09.12.2012 Views

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

Understanding the network.pdf - Back to Home

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>the</strong> next station. When a station has data <strong>to</strong> transmit, it captures <strong>the</strong> <strong>to</strong>ken and<br />

transmits its data. The receiving station copies <strong>the</strong> transmitted frames and <strong>the</strong>n<br />

retransmits <strong>the</strong>m back on <strong>to</strong> <strong>the</strong> ring. The amount of time a station has <strong>to</strong> transmit<br />

data is governed by <strong>the</strong> <strong>to</strong>ken holding rules. When its transmission is complete or<br />

when <strong>the</strong> holding timer has expired, <strong>the</strong> sending station transmits a new <strong>to</strong>ken. It is<br />

<strong>the</strong> responsibility of <strong>the</strong> transmitting station <strong>to</strong> strip its transmitted frames off <strong>the</strong><br />

ring when <strong>the</strong>y return from <strong>the</strong> destination station.<br />

The stations attached <strong>to</strong> <strong>the</strong> ring determine <strong>the</strong> <strong>to</strong>ken holding rules through <strong>the</strong> use<br />

of <strong>the</strong> Token Rotation Pro<strong>to</strong>col (TRP). The TRP defines three classes of data traffic:<br />

two synchronous classes and one asynchronous.<br />

• Synchronous (Class 1) supports guaranteed bandwidth and response times<br />

• Synchronous (Class 2) is restricted <strong>to</strong>ken traffic that supports point-<strong>to</strong>-point<br />

sessions between stations.<br />

• Asynchronous supports multiple traffic priorities<br />

The synchronous classes allocate a dedicated amount of bandwidth; <strong>the</strong> remaining<br />

bandwidth is used for asynchronous transmissions. This async bandwidth is shared<br />

by all <strong>the</strong> stations through <strong>the</strong> use of timers. The TRP is tunable, and some of <strong>the</strong>se<br />

parameters are Target Token Rotation Timer (TTRT), Token Rotation Timer (TRT),<br />

and <strong>the</strong> Token Holding Timer (THT). These and o<strong>the</strong>r tuning options allow <strong>network</strong><br />

performance <strong>to</strong> be tuned <strong>to</strong> best meet higher level application access needs.<br />

The <strong>to</strong>ken holding rules are negotiated by <strong>the</strong> station management interface. The<br />

negotiation process occurs whenever a new station joins <strong>the</strong> ring. This process is in<br />

essence a bidding war between <strong>the</strong> stations <strong>to</strong> decide who will initialize <strong>the</strong> ring and<br />

<strong>to</strong> agree upon a guaranteed service time. The bidding is done by having each station<br />

announce how often it needs access <strong>to</strong> <strong>the</strong> <strong>to</strong>ken, based on its synchronous service<br />

requirement. The station with <strong>the</strong> lowest bit wins. The winning bid is s<strong>to</strong>red as <strong>the</strong><br />

TTRT, and <strong>the</strong> guaranteed service time is two times <strong>the</strong> TTRT. The winning station<br />

sends <strong>the</strong> first <strong>to</strong>ken, and on <strong>the</strong> second pass o<strong>the</strong>r synchronous devices might start<br />

<strong>to</strong> transmit. When <strong>the</strong> synchronous "class" stations have transmitted <strong>the</strong>ir data, <strong>the</strong><br />

asynchronous stations can have access <strong>to</strong> <strong>the</strong> <strong>to</strong>ken.<br />

The FDDI frame has a maximum size of 4,500 bytes. The <strong>to</strong>ken and frame are two<br />

different frame entities. They are not a single frame appended with delivery<br />

information and data, as with Token Ring. The FDDI MAC frames carry SMT control<br />

information and use 802.2 LLC-PDUs <strong>to</strong> transport ULP data. Figure 4.25 illustrates<br />

<strong>the</strong> FDDI MAC data frame and <strong>to</strong>ken formats.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!