200 likes | 401 Views
Lecture 9: Ethernet and Token Ring Networks. Ethernet review. Network topology with two stars connected by a point-to-point link. Ethernet Frame. MAX=1500 bytes Min=46 bytes Type—demux key to identify application CRC-32. Addresses. Media Access Control (MAC) address
E N D
Ethernet review Network topology with two stars connected by a point-to-point link
Ethernet Frame MAX=1500 bytes Min=46 bytes Type—demux key to identify application CRC-32
Addresses • Media Access Control (MAC) address • 48 bits/6 bytes-X1X2:X3X4:X5X6:X7X8:X9X10:X11X12 • Unique worldwide for all time • Belongs to adapter • Broadcast address • FF:FF:FF:FF:FF:FF • Multicast address • 1xxxxxxx:XX:XX:XX:XX:XX
Receiver Algorithm • Adaptor • Receives all frames on the ethernet • Only Accepts Frames Addressed to: • Its unicast address • the broadcast address • A mult-cast address it has been programmed to accept • Accepts all frames in “promiscuous (eavesdropping) mode”
Transmitter Algorithm • If adapter has a frame to send: • Line is idle-sends its frame-up to 1500 bytes • Line is busy-wait til line goes idle and send the frame • Collisions • These are detected as overvoltage AT AN ADAPTER • When collision is detected, receiver transmits 32 bit jamming sequence and shuts down-purpose of jamming sequence is to cause a collision at the sender • Frame must be long enough for this collision to occur—512 bits in classic ethernet
The ethernet advantage • It’s simple—no routing tables to maintain • It’s flexible—just plug in your PC • It’s cheap • Cable—$ 0.12/ft • Adaptors—$ 20 • Hubs--$ 30/port • Switch--$ 50/port
Token Ring • Shared medium similar to ethernet • Distributed algorithm controls transmission • All nodes see all frames Token=small (24 bit) circulating frame To send: Remove token and send frame Sender: removes message when it comes around and reinserts token
Multi-station access unit (MSAU) create a star-like topology
Token Ring Media Access Control MAC • Network adaptor contains-receiver, transmitter, buffer >1 bit • Need enough storage within the ring to store a 24 bit token • If you have less than 24 stations—one has to provide the storage—this will be the monitor
MAC cont. • To seize the ring-change 1 bit in the second byte-becomes preamble to the data packet. • A host copies those packets addressed to it and retransmits it around the ring • Sender removes the packet as it comes around—may still be sending information
Key Concept • Token Holding Time (THT)>transmission time of a packet • Token Rotation Time (TRT)< ActiveNodes x THT+RingLatency Note: TRT is load dependent
Early release versus delayed release THT=Frame transmission time + Ring Latency THT=Frame transmission time
Reliable Transmission • A-bit set to 1 by destination host when message is detected • C-bit set to 1 if successfully copied
Priority • Priority (3-bits)—8 levels • Token priority, packet priority • To seize the ring: Packet priority > Token priority • Reservations: Use reservation bits (3-bits) on a circulating packet to lock out low priority users. • Increase rb’s to your packet priority. • Current token holder sets token priority to the reservation • All users with packet priority > reservation may seize the ring. • New user must reset token priority to the original value
Token Ring Maintenance • Monitor roles • Ensure adequate delay • Check for token circulation— Max TRT=Number of users*THT+RingLatency • Removes orphaned and corrupted frames • Detects dead stations-beacon frame
Death of a Monitor • Monitor sends control message periodically • Hosts watch for this signal-if timeout, they try to become the monitor by sending a claim token • If claim token returns-sender is the monitor • If another claim token returns first-arbitration determines the new monitor
Token ring frame • Manchester encoding • Illegal Manchester codes are used as delimiters • Frame status bits-A & C