-Slave Approaches (Polling) Time based solutions Token based solutions (Token Ring) FDDI 64 Ring topology 65

Data passing When a station has information to transmit, it seizes the token and sends data frame to the next station. When frame reaches the destination station, the data is copied for processing. Frame continues to circle the ring until it returns to the sending station. Sending station removes the frame from the ring, verifies receipt, and releases the token. 66 Variants IBM developed the first Token Ring network in the 1970s. It is still IBM's primary LAN technology, and is second only to Ethernet (IEEE 802.3) in terms of LAN implementation. 67

Token-Ring frame format 68 Start delimiter and End delimiter Start delimiter. Alert for the arrival of a token. Includes an identification symbol. Violates encoding system to differentiate from other frame fields. End Delimiter Completes the token or data/command frame. Contains damage indicator. Last of logical sequence. 69

Access control P P P T M R R R P: Priority bits T: Token bit M: Monitor bit R: Reservation bits B'000' Normal User Priority B'001' Normal User Priority B'010' Normal User Priority B'011' Normal User priority B'100' Bridge/Router B'101' Reserved IBM B'110' Reserved IBM B'111' Station Management 70 Priority management Using the priority field and the reservation field. Stations with a higher priority can reserve the token for the next network pass. Stations that raise a token's priority level must reinstate the previous priority after their transmission has been completed. 71

Management mechanisms Active Monitor One station acts as centralized source of timing information for other stations. Removes continuously circulating frames by set monitor bit to 1. Start a token, when token have been lost. Beaconing Detects and repairs network faults. Initiates auto-reconfiguration. 77 Physical topology Physical topology : Star. Logical topology : Ring. IBM Token Ring network stations are connected to MSAU (Multi-Station Access Unit). Many MSAU can be wired together to form one large ring. 78

Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media Access Principles ( Deterministic) Master-Slave Approaches (Polling) Time based solutions Token based solutions (Token Ring) FDDI 79 Characteristics Fiber Distributed Data Interface. FDDI is popular as a campus backbone technology. 100 Mbps Token passing Dual-ring Fiber Optic Cable Total fiber length of 200Km Station distances up to 2Km 80

FDDI dual-ring (PR and SR) 81 FDDI Media Fiber Optic Single-mode, Laser (< 40Km) Multi-mode, LED (< 2Km) Multi-mode low cost, LED (< 500m) Twisted Pair Copper UTP, STP (< 100m) - CDDI 82

FDDI Connections Class A: connect directly with PR SR. DAC: Dual Attachment Concentrator DAS: Dual Attachment Station Class B: connect via FDDI concentrator. SAS: Single Attachment Station 84 Station Management (SMT) Defines the FDDI station configuration, enables stations to work together within the ring : Ring configuration Initialization Station insertion and removal Fault isolation and recovery Scheduling Collection of statistics 87

Types of traffic Synchronous traffic can consume a portion of the 100 Mbps total bandwidth of an FDDI network, while asynchronous traffic can consume the rest. Synchronous Mode: Allocated parts of the bandwidth to one or more workstations. Predictable response time. Asynchronous Mode: Priority scheme. 88 FDDI frame format 89

Preamble, Start and End delimiter Preamble. Prepares for the upcoming frame Start delimiter. Alert for the arrival of a token. Differentiate from other frame fields. End Delimiter Completes the frame. Contains damage indicator. 90 Operation mechanisms Connection Establishment Station connect to neighbors to form the ring. Negotiate the length of the link. Ring Initialization Station claim the right to generate a token. Steady-state Operation Token passing Ring Maintenance Detects and repairs token or network faults. 96