Distributed Queue Dual Bus

Similar documents
Internetworking Part 1

Chapter 6 Medium Access Control Protocols and Local Area Networks

Connecting LANs. Required reading: Forouzan 17.1 to 17.1 Garcia 6.11 (intro ) CSE 3213, Fall Instructor: N. Vlajic

CEN445 Network Protocols & Algorithms. Network Layer. Prepared by Dr. Mohammed Amer Arafah Summer 2008

Connecting LANs. Required reading: Garcia 6.11 (intro ) CSE 3213, Fall 2010 Instructor: N. Vlajic

ET4254 Communications and Networking 1

Switched Multimegabit Data Service (SMDS)

CS610- Computer Network Solved Subjective From Midterm Papers

EEC-484/584 Computer Networks

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Bridging and Switching Basics

CompSci 356: Computer Network Architectures. Lecture 7: Switching technologies Chapter 3.1. Xiaowei Yang

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

Interface The exit interface a packet will take when destined for a specific network.

Integrated Services. Integrated Services. RSVP Resource reservation Protocol. Expedited Forwarding. Assured Forwarding.

Lecture 7. Network Layer. Network Layer 1-1

6.1.2 Repeaters. Figure Repeater connecting two LAN segments. Figure Operation of a repeater as a level-1 relay

Principles behind data link layer services:

Principles behind data link layer services:

Chapter 3 Packet Switching

Switched Multimegabit Data Service

Principles behind data link layer services

Access Technologies! Fabio Martignon

Chapter 11 in Stallings 10 th Edition

Local Area Network Overview

Part 5: Link Layer Technologies. CSE 3461: Introduction to Computer Networking Reading: Chapter 5, Kurose and Ross

Local Area Networks (LANs) SMU CSE 5344 /

Revision of Previous Lectures

Review. Error Detection: CRC Multiple access protocols. LAN addresses and ARP Ethernet. Slotted ALOHA CSMA/CD

Medium Access Protocols

CS/ECE 438: Communication Networks for Computers Spring 2018 Midterm Examination Online

Cisco Cisco Certified Network Associate (CCNA)

Lecture 22 Overview. Last Lecture. This Lecture. Next Lecture. Internet Applications. ADSL, ATM Source: chapter 14

Networking interview questions

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

Summary of MAC protocols

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

CCNA Exploration1 Chapter 7: OSI Data Link Layer

Telecommunication Protocols Laboratory Course. Lecture 3

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker

Wireless LANs. The Protocol Stack The Physical Layer The MAC Sublayer Protocol The Frame Structure Services 802.

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Networks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces

Lecture 7. Reminder: Homework 2, Programming Project 1 due today. Homework 3, Programming Project 2 out, due Thursday next week. Questions?

Link layer: introduction

ET4254 Communications and Networking 1

ECE 4450:427/527 - Computer Networks Spring 2017

Routing in packet-switching networks

Extending the LAN. Context. Info 341 Networking and Distributed Applications. Building up the network. How to hook things together. Media NIC 10/18/10

This Lecture. BUS Computer Facilities Network Management. Switching Network. Simple Switching Network

BROADBAND AND HIGH SPEED NETWORKS

Layer 2 functionality bridging and switching

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

Hubs. twisted pair. hub. 5: DataLink Layer 5-1

Network.... communication system for connecting end- systems. End-systems a.k.a. hosts PCs, workstations dedicated computers network components

Switching and Forwarding Reading: Chapter 3 1/30/14 1

CSCI Computer Networks

Goals and topics. Verkkomedian perusteet Fundamentals of Network Media T Circuit switching networks. Topics. Packet-switching networks

The Link Layer and LANs: Ethernet and Swiches

HWP2 Application level query routing HWP1 Each peer knows about every other beacon B1 B3

Router Router Microprocessor controlled traffic direction home router DSL modem Computer Enterprise routers Core routers

Introduction to LAN Protocols

Packet Switching Techniques

CS 421: COMPUTER NETWORKS SPRING FINAL May 16, minutes

CHAPTER 8: LAN Standards

Code No: RR Set No. 1

CHAPTER 2 - NETWORK DEVICES

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

CHAPTER 18 INTERNET PROTOCOLS ANSWERS TO QUESTIONS

Digital Communication Networks

The Network Layer and Routers

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Chapter 3.1 Acknowledgment:

The Internet. 9.1 Introduction. The Internet is a global network that supports a variety of interpersonal and interactive multimedia applications.

Chapter 4 NETWORK HARDWARE

II. Principles of Computer Communications Network and Transport Layer

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 18

Lecture 9: Switched Ethernet Features: STP and VLANs

DQDB. Distributed Queue Dual Bus (DQDB) DQDB is a MAN. Unlike FDDI, DQDB is an IEEE standard: 802.6

Communication Networks ( ) / Spring 2011 The Blavatnik School of Computer Science, Tel-Aviv University. Allon Wagner

Chapter 5 (Week 9) The Network Layer ANDREW S. TANENBAUM COMPUTER NETWORKS FOURTH EDITION PP BLM431 Computer Networks Dr.

ECE 650 Systems Programming & Engineering. Spring 2018

More on LANs. Roadmap. CPSC Network Programming. ! Hardware Addressing. !LAN Wiring. ! Extending LANs. ! Local Loop Digital Technologies

CS 3516: Advanced Computer Networks

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Introduction to LAN Protocols

Chapter 4: The Medium Access Layer

Switching, Mobile Phones, Cable, Beginning Data Link Layer. CS158a Chris Pollett Feb 21, 2007.

Last time. Wireless link-layer. Introduction. Characteristics of wireless links wireless LANs networking. Cellular Internet access

Data Communications. Connecting Devices

Internetwork Basic. Possible causes of LAN traffic congestion are

Objectives. Learn how computers are connected. Become familiar with different types of transmission media

Data Link Layer, Part 5. Medium Access Control

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

ECE 333: Introduction to Communication Networks Fall 2001

Chapter 4. The Medium Access Control Sublayer

CSE 461: Multiple Access Networks. This Lecture

Introducing Campus Networks

CompSci 356: Computer Network Architectures. Lecture 8: Spanning Tree Algorithm and Basic Internetworking Ch & 3.2. Xiaowei Yang

Guide to Networking Essentials, 6 th Edition. Chapter 7: Network Hardware in Depth

Transcription:

Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover an entire city, up to 160 km at a rate of 44.736 Mbps Basic rule: if you want to send something to one of your righthand neighbours, use upper bus A; otherwise, lower bus B Bus A Direction of flow on bus A Computer... Bus B 1 2 3 N Head end Direction of flow on bus B Direction of flow on a bus points to downstream. Fixed-size 53-byte cells with 44-byte payload are used, similar to ATM Stream of cells flows down on a bus. Each cell has a busy (B) bit and request (R) bit. If a cell is occupied, its B bit is 1. You make a request by setting a cell s R bit (if it is zero) to 1 Unlike 802.3 to 802.5 where a user transmits at first chance, DQDB MAC is non greedy Users queue up in the order they became ready to send and transmit in FIFO order This is achieved without a central queue control, hence called distributed queue The key of this MAC protocol is: be polite to your downstream stations, and let them have go first if they requested before yours 95

Distributed Queue Dual Bus (continue) How the MAC works: consider transmission on bus A (on bus B is similar), each user has A RC that counts number of requests R B from its downstream stations Bus A A CD that counts number of if B=0 then CD:=CD-1 outstanding requests issued before its own request station n CD RC Note that the downstream requests come from bus B, as you becomes if R=1 then RC:=RC+1 downstream on bus B Bus B B R If a user wants to send something to its downstream (on bus A), it sets first available request bit in a cell on bus B to 1, and copies RC to CD Assume that the value of CD at this moment is x. Then there are x requests from the station s downstream, and it has to let x free cells pass to the downstream Also, the user must let its upstream stations on bus A know its request, that is why it uses bus B to make a reservation Each time a non-busy cell passes by, CD is reduced by 1. When CD drops to zero, the user can take the next non-busy cell on bus A to transmit 96

Broadband Wireless IEEE 802.16 air interface for fixed broadband wireless access systems, also called wireless MAN or wireless local loop, has protocol stack: It provides multimegabits wireless services for voice, Internet, movies on demand, etc. Physical layer operates in 10 to 66 GHz range, and base has multiple antennas, each pointing at a separate sector Physical medium dependent sublayer Service specific convergence sublayer MAC sublayer common part Security sublayer Transmission convergence sublayer QPSK QAM-16 QAM-64 Upper layers Data link layer Physical layer For close-in subscribers, 64QAM is used, so typical 25 MHz spectrum offers 150 Mbps; for medium-distance subscribers, 16QAM is used; and for distant subscribers QPSK is used Data link layer consists of three sublayers Security sublayer manages encryption, decryption, and key management, crucial for privacy and security Service-specific convergence replaces logical link control, providing seamlessly interface for network layer that may have both datagram protocols and ATM QAM-64 (6 bits/baud) QAM-16 (4 bits/baud) QPSK (2 bits/baud) 97

802.16 MAC Sublayer Protocol 802.16 MAC sublayer is completely connection oriented to provide quality-of-service guarantees for telephony and multimedia, and MAC frames occupy integral number of physical layer time slots Each frame is composed of subframes, and the first two are downstream and upstream maps These two maps tell what is in which time slot and which time slots are free Downstream map also contains system parameters to inform new users as they come on-line Downstream channel: base simply decides what to put in which subframe Upstream channel: there are competing subscribers and its allocation is tied to class of service Constant bit rate: dedicate certain time slots to each connection and bandwidth is fixed through the connection, providing typical telephone channel service Real-time variable bit rate: for compressed multimedia and other soft real-time applications in which bandwidth needed each instant may vary Base polls subscriber at fixed interval to ask how much bandwidth is needed this time Non-real-time variable bit rate: for non-real-time heavy transmissions such as large file transfers Base polls subscribers often at non rigidly defined intervals to see who needs this service Best-efforts: no polling and subscriber contends for bandwidth with others Requests for bandwidth are done in time slots marked in upstream map as available for contention. Successful request will be noted in next downstream map, and unsuccessful subscriber has to wait a random period of time before try again 98

802.16 Frame Structure Generic frame (a) and bandwidth request (a control) frame (b): Header is followed by an optional payload and an optional frame CRC Control frames have no payload Bits E (a) 0 C 1 1 6 1 1 2 1 11 16 8 4 Type C EK I Length (b) 1 0 Type Bytes needed Header Connection ID Data CRC CRC Bits1 1 6 16 16 8 Connection ID Header CRC Generic frame starts with a bit 0 EC bit: tells whether payload is encrypted Type: identifies frame type, telling whether packing and fragmentation are presented CI: indicates presence or absence of final checksum EK: tells which encryption keys is used (if any) Length: gives complete length of frame, including header Connection identifier: tells which connection this frame belongs to Header CRC: checksum over header only, using x 8 + x 2 + x + 1 Control frame starts with a bit 1: 2nd and 3rd bytes form a 16-bit number telling how much bandwidth is needed to carry specific number of bytes Why optional frame CRC: no attempt is made to retransmit real-time frames Why bother with a CRC if no retransmission? Also error correction is present in physical layer (channel coding) 99

Bridging LANs Many LANs can be connected by bridges, which operate at data link layer level, i.e. they do not examine the network layer header and simply pass network packets, unlike a router There are many situations in which bridges are used A bridge must know MAC protocols used by LANs connected to it, so it can talk to each of them Consider two LANs, L A and L B, connected by a bridge, who must: Know the MAC protocol for L A, read all frames transmitted on L A, and accept those addressed to hosts on L B Use the MAC protocol for L B to retransmit those frames onto L B Do the same for L B -to-l A traffic Network LLC MAC Physical 802.11??? Host A 802.11 802.11 Wireless LAN 802.11 802.11 Bridge 802.3 802.3 802.3 Ethernet Host B 802.3 802.3 Simple or is it? If source LAN and destination LAN are the same, bridging them will in deed be a simple task. If, however, two LANs are of different standards, there are some serious difficulties 100

Bridging Problems Building a bridge between various 802 LANs (and MANs) can encounter some serious difficulties. Here we focus on 802.3, 802.11 and 802.16, as they are most widely used Different frame formats: copying between different LANs requires reformatting, which takes CPU times, requires a new checksum calculation, and possibly introduces undetected errors Destination Source 802.3 Length Data Pad address address Check- sum Frame Dur- Address Address Address Address 802.11 Seq. Data control ation 1 2 3 4 Header 802.16 0 E C Type EK Length Connection ID Data C I CRC Different rates: when a high-speed LAN pumps frames onto a low-speed one, the bridge can simply hope that it will not run out of buffer memory. Timeout at higher layer of a fast source LAN may also cause serious bridge-as-bottleneck problem Frame length too long for target LAN: frame cannot be split into small pieces, as all MAC protocols do not have provision for reassembling frames out of smaller units. Basically, frames that are too long to be forwarded are simply discarded 802.11 and 802.16 support encryption, but 802.3 does not: if a wireless station uses data link layer encryption, there is no way to decrypt it when it arrives over Ethernet 802.11/802.16 provide quality of service (e.g. constant bit rate), but 802.3 does not have this concept: traffic from 802.11 or 802.16 loses its quality of service when passing over to Ethernet Check- sum Check- sum 101

Transparent Bridges Bridges should be completely transparent: simply plug in and walk away, no hardware and software changes are required Bridge must decide what to do with an incoming frame: discards it if destination and source LAN addresses in the frame are the same, or forwards it to destination LAN A B B1 C B2 F G H LAN 1 LAN 2 LAN 3 Each bridge maintains a hash table, listing all the possible destination address/output line (LAN) pairs. When a bridge is first plug in, its hash table is empty, and this is how it figures out the configuration and keeps updating its hash table: Flooding: incoming frames with unknown destinations are simply forwarded to all other LANs connected to the bridge, e.g. a frame coming from host C to bridge B2 with an unknown destination to B2 will be forwarded to LAN3 and LAN4 Backward learning: bridge gradually learns which interface it can reach a host and builds up its hash table from incoming frames source addresses, e.g. a frame from A reaches bridge B2. From source address of this frame, B2 knows A is reachable via LAN2 Timeout: whenever a hash table entry is made, arrival time of the frame is noted in the entry. Whenever a frame whose source address already in the table arrives, its entry is updated with this new time. Periodically, bridge gets ride of those entries more than a few minutes old Bridge D LAN 4 E 102

Spanning Tree To increase reliability, two or more bridges may be used in parallel between pairs of LANs, but this topology creates looping problem For example, frame F with an unknown destination will be copied by bridge B1 to LAN2 as F1 and by bridge B2 to LAN2 as F2; frame F1 will be copied back to LAN1 by B2, and F2 copied back to LAN1 by B1. This cycle goes on forever LAN 2 LAN 1 F Frame copied by B1 Initial frame F 1 F 2 B1 Bridge B2 Frame copied by B2 Solution is to make it a spanning tree: some potential connection between LANs are ignored in the interest of constructing a logically loop-free topology, and the procedure is a graph optimisation algorithm Choose a bridge as the root, usually, the bridge with the lowest ID number Find a tree of shortest paths from the root to every bridge and LAN If a bridge or LAN fails or there are some other changes in connection, a new spanning tree is computed 1 2 LAN A B C 5 D G 8 9 3 4 E H I J (a) F 6 7 Bridge A B C 1 2 3 LAN Bridge that is part of the spanning tree D 5 6 H 8 9 (b) E J 4 7 F Bridge that is not part of the spanning tree 103

Switching Devices A classification of various switching devices to get frames from one cable segment to another Repeater: is a device connecting two cable segments. It is in physical layer and operates on bit level, i.e. detects bits from signal waveform, amplifies and re-transmits them A B C D A B C D Host Hub Bridge Switch LAN A B C D Hub: joints number of input lines electrically. E F G H E F G H E F G H (a) (b) (c) All lines coming into a hub operates at same speed, and frames arriving from any one line are sent out on all the others If two frames arrive at same time, they collide, just as in Ethernet, so the entire hub forms a single collision domain Hub does not examine or use 802 addresses in any way, so it is in physical layer Bridge: connects two or more LANs. It examines address in frame header to see where to send the frame. So Bridge is in data link layer, may have line cards for different network types and different speeds, and each line is its own collision domain Switch: is similar to bridge in that both route on frame addresses. In fact, two terms are often used interchangeable. Main difference is that switch is most used to connect individual hosts Router: is in network layer. Router does not care frame header/trailer, but examines network address in packet header to see where to send the packet 104

Network Layer Overview Network Layer is concerned with getting packets from source all the way to destination. This is where we start to deal with end-to-end users Getting to destination may require making many hops through many links: compare this with data link layer, which essentially deals with issues related to two ends of a link What network layer does is to provide service to transport layer facilities for getting data from source to destination, thus routing is a basic function of network layer. The design goals: Services should be independent of subnets technology and implementation Transport layer should be shielded from subnets technology and implementation Network addresses should be unique, even across LANs and WANs Two kinds of services are offered: connection-oriented and connectionless, with two implementations respectively Virtual circuit: a complete route is set up in advance, all packets go through the same route Datagram: each packet is independently routed on the way to the destination Other important topics include: congestion control, internetworking, network layer in Internet, and network layer in ATM networks 105

Summary IEEE 802.6 distributed queue dual bus (a MAN standard) medium access control protocol IEEE 802.16 broadband wireless: medium access control sublayer protocol, service classes, and frame structure Bridge for connecting LANs: operates at data link layer level, and some serious difficulties encountered in bridging 802.x/802.y Transparent bridges: how it self learns (backward learning) Spanning tree bridges Definitions and differences in repeater, hub, bridge, switch, and router Network layer overview 106