Professional Documents
Culture Documents
Preamble
Preamble SFD
SFD DA
DA SA
SA Type
Type Data
Data Pad
Pad CRC
CRC
A B
Simple
Reliable
Easy to reconfigure
HMG/HUT MAC Protocols (802.x) 21
June 2004
Ethernet Disadvantages
• Lack of priority levels
• Security issues
to segment 4 to segment 1
to segment 3 to segment 2
Host
Ring
interface
Bytes 1 1 1
SD AC ED
Token Format
Frame Format
Destination Source
SD AC FC Address Address Data Checksum ED FS
• SD = Starting Delimiter
• ED = Ending Delimiter
• They contains invalid differential Manchester
codes
PPPTMRRR
• P = Priority bits
– provides up to 8 levels of priority when accessing the
ring
• T = Token bit
– T=0: Token
– T=1: Frame
PPPTMRRR
• M = Monitor Bit
– Prevents tokens and frames from circulating indefinitely
– All frames and tokens are issued with M=0
– On passing through the “monitor station,” M is set to 1
– All other stations repeat this bit as set
– A token or frame that reaches the monitor station with M=1 is
considered invalid and is purged
PPPTMRRR
• R = Reservation Bits
– Allows stations with high priority data to request (in
frames and tokens as they are repeated) that the next
token be issued at the requested priority
• Address Fields:
– Indicate the source and destination hosts
– Broadcast:
• Set all destination address bits to 1s.
• Data
– No fixed limit on length
– Caveat: Hosts may only hold the token for a limited
amount of time (10 msec)
C
D
• Ring Topology
• A bit pattern token (1111 1111) floats on the ring
• Station captures token, converts to connector
(11 11 1110), transmits frame
• Intermediate stations relay message/token.
• Token is released when
(a) Leading edge of frame is received, and
(b) Frame is transmitted.
1
S = a+
a for a > 1
N
HMG/HUT MAC Protocols (802.x) 51
June 2004
Delay and stability
T (1 − Nρ ) = R
- Token is free with probability (1-Nρ)
• Nρ<1
• ρ<1/N
HMG/HUT MAC Protocols (802.x) 53
June 2004
• Average number of packets transmitted from a queue in
T=Q/N
• In limited service (IEEE 802.5 has THT) λT < m
– m packets served per token visit
• Tagged job methodology and residual service time
analysis gives
Average waiting delay (excluding service delay),W as
W=
NρΕ x 2 [ ]+
(1 + ρ )R
2 + (1 − Nρ − λR ) 2(1 − Nρ − λR )
HMG/HUT MAC Protocols (802.x) 54
June 2004
Flavor #1: Release After
Reception (RAR)
• Computer captures token, transmits data, waits for data to
successfully travel around ring, then releases token again.
• Allows computer to detect errored frames and retransmit them.
Example time evolution in which host 1 and host 3 have packets to transmit:
Define: Ti,j to be the time from when the token arrives at host i until
it next arrives at host j.
N (TRANSP )
∴η RAR ≤
N (TRANSP + PROP + TRANST ) + PROP
1 PROP
≈ , a= , TRANSP >> TRANST
1+ a TRANSP
Example time evolution in which host 1 and host 3 have packets to transmit:
TRANST TRANST
TRANSP TRANSP
Data Token Token Data Token
l1/c l2/c
time
Token arrives Token departs Token arrives
at host 1 from host 1 at host 3
Token arrives
at host 2
N (TRANSP )
∴η RAT ≤
N (TRANSP + TRANST ) + PROP
1 PROP
≈ , a= , TRANSP >> TRANST
1+ a / N TRANSP