ieee 802 11 token rings
play

IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 - PowerPoint PPT Presentation

IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06 CS/ECE 438 - UIUC, Fall 2006


  1. Deafness For the scenario below  Node A sends an RTS to B  While node C is receiving from D,  Node B cannot reply with a CTS  B knows that D is sending to C  A keeps retransmitting RTS and increasing its own BO  timeout RTS RTS CTS CTS A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 14

  2. Deafness For the scenario below  Node A sends an RTS to B  While node C is receiving from D,  Node B cannot reply with a CTS  B knows that D is sending to C  A keeps retransmitting RTS and increasing its own BO  timeout RTS RTS CTS CTS A B C D 10/11/06 CS/ECE 438 - UIUC, Fall 2006 14

  3. Interframe Spacing Interframe spacing  Plays a large role in coordinating access to the  transmission medium Varying interframe spacings  Creates different priority levels for different types of traffic!  802.11 uses 4 different interframe spacings  DIFS DIFS PIFS SIFS medium busy contention next frame t direct access if medium is free ≥ DIFS 10/11/06 CS/ECE 438 - UIUC, Fall 2006 15

  4. IEEE 802.11 - CSMA/CA Sensing the medium  If free for an Inter-Frame Space (IFS)  Station can start sending (IFS depends on service type)  If busy  Station waits for a free IFS, then waits a random back-off time  (collision avoidance, multiple of slot-time) If another station transmits during back-off time  The back-off timer stops (fairness)  contention window (randomized back-off DIFS DIFS mechanism) medium busy next frame direct access if t medium is free ≥ DIFS slot time 10/11/06 CS/ECE 438 - UIUC, Fall 2006 16

  5. Types of IFS  SIFS  Short interframe space  Used for highest priority transmissions  RTS/CTS frames and ACKs  DIFS  DCF interframe space  Minimum idle time for contention-based services (> SIFS) 10/11/06 CS/ECE 438 - UIUC, Fall 2006 17

  6. Types of IFS  PIFS  PCF interframe space  Minimum idle time for contention-free service (>SIFS, <DIFS)  EIFS  Extended interframe space  Used when there is an error in transmission 10/11/06 CS/ECE 438 - UIUC, Fall 2006 18

  7. Backoff Interval  When transmitting a packet, choose a backoff interval in the range [0,cw] cw is contention window   Count down the backoff interval when medium is idle Count-down is suspended if medium becomes  busy  When backoff interval reaches 0, transmit RTS 10/11/06 CS/ECE 438 - UIUC, Fall 2006 19

  8. DCF Example B1 = 25 B2 = 20 B1 and B2 are backoff intervals cw = 31 at nodes 1 and 2 10/11/06 CS/ECE 438 - UIUC, Fall 2006 20

  9. DCF Example B1 = 25 wait data B2 = 20 B1 and B2 are backoff intervals cw = 31 at nodes 1 and 2 10/11/06 CS/ECE 438 - UIUC, Fall 2006 20

  10. DCF Example B1 = 25 B1 = 5 wait data B2 = 20 B2 = 15 B1 and B2 are backoff intervals cw = 31 at nodes 1 and 2 10/11/06 CS/ECE 438 - UIUC, Fall 2006 20

  11. DCF Example B1 = 25 B1 = 5 wait data data wait B2 = 20 B2 = 15 B1 and B2 are backoff intervals cw = 31 at nodes 1 and 2 10/11/06 CS/ECE 438 - UIUC, Fall 2006 20

  12. DCF Example B1 = 25 B1 = 5 wait data data wait B2 = 10 B2 = 20 B2 = 15 B1 and B2 are backoff intervals cw = 31 at nodes 1 and 2 10/11/06 CS/ECE 438 - UIUC, Fall 2006 20

  13. Backoff Interval  The time spent counting down backoff intervals is a part of MAC overhead  Large cw  Large backoff intervals  Can result in larger overhead  Small cw  larger number of collisions (when two nodes count down to 0 simultaneously) 10/11/06 CS/ECE 438 - UIUC, Fall 2006 21

  14. Backoff Interval  The number of nodes attempting to transmit simultaneously may change with time  Some mechanism to manage contention is needed  IEEE 802.11 DCF  Contention window cw is chosen dynamically depending on collision occurrence 10/11/06 CS/ECE 438 - UIUC, Fall 2006 22

  15. Binary Exponential Backoff in DCF  When a node fails to receive CTS in response to its RTS, it increases the contention window  cw is doubled (up to an upper bound)  When a node successfully completes a data transfer, it restores cw to Cw min  cw follows a sawtooth curve 10/11/06 CS/ECE 438 - UIUC, Fall 2006 23

  16. Token Ring  Example Token Ring Networks IBM: 4Mbps token ring  IEEE 802.5: 16Mbps  10/11/06 CS/ECE 438 - UIUC, Fall 2006 24

  17. Token Ring  Example Token Ring Networks IBM: 4Mbps token ring  IEEE 802.5: 16Mbps  10/11/06 CS/ECE 438 - UIUC, Fall 2006 24

  18. Token Ring Focus on Fiber Distributed Data Interface (FDDI)  100 Mbps  Was (not is) a candidate to replace Ethernet  Used in some MAN backbones (LAN interconnects)  Outline  Rationale  Topologies and components  MAC algorithm  Priority  Feedback  Token management  10/11/06 CS/ECE 438 - UIUC, Fall 2006 25

  19. Token Ring 10/11/06 CS/ECE 438 - UIUC, Fall 2006 26

  20. Token Ring  Why emulate a shared medium with point- to-point links? 10/11/06 CS/ECE 438 - UIUC, Fall 2006 26

  21. Token Ring  Why emulate a shared medium with point- to-point links?  Why a shared medium? Convenient broadcast capabilities  Switches costly  10/11/06 CS/ECE 438 - UIUC, Fall 2006 26

  22. Token Ring  Why emulate a shared medium with point- to-point links?  Why a shared medium? Convenient broadcast capabilities  Switches costly   Why emulation? Simpler MAC algorithm  Fairer access arbitration  Fully digital (802.3 collision detection requires  analog) 10/11/06 CS/ECE 438 - UIUC, Fall 2006 26

  23. Token Ring: Topology and Components  Relay  Single Relay  Multistation access units 10/11/06 CS/ECE 438 - UIUC, Fall 2006 27

  24. Token Ring: Topology and Components  Relay  Single Relay  Multistation access units Host From To Previous Next Host Host Relay 10/11/06 CS/ECE 438 - UIUC, Fall 2006 27

  25. Token Ring: Topology and Components  Relay  Single Relay  Multistation access units Host Host From To From To Previous Next Previous Next Host Host Host Host Relay Relay 10/11/06 CS/ECE 438 - UIUC, Fall 2006 27

  26. Token Ring: Topology and Components  Relay  Single Relay  Multistation access units Host Host Host Host Host From To From To From Previous Previous Next Previous Next MSAU Host Host Host Host Relay Relay Host To Next MSAU 10/11/06 CS/ECE 438 - UIUC, Fall 2006 27

  27. Token Ring: Dual Ring  Example Token Ring Networks FDDI: 1000Mbps   Fiber Distributed Data Interface 10/11/06 CS/ECE 438 - UIUC, Fall 2006 28

  28. Token Ring: Dual Ring  Example Token Ring Networks FDDI: 1000Mbps   Fiber Distributed Data Interface 10/11/06 CS/ECE 438 - UIUC, Fall 2006 28

  29. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  30. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  31. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  32. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  33. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  34. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  35. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  36. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  37. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  38. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  39. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  40. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  41. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure ⊗ 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  42. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure ⊗ 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  43. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure ⊗ 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  44. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure ⊗ 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  45. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure ⊗ 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  46. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure ⊗ ⊗ 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  47. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure ⊗ ⊗ 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  48. FDDI  Dual ring configuration  Self-healing  Normal flow in green direction  Can detect and recover from one failure ⊗ ⊗ 10/11/06 CS/ECE 438 - UIUC, Fall 2006 29

  49. Multistation Access Unit  Each station imposes a delay  E.g. 50 ms  Maximum of 500 Stations  Upper limit of 100km  Need 200km of fiber  Uses 4B/5B encoding  Can be implemented over copper 10/11/06 CS/ECE 438 - UIUC, Fall 2006 30

  50. Token Ring: Basic Concepts Frames flow in one direction  Upstream to downstream  Token  Special bit pattern rotates around ring  Stations  Must capture token before transmitting  Must remove frame after it has cycled  Must release token after transmitting  Service  Stations get round-robin service  10/11/06 CS/ECE 438 - UIUC, Fall 2006 31

  51. Token Ring: Basic Concepts  Immediate release  Used in FDDI  Token follows last frame immediately  Delayed release  Used in IEEE 802.5  Token sent after last frame returns to sender 10/11/06 CS/ECE 438 - UIUC, Fall 2006 32

  52. Token Release Delayed Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

  53. Token Release Delayed Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

  54. Token Release Delayed Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

  55. Token Release Delayed Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

  56. Token Release Delayed Early Release Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

  57. Token Release Delayed Early Release Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

  58. Token Release Delayed Early Release Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

  59. Token Release Delayed Early Release Release 10/11/06 CS/ECE 438 - UIUC, Fall 2006 33

  60. Token Ring: Media Access Control Parameters Token Holding Time (THT)  Upper limit on how long a station can hold the token  Each station is responsible for ensuring that the  transmission time for its packet will not exceed THT Token Rotation Time (TRT)  How long it takes the token to traverse the ring.  TRT ≤ ActiveNodes x THT + RingLatency  Target Token Rotation Time (TTRT)  Agreed-upon upper bound on TRT  10/11/06 CS/ECE 438 - UIUC, Fall 2006 34

  61. 802.5 Reliability  Delivery status  Trailer  A bit Set by recipient at start of reception   C bit Set by recipient on completion on reception  10/11/06 CS/ECE 438 - UIUC, Fall 2006 35

  62. 802.5 Monitor Responsible for  Inserting delay  Token presence  Should see a token at least once per TRT  Check for corrupted frames  Check for orphaned frames  Header  Monitor bit  Monitor station sets bit first time it sees packet  If monitor sees packet again, it discards packet  10/11/06 CS/ECE 438 - UIUC, Fall 2006 36

  63. Token Maintenance: 802.5  Monitoring for a Valid Token  All stations should periodically see valid transmission (frame or token)  Maximum gap  = ring latency + max frame < = 2.5ms  Set timer at 2.5ms  send claim frame if timer expires 10/11/06 CS/ECE 438 - UIUC, Fall 2006 37

  64. Timing Algorithm: 802.5 Each node measures TRT between successive  tokens If measured-TRT > TTRT  Token is late  Don’t send  If measured-TRT < TTRT  Token is early  OK to send  Worse case:  2xTTRT between seeing token  Back-to-back 2xTTRT rotations not possible  10/11/06 CS/ECE 438 - UIUC, Fall 2006 38

  65. Traffic Classes: FDDI  Two classes of traffic  Synchronous  Real time traffic  Can always send  Asynchronous  Bulk data  Can send only if token is early 10/11/06 CS/ECE 438 - UIUC, Fall 2006 39

  66. Timing Algorithm: FDDI Each station is allocated S i time units for  synchronous traffic per TRT TTRT is negotiated  S 1 + S 2 + … + S N + RingLatency ≤ TTRT  Algorithm Goal  Keep actual rotation time less than TTRT  Allow station i to send S i units of synchronous traffic per  TRT Fairly allocate remaining capacity to asynchronous traffic  Regenerate token if lost  10/11/06 CS/ECE 438 - UIUC, Fall 2006 40

  67. Timing Algorithm: FDDI When a node gets the token  Set TRT = time since last token  Set THT = TTRT – TRT  If TRT > TTRT  Token is late  Send synchronous data  Don’t send asynchronous data  If TRT < TTRT  Token is early  OK to send any data  Send synchronous data, adjust THT  If THT > 0, send asynchronous data  10/11/06 CS/ECE 438 - UIUC, Fall 2006 41

Recommend


More recommend