for flow control and error control. Either LLC entity can terminate a logical LLCconnection by issuing a disconnect (DISC) PDU.With type 3 operation, each transmitted PDU is acknowledged. A new (notfound in HDLC) unnumbered PDU, the Acknowledged Connectionless (AC)Information PDU, is defined. User data are sent in AC command PDUs and must beacknowledged using an AC response PDU. To guard against lost PDUs, a 1-bitsequence number is used. The sender alternates the use of 0 and 1 in its AC commandPDU, and the receiver responds with an AC PDU with the opposite numberof the corresponding command. Only one PDU in each direction may be outstandingat any time.Medium Access ControlAll LANs and MANs consist of collections of devices that must share the network’stransmission capacity. Some means of controlling access to the transmissionmedium is needed to provide for an orderly and efficient use of that capacity. This isthe function of a medium access control (MAC) protocol.The key parameters in any medium access control technique are where andhow. Where refers to whether control is exercised in a centralized or distributedfashion. In a centralized scheme, a controller is designated that has the authority togrant access to the network.A station wishing to transmit must wait until it receivespermission from the controller. In a decentralized network, the stations collectivelyperform a medium access control function to determine dynamically the order inwhich stations transmit. A centralized scheme has certain advantages, including• It may afford greater control over access for providing such things as priorities,overrides, and guaranteed capacity.• It enables the use of relatively simple access logic at each station.• It avoids problems of distributed coordination among peer entities.The principal disadvantages of centralized schemes are• It creates a single point of failure; that is, there is a point in the network that, ifit fails, causes the entire network to fail.• It may act as a bottleneck, reducing performance.The pros and cons of distributed schemes are mirror images of the points justmade.The second parameter, how, is constrained by the topology and is a tradeoffamong competing factors, including cost, performance, and complexity. In general,we can categorize access control techniques as being either synchronous or asynchronous.With synchronous techniques, a specific capacity is dedicated to a connection.This is the same approach used in circuit switching, frequency divisionmultiplexing (FDM), and synchronous time division multiplexing (TDM). Suchtechniques are generally not optimal in LANs and MANs because the needs of thestations are unpredictable. It is preferable to be able to allocate capacity in an asynchronous(dynamic) fashion, more or less in response to immediate demand. Theasynchronous approach can be further subdivided into three categories: roundrobin, reservation, and contention.464 CHAPTER 15 / LOCAL AREA NETWORK OVERVIEWRound Robin With round robin, each station in turn is given the opportunity totransmit. During that opportunity, the station may decline to transmit or may transmitsubject to a specified upper bound, usually expressed as a maximum amount of datatransmitted or time for this opportunity. In any case, the station, when it is finished,relinquishes its turn, and the right to transmit passes to the next station in logicalsequence. Control of sequence may be centralized or distributed. Polling is an exampleof a centralized technique.When many stations have data to transmit over an extended period of time,round-robin techniques can be very efficient. If only a few stations have data totransmit over an extended period of time, then there is a considerable overhead inpassing the turn from station to station, because most of the stations will not transmitbut simply pass their turns. Under such circumstances other techniques may bepreferable, largely depending on whether the data traffic has a stream or burstycharacteristic. Stream traffic is characterized by lengthy and fairly continuous transmissions;examples are voice communication, telemetry, and bulk file transfer.Bursty traffic is characterized by short, sporadic transmissions; interactive terminalhosttraffic fits this description.Reservation For stream traffic, reservation techniques are well suited. In general,for these techniques, time on the medium is divided into slots, much as with synchronousTDM. A station wishing to transmit reserves future slots for an extendedor even an indefinite period. Again, reservations may be made in a centralized ordistributed fashion.Contention For bursty traffic, contention techniques are usually appropriate.Withthese techniques, no control is exercised to determine whose turn it is; all stationscontend for time in a way that can be, as we shall see, rather rough and tumble.Thesetechniques are of necessity distributed in nature. Their principal advantage is thatthey are simple to implement and, under light to moderate load, efficient. For someof these techniques, however, performance tends to collapse under heavy load.Although both centralized and distributed reservation techniques have beenimplemented in some LAN products, round-robin and contention techniques arethe most common.MAC Frame Format The MAC layer receives a block of data from the LLClayer and is responsible for performing functions related to medium access and fortransmitting the data. As with other protocol layers, MAC implements these functionsmaking use of a protocol data unit at its layer. In this case, the PDU is referredto as a MAC frame.The exact format of the MAC frame differs somewhat for the various MACprotocols in use. In general, all of the MAC frames have a format similar to that ofFigure 15.7. The fields of this frame are• MAC Control: This field contains any protocol control information needed forthe functioning of the MAC protocol. For example, a priority level could beindicated here.• Destination MAC Address: The destination physical attachment point on theLAN for this frame.15.4 / BRIDGES 465• Source MAC Address: The source physical attachment point on the LAN forthis frame.• LLC: The LLC data from the next higher layer.• CRC: The Cyclic Redundancy Check field (also known as the frame checksequence, FCS, field). This is an error-detecting code, as we have seen inHDLC and other data link control protocols (Chapter 7).In most data link control protocols, the data link protocol entity is responsiblenot only for detecting errors using the CRC, but for recovering from those errors byretransmitting damaged frames. In the LAN protocol architecture, these two functionsare split between the MAC and LLC layers. The MAC layer is responsible fordetecting errors and discarding any frames that are in error. The LLC layer optionallykeeps track of which frames have been successfully received and retransmitsunsuccessful frames.15.4 BRIDGESIn virtually all cases, there is a need to expand beyond the confines of a single LAN,to provide interconnection to other LANs and to wide area networks. Two generalapproaches are used for this purpose: bridges and routers. The bridge is the simplerof the two devices and provides a means of interconnecting similar LANs. The
router is a more general-purpose device, capable of interconnecting a variety of
LANs and WANs. We explore bridges in this section and look at routers in Part
Five.
The bridge is designed for use between local area networks (LANs) that use
identical protocols for the physical and link layers (e.g., all conforming to IEEE
802.3). Because the devices all use the same protocols, the amount of processing
required at the bridge is minimal. More sophisticated bridges are capable of mapping
from one MAC format to another (e.g., to interconnect an Ethernet and a
token ring LAN).
Because the bridge is used in a situation in which all the LANs have the same
characteristics, the reader may ask, why not simply have one large LAN? Depending
on circumstance, there are several reasons for the use of multiple LANs connected
by bridges:
• Reliability: The danger in connecting all data processing devices in an organization
to one network is that a fault on the network may disable communication
for all devices. By using bridges, the network can be partitioned into
self-contained units.
• Performance: In general, performance on a LAN declines with an increase in
the number of devices or the length of the wire. A number of smaller LANs
will often give improved performance if devices can be clustered so that
intranetwork traffic significantly exceeds internetwork traffic.
• Security: The establishment of multiple LANs may improve security of communications.
It is desirable to keep different types of traffic (e.g., accounting,
466 CHAPTER 15 / LOCAL AREA NETWORK OVERVIEW
personnel, strategic planning) that have different security needs on physically
separate media. At the same time, the different types of users with different
levels of security need to communicate through controlled and monitored
mechanisms.
• Geography: Clearly, two separate LANs are needed to support devices clustered
in two geographically distant locations. Even in the case of two buildings
separated by a highway, it may be far easier to use a microwave bridge link
than to attempt to string coaxial cable between the two buildings.
Functions of a Bridge
Figure 15.8 illustrates the action of a bridge connecting two LANs, A and B, using
the same MAC protocol. In this example, a single bridge attaches to both LANs; frequently,
the bridge function is performed by two “half-bridges,” one on each LAN.
The functions of the bridge are few and simple:
• Read all frames transmitted on A and accept those addressed to any station on B.
• Using the medium access control protocol for B, retransmit each frame on B.
• Do the sam
đang được dịch, vui lòng đợi..
