`
`EXHIBIT
`EXHIBIT
`1011 – part 2
`1011 — part 2
`
`
`
`
`
`
`13.1 / ETHERNET AND FAST ETHERNET (CSMA/CD) 409
`
`
`
`TABLE 13.1 IEEE 802.3 10-Mbpsphysical layer medium alternatives.
`
`10BASES5
`10BASE2
`10BASE-T
`10BROAD36
`—=10BASE-FP
`
`
`Transmission
`Coaxial Cable
`Coaxial Cable
`Unshielded
`Coaxial Cable
`850-nm optical
`
`medium
`(50 ohm)
`(50 ohm)
`twisted pair
`(75 ohm)
`fiber pair
`
`Signaling
`technique
`
`Topology
`
`Maximum
`segment
`length (m)
`
`Baseband
`Baseband
`Baseband
`Broadband
`Manchester/
`
`(Manchester)
`(Manchester)
`(Manchester)
`(DPSK)
`On-off
`
`Bus
`
`500
`
`
`Bus
`Star
`Bus/Tree
`Star
`
`185
`
`100
`
`1800
`
`500
`
`
`
`Nodes per
`segment
`
`Cable
`
`
`100
`30
`—
`om
`33
`
`diameter (mm)
`
`10
`
`5
`
`0.4-0.6
`
`0.4-1.0
`
`62.5/125 pm
`
`maximum of four repeaters in the path between any twostations, thereby extend-
`ing the effective length of the medium to 2.5 kilometers.
`
`10BASE2 Medium Specification
`To provide a lower-cost system than 1OBASE5 for personal computer LANs,
`10BASE2 was added. As with 1OBASES, this specification uses 50-ohm coaxial
`cable and Manchestersignaling. The key difference is that 1OBASE2 uses a thinner
`cable, which supports fewer taps over a shorter distance than the 1OBASEScable.
`Because they have the same data rate, it is possible to combine 1OBASES and
`10BASE2 segments in the same network, by using a repeater that conforms to
`10BASESon oneside and 1OBASE2onthe otherside. The only restriction is that
`a 1OBASE2 segment should not be used to bridge two L1OBASES segments, because
`a “backbone” segment should be asresistant to noise as the segments it connects.
`
`1OBASE-T Medium Specification
`Bysacrificing somedistance, it is possible to develop a 10-Mbps LAN using the
`unshielded twisted pair medium. Such wire is often found prewired in office build-
`ings as excess telephonecable, and can be used for LANs. Such an approachis spec-
`ified in the LOBASE-T specification. The LOBASE-T specification defines a star-
`shaped topology. A simple system consists of a numberof stations connected to a
`central point, referred to as a multiport repeater, via two twisted pairs. The central
`point accepts input on any oneline and repeats it on all of the otherlines.
`Stations attach to the multiport repeater via a point-to-point link. Ordinarily,
`the link consists of two unshielded twisted pairs. Because of the high data rate and
`the poor transmission qualities of unshielded twisted pair, the length of a link is lim-
`ited to 100 meters. As an alternative, an optical fiber link may be used.In this case,
`the maximum length is 500 m.
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 1
`
`
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 1
`
`
`
`410 CHAPTER 13 / LAN SYSTEMS
`
`10BROAD36 Medium Specification
`The 10OBROAD36 specification is the only 802.3 specification for broadband. The
`medium employedis the standard 75-ohm CATV coaxial cable. Either a dual-cable
`or split-cable configuration is allowed. The maximum length of an individual seg-
`ment, emanating from the headend,is 1800 meters; this results in a maximum end-
`to-end span of 3600 meters.
`The signaling on the cable is differential phase-shift keying (DPSK). In ordi-
`nary PSK, a binary zero is represented by a carrier with a particular phase, and a
`. binary one is represent by a carrier with the opposite phase (180-degree difference).
`DPSK makesuse of differential encoding, in which a change of phase occurs when
`a zero occurs, and there is no change of phase when a one occurs. The advantage of
`differential encoding is that it is easier for the receiver to detect a change in phase
`than to determine the phaseitself.
`The characteristics of the modulation process are specified:so that the result-
`ing 10 Mbpssignal fits into a 14 MHz bandwidth.
`
`10BASE-F Medium Specification
`The 10BASE-F specification enables users to take advantage of the distance and
`transmission characteristics available with the use of optical fiber. The standard
`actually contains three specifications:
`
`e 10-BASE-FP (passive). A passive-star topology for interconnecting stations
`and repeaters with up to 1 km per segment.
`e 10-BASE-FL (link). Defines a point-to-point link that can be used to connect
`stations or repeaters at up to 2 km.
`e 10-BASE-FB (backbone). Defines a point-to-point link that can be used to
`connect repeaters at up. to 2 km.
`
`All three of these specifications make use of a pair of optical fibers for each
`transmission link, one for transmission in each direction.In all cases, the signaling
`schemeinvolves the use of Manchester encoding. Each Manchester signal element
`is then converted to an optical signal element, with the presence of light corre-
`sponding to high and the absence of light corresponding to low. Thus, a 10-Mbps
`Manchesterbit stream actually requires 20 Mbps onthe fiber.
`The 10-BASE-FP defines a passive star system that can support up to 33 sta-
`tions attached to a central passive star, of the type described in Chapter 3. 10-
`BASE-FL and 10-BASE-FP define point-to-point connections that can be used to
`extend the length of a network; the key difference between the two is that 10-
`BASE-FP makes use of synchronous retransmission. With synchronoussignaling,
`an optical signal coming into a repeater is retimed with a local clock and retrans-
`mitted. With conventional asynchronoussignaling, used with 10-BASE-FL, no such
`retiming takes place, so that any timing distortions are propagated through a series
`of repeaters. As a result, 1OBASE-FB can be used to cascade up to 15 repeaters in
`sequence to achieve greater length.
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 2
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 2
`
`
`
`13.1 / ETHERNET AND FAST ETHERNET (CSMA/CD) 411
`
`IEEE 802.3 100-Mbps Specifications (Fast Ethernet)
`Fast Ethernet refers to a set of specifications developed by the IEEE 802.3 com-
`mittee to provide a low-cost, Ethernet-compatible LAN operating at 100 Mbps. The
`blanket designation for these. standards is 1OOBASE-T. The committee defined a
`numberof alternatives to be used with different transmission media.
`Figure 13.4 shows the terminology used in labeling the specifications and indi-
`cates the media used. All of the 100BASE-T options use the IEEE 802.3 MACpro-
`tocol and frame format. 100BASE-X refers to a set of options that use the physical
`medium specifications originally defined for Fiber Distributed Data Interface
`(FDDI; coveredin the next section). All of the 100BASE-X schemes use two phys-
`ical links between nodes: one for transmission and one for reception. 1OOBASE-TX
`makesuse of shielded twisted pair (STP) or high-quality (Category 5) unshielded
`twisted pair (UTP). 100BASE-FX usesoptical fiber.
`In manybuildings, each of the 100BASE-X options requires the installation of
`new cable. For such cases, 1OOBASE-T4 defines a lower-cost alternative that can
`use Category-3, voice grade UTP in additionto the higher-quality Category 5 UTP.*
`To achieve the 100-Mbps data rate over lower-quality cable,1JOOBASE-T4 dictates
`the use of four twisted pair lines between nodes, with the data transmission making
`use of three pairs in one direction at a time.
`Forall of the 1GOBASE-T options, the topology is similar to that of 1OBASE-
`T, namely a star-wire topology.
`Table 13.2 summarizes key characteristics of the 1OOBASE-T options.
`
`100BASE-X
`For all of the transmission media specified under 100BASE-X, a unidirectional
`data rate of 100 Mbpsis achieved by transmitting over a single link (single twisted
`pair, single optical fiber). For all of these media, an efficient and effective signal
`
`IEEE 802.3 (100-Mbps)a
`/
`/\ 100BASE-FX
`
`100BASE-T4
`
`2CategoryS5 UTP
`
`2STP
`
`2 Optical fiber
`
`4 Category 3 or Category 5 UTP
`
`FIGURE13.4 IEEE 802.3 100BASE-Toptions.
`
`4 See Chapter3 for a discussion of Category 3 and Category 5 cable.
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 3
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 3
`
`
`
`412 CHAPTER 13 / LAN SYSTEMS
`
`TABLE 13.2 TEEE 802.3 100BASE‘T physical layer medium alternatives.
`
`100BASE-TX
`
`100BASE-FX
`
`100BASE-T4
`
`Transmission
`medium
`Signaling
`technique
`Data rate
`Maximum
`Segment length
`
`Network span 200 m 200 m 200 m 400 m
`
`2 pair, STP
`
`4B5B, NRZI
`
`2 pair, Category
`5 UTP
`4B5B, NRZI
`
`2 opticalfibers
`
`4B5B, NRZI
`
`4 pair, Category
`3, 4, or S UTP
`8B6T, NRZ
`
`100 Mbps
`100 m
`
`100 Mbps
`100 m
`
`100 Mbps
`100 m
`
`100 Mbps
`100 m
`
`.
`
`
`
`
`
`
`
`encoding schemeis required. The one chosen wasoriginally defined for FDDI, and
`can be referred to as 4B/SB-NRZI. See Appendix 13A for a description.
`The 100BASE-X designation includes two physical-medium specifications,
`one for twisted pair, known as 1OOBASE-TX, and onefor optical fiber, known as
`100-BASE-FX.
`100BASE-TX makesuse of two pairs of twisted pair cable, one pair used for
`transnjission and one for reception. Both STP and Category 5 UTP are allowed.
`The MTL-3 signaling scheme is used (described in Appendix 13A).
`100BASE-FX makesuse of two optical fiber cables, one for transmission and
`one for reception. With 1OOBASE-FX, a means is needed to convert the 4B/5B-
`NRZI code groups stream into optical signals. The technique used is known as
`intensity modulation. A binary 1 is represented by a burstor pulse of light; a binary
`0 is represented by either the absence of a light pulse or by a light pulse at very low
`intensity.
`
`100BASE-T4
`
`100BASE-T4is designed to produce a 100-Mbps data rate over lower-quality Cat-
`egory 3 cable, thus taking advantage of the large installed base of Category 3 cable
`in office buildings. The specification also indicates that the use of Category 5 cable
`is optional. 1COBASE-T4 does not transmit a continuous signal between packets,
`which makesit useful in battery-powered applications.
`For 100BASE-T4 using voice-grade Category 3 cable, it is not reasonable to
`expect to achieve 100 Mbpsona single twisted pair. Instead, IOOBASE-T4 specifies
`that the data stream to be transmitted is split up into three separate data streams,
`each with an effective data rate of 333 Mbps. Four twisted pairs are used. Data are
`transmitted using three pairs and received using three pairs. Thus, two of the pairs
`must be configured for bidirectional transmission.
`As with 100BASE-X, a simple NRZ encoding scheme is not used for
`100BASE-T4; this would require a signaling rate of 33 Mbps on each twisted pair
`and does not provide synchronization. Instead, a ternary signaling scheme knownas
`8B6Tis used (described in Appendix 13A).
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 4
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 4
`
`
`
`13.2 FOKEN RING AND FDDI
`
`13.2 / TOKEN RING AND FDDI 413
`
`Token ring is the most commonly used MACprotocol for ring-topology LANs. In
`this section, we examine two standard LANsthat use token ring: IEEE 802.5 and
`FDDI.
`
`TERE 802.5 Medium Access Control
`
`MAC Protocol
`The token ring technique is based on the use of a small frame, called a token, that
`circulates whenall stationsare idle. A station wishing to transmit must wait until it
`detects a token passingby.It then seizes the token by changing onebit in the token,
`which transformsit from a token into a start-of-frame sequence for a data frame.
`Thestation then appends andtransmits the remainderof the fields needed to con-
`struct a data frame.
`Whena station seizes a token and begins to transmit a data frame, there is no
`token onthering,so other stations wishing to transmit must wait. The frame on the
`ring will make a roundtrip and be absorbedby the transmitting station. The trans-
`mitting station will insert a new token onthe ring when bothof the following con-
`ditions have been met:
`
`e The station has completed transmission of its frame.
`° The leading edgeof the transmitted frame has returned (after a complete cir-
`culation of the ring) to the station.
`
`If the bit length of the ring is less than the frame length, the first condition
`implies the second; if not, a station could release a free token after it has finished
`transmitting but before it begins to receive its own transmission. The second condi-
`tion is not strictly necessary, and is relaxed undercertain circumstances. The advan-
`tage of imposing the second condition is that it ensures that only one data frame at
`a time maybe on thering and that only onestation at a time may be transmitting,
`thereby simplifying error-recovery procedures.
`Once the new token has been inserted on the ring, the next station down-
`stream with data to send will be able to seize the token and transmit. Figure 13.5
`illustrates the technique. In the example, A sends a packet to C, whichreceivesit
`and then sends its own packets to A and D.
`Note that under lightly loaded conditions, there is some inefficiency with
`token ring because a station must wait for the token to come around before trans-
`mitting. However, under heavy loads, which is whenit matters, the ring functions in
`a round-robin fashion, which is both efficient andfair. To see this, consider the con-
`figuration in Figure 13.5. After station A transmits, it releases a token. Thefirst sta-
`tion with an opportunity to transmit is D. If D transmits, it then releases a token and
`C has the next opportunity, and so on.
`The principal advantage of token ringis the flexible control over accessthatit
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 5
`
`
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 5
`
`
`
`414 CHAPTER 13 / LAN SYSTEMS
`
`
`
`
`
`
`
`
`
`FIGURE13.5 Token ring operation.
`
`provides. In the simple scheme just described, the access if fair. As we shall see,
`schemes can be used te regulate access to provide for priority and for guaranteed
`bandwidth services.
`Theprincipal disadvantage of token ring is the requirement for token mainte-
`nance. Loss of the token prevents furtherutilization of the ting. Duplication of the
`token canalso disrupt ring operation. One station must be selected as a monitor to
`ensure that exactly one tokenis on the ring and to ensure that a free token is rein-
`serted,if necessary.
`
`MAC Frame
`
`Figure 13.6 depicts the frame format for the 802.5 protocol. It consists of the fol-
`lowing fields:
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 6
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 6
`
`
`
`13.2 / TOKEN RING AND FppI 415
`
`Octets
`
`2or6
`2 or 6
`20
`[seTacro[on[ssPaneles[eeJ
`AC = Accesscontrol
`SA = Source address
`FS. = Framestatus
`SD = Starting delimiter
`= Destination address
`= Ending delimiter
`FC = Framecontrol
`FCS = Frame-check sequence
`
`(a) General frame format
`
`(b) Token frame format
`
`moe°
`
`Hoo
`
`Nondatabits
`Intermediate-framebits
`Error-detected bits
`
`c
`
`PPP = Priority bits
`
`T= Tokenbi
`
`(c) Accesscontrolfield
`
`= Monitorbit
`
`RRR = seenaronns
`
`:
`-
`A = Addressed recognized bit
`C = Copied bit
`
`FIGURE 13.6
`
`IEEE 802.5 frame format.
`
`Starting delimiter (SD). Indicates start of frame. The SD consists of signaling
`patterns that are distinguishable from data. It is coded as follows: JK0JIK000,
`where J and K are nondata symbols. The actual form of a nondata symbol
`depends on the signal encoding on the medium.
`e Access control (AC). Has the format PPPTMRRR, where PPP and RRRare
`3-bit priority and reservation variables, and M is the monitor bit; their use is
`explained below. T indicates whetherthis is a token or data frame. In the case
`of a token frame, the only remainingfield is ED.
`Frame control (FC). Indicates whether this is an LLC data frame.If not, bits
`in this field control operation of the token ring MACprotocol.
`‘Destination address (DA). As with 802.3.
`Source address (SA). As with 802.3.
`Data unit. Contains LLC data unit.
`Frame check sequence (FCS). As with 802.3.
`e End delimiter (ED). Contains the error-detection bit (E), which is set if
`any repeater detects an error, and the intermediate bit (1), which is used to
`indicate that this is a frame other than the final one of a multiple-frame
`transmission.
`Frame status (FS). Contains the address recognized (A) and frame-copied
`(C) bits, whose use is explained below. Because the A andCbits are outside
`the scope of the FCS, they are duplicated to provide a redundancy check to
`detect erroneoussettings.
`
`®
`
`eo
`
`Wecan nowrestate the token ring algorithm for the case when a single prior-
`ity is used. In this case, the priority and reservation bits are set to 0. A station wishing
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 7
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 7
`
`
`
`416 CHAPTER 13 / LAN SYSTEMS
`
`to transmit waits until.a token goes by, as indicated by a token bit of 0 in the AC
`field. The station seizes the token bysetting the token bit to 1. The SD and AC
`fields of the received token now function as the first two fields of the outgoing
`frame. The station transmitsone or more frames, continuinguntil either its supply
`of frames is exhausted or a token-holding timer expires. When the ACfield of the
`last transmitted frame returns, the station sets the token bit to 0 and appends an ED
`field, resulting in the insertion of a new token onthering.
`,
`Stations in the receive modelisten to the ring. Each station can check passing
`frames for errors and canset the E bit to 1 if an erroris detected.If a station detects
`its own MAC address,it sets the A bit to 1; it may also copy the frame, setting the
`C bit to 1. This allowsthe originating station to differentiate three results of a frame
`transmission:
`
`e Destination station nonexistent or not active (A = 0, C = 0)
`° Destination station exists but frame not copied (A = 1, C = 0)
`e Frame received (A = 1, C = 1)
`
`Token Ring Priority
`The 802.5 standard includes a specification for an optional priority mechanism.
`Eight levels of priority are supported by providing two 3-bit fields in each data
`frame and token:a priority field and a reservation field. To explain the algorithm,
`let us define the following variables:
`
`P; = priority of frame to be transmitted by station
`P, = service priority: priority of current token
`P, = value of P, as contained in the last token received by this station
`R, = reservation value in current token
`R, = highest reservation value in the frames received by this station during
`the last token rotation
`
`The scheme worksas follows:
`
`1, A station wishing to transmit must wait for a token with P, < Py.
`2. While waiting, a station may reserve a future tokenat its priority level (Pp).
`If a data frame goes by, and if the reservation field is less than its priority
`(R, < Py), then the station may set the reservation field of the frame to its
`priority (R, <— P,)..If a token framegoes by, and if (R, < Py AND Pr< Ps),
`then the station sets the reservation field of the frametoits priority (R, — Py).
`This setting has the effect of preempting any lower-priority reservation.
`3. Whena station seizes a token, it sets the token bit to 1 to start a data frame,
`sets the reservation field of the data frame to 0, andleavesthepriority field
`unchanged (the same as that of the incoming token frame).
`4, Following transmission of one or more data frames, a station issues a new
`token with the priority and reservationfields set as indicated in Table 13.3.
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 8
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 8
`
`
`
`13,2./ TOKEN RING AND FDDI
`
`417
`
`TABLE13.3 Actions performed by the token holder to
`implementthe priority scheme [based on VALE92].
`
`
`
` Conditions Actions
`
`Frameavailable AND P, = P,
`
`Send frame
`
`(Framenot available OR THT expired)
`AND P, = MAX [Rp P4
`
`(Framenot available OR THT expired)
`AND P, < MAX [R, Pj]
`AND P, > S,
`
`(Framenot available OR THT expired)
`AND P, < MAX [R,, Pf
`AND P, = S,
`
`(Frame not available OR
`(Frameavailable and P; < S,))
`AND P, = S,
`;
`AND R, > S,
`
`Send token with:
`P,<— Py
`R, — MAX [R,, Pd
`
`Send token with:
`P, — MAX [R, Pj
`R, <0
`Push S, < P,
`Push 8S, <— P,
`
`Send token with:
`P, —MAX [R, Pj
`R, <0
`Pop S,
`Push S, <— P;
`
`Send token with:
`P, —R,
`R, <0
`Pop S,
`Push S, — P,
`
`Send token with:
`(Frame notavailable OR
`P,<—R,
`(Frameavailable and P; < S,))
`R,<0
`AND P, = S,
`Pop S,
`AND R, = S,
`Pop S,
`
`The effect of the above steps is to sort the competing claims and to allow the
`waiting transmission of highest priority to seize the token as soon as possible. A
`moment’s reflection reveals that, as stated, the algorithm hasa ratchet effect on pri-
`ority, driving it to the highest used level and keeping it there. To avoidthis, a sta-
`tion that raises the priority (issues a token that has a higherpriority than the token
`that it received) has the responsibility of later lowering the priority to its previous
`level. Therefore, a station that raises priority must remember both the old and the
`new priorities and must downgrade the priority of the token at the appropriate
`time. In essence, each station is responsible for assuring that no token circulates
`indefinitely becauseits priority is too high. By rememberingthepriority of earlier
`transmissions, a station can detect this condition and downgradethe priority to a
`previous, lower priority or reservation.
`To implement the downgradingmechanism, two stacks are maintained by
`each station, one for reservations and one for priorities:
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 9
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 9
`
`
`
`418 CHAPTER 13 / LAN SYSTEMS
`
`S, = stack used to store new values of token priority
`S, = stack used to store old values of token priority
`
`The reasonthatstacks rather than scalar variables are requiredis that the pri-
`ority can be raised a numberof times by one or morestations. The successive raises
`must be unwoundin the reverse order.
`To summarize, a station having a higher priority frame to transmit than the
`current frame can reserve the nexttokenforits priority level as the frame passesby.
`Whenthe next token is issued, it will be at the reserved priority level. Stations of
`lowerpriority cannotseize the token,so it passes to the reserving station or an inter-
`mediate station with data to send of equalor higherpriority level than the reserved
`priority level. The station that upgraded thepriority level is responsible for down-
`grading it to its former level whenall higher-priority stations are finished. When
`that station sees a tokenat the higherpriority after it has transmitted,it can assume
`that there is no more higher-priority traffic waiting, and it downgrades the token
`before passing it on.
`Figure 13.7 is an example. The following events occur:
`
`1. A is transmitting a data frame to B at priority 0. When the frame has com-
`pletedacircuit of the ring and returns to A, A will issue a token frame. How-
`ever, as the data frame passes D, D makesa reservation at priority 3 by set-
`ting the reservationfield to 3.
`2. A issues a token with the priority field set to 3.
`3. If neither B nor C has data of priority 3 or greater to send, they cannotseize
`the token. The token circulates to D, which seizes the token and issues a data
`frame.
`4, After D’s data frame returns to D, D issues a new token at the samepriority
`as the token thatit received: priority 3.
`5. A sees a token at the priority level that it used to last issue a token; it there-
`fore seizes the token even if it has no data to send.
`6. A issues a token at the previous priority level: priority 0.
`
`Notethat, after A has issued a priority 3 token, any station with data of pri-
`ority 3 or greater may seize the token. Suppose that at this point station C now has
`priority 4 data to send. C will seize the token, transmitits data frame, and reissue a
`priority 3 token, which is then seized by D. By the time that a priority 3 token
`arrives at A,all intervening stations with data of priority 3 or greater to send will
`have had the opportunity. It is now appropriate, therefore, for A to downgrade the
`token.
`
`Early Token Release
`Whena station issues a frame, if the bit length of the ring is less than that of the
`frame, the leading edge of the transmitted frame will return to the transmitting sta-
`tion before it has completed transmission; in this case, the station may issue a token
`as soon as it has finished frame transmission. If the frame is shorter than the bit
`length of the ring, then after a station has completed transmission of a frame,it must
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 10
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 10
`
`
`
`13.2 / TOKEN RING AND FppI 419
`
`D reservesat
`higherlevel,
`
`
`
`4. D generates token
`at higherpriority
`
`
`
`
`
`2. A generales higher
`priority token and
`remembers lower
`priority.
`
`5. A seesthe high
`priority token and
`
` 1. A is sending B;
`level.
`
`capturesit.
`lower priority level.
`
`
`
`
`
`3. D uses higher
`g'
`priority token to
`send data lo C.
`
`6. A generates token
`8g
`at the pre-empted,
`
`| FIGURE13.7 IEEE tokenring priority scheme.
`
`wait until the leading edge of the frame returns before issuing a token.In this latter
`case, some of the potential capacity of the ring is unused.
`To allow for more efficient ring utilization, an early token release (ETR)
`option has been addedto the 802.5 standard. ETR allows a transmitting station to
`release a token as soon as it completes frame transmission, whether or not the
`frame header has returned to the station. The priority used for a token released
`prior to receipt of the previous frame headeris the priority of the most recently
`received frame.
`Oneeffect of ETR is that access delay for priority traffic may increase when
`the ring is heavily loaded with short frames. Because a station must issue a token
`before it can read the reservation bits of the frameit just transmitted, the station
`will not respond to reservations. Thus, the priority mechanism is at least partially
`disabled.
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 11
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 11
`
`
`
`420 CHAPTER 13 / LAN SYSTEMS
`
`Stations that implement ETR are compatible and interoperable with those
`that do not complete such implementation.
`
`IEEE 802.5 Physical Layer Specification
`The 802.5 standard (Table 13.4) specifies the use of shielded twisted pair with data
`tates of 4 and 16 Mbpsusing Differential Manchester encoding. An earlier specifi-
`cation of a 1-Mbps system has been dropped from the most recent edition of the
`standard.
`A recent addition to the standard is the use of unshielded twisted pair at
`4 Mbps.
`
`TABLE13.4 IEEE802.5 physical layer medium alternatives.
`
`Shielded twisted pair
`4 or 16
`Differential Manchester
`250
`
`Transmission medium
`Data rate (Mbps)
`Signaling technique
`Maximum numberof
`repeaters
`Notspecified
`Notspecified
`Maximum length
`between repeaters
`
`Unshielded twisted pair
`4
`Differential Manchester
`72
`
`FDDI Medium Access Control
`
`FDDIis a token ring scheme, similar to the IEEE 802.5 specification, that is designed
`for both LAN and MANapplications. There are several differences that are designed
`to accommodate the higher data rate (100 Mbps) of FDDI.
`
`MAC Frame
`Figure 13.8 depicts the frame format for the FDDIprotocol. The standard definesthe
`contents of this format in terms of symbols, with each data symbol corresponding to
`
`1
`4
`32,
`20
`160r48
`160r48
`8
`8
`64
`
`
`[Preamble] sp_[| Fc | va_| SA | Info | Fcs | ED I FS
`
`
`
`
`
`
`
`
`Bits
`
`(a) General frame format
`
`[Preamble] sp | FC I FS
`
`
`
`(b) Token frame format
`
`LEGEND
`SD = Start-frame delimiter
`FC = Framecontrol
`DA = Destination address
`
`SA = Source address
`FCS = Frame-check sequence
`
`ED = Endingdelimiter
`FS
`= Framestatus
`
`FIGURE13.8 FDDIframe formats.
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 12
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 12
`
`
`
`13.2 / TOKEN RING AND FDDI 421
`
`4 data bits. Symbols are used because,at the physical layer, data are encoded in 4-
`bit chunks. However, MACentities, in fact, must deal with individual bits, so the
`discussion that follows sometimes refers to 4-bit symbols and sometimeto bits. A
`frame other than a token frameconsists of the following fields:
`
`e Preamble. Synchronizes the frame with each station’s clock. The originator of
`the frame uses a field of 16 idle symbols (64 bits); subsequent repeating sta-
`tions may change the length of the field, as consistent with clocking require-
`. ments. The idle symbolis a nondatafill pattern. The actual form of a nondata-
`symbol dependsonthe signal encoding on the medium.
`Starting delimiter (SD). Indicates start of frame. It is coded as JK, where J and
`K are nondata symbols.
`Frame control (FC). Has the bit format CLFFZZ.ZZ, where C indicates
`whether this is a synchronous or asynchronous frame (explained below); L
`indicates the use of 16- or 48-bit addresses; FF indicates whether this is an
`LLC, MACcontrol, or reserved frame. For a control frame, the remaining 4
`bits indicate the type of control frame.
`Destination address (DA). Specifies the station(s) for which the frame is
`intended, It may be a unique physical address, a multicast-group address, or a
`broadcast address. The ring may contain a mixture of 16- and 48-bit address
`lengths.
`Source address (SA). Specifies the station that sent the frame.
`Information. Contains an LLC data unit or information related to a control
`operation.
`Frame check sequence (FCS). A 32-bit cyclic redundancy check, based on the
`FC, DA,SA,and informationfields.
`Ending delimiter (ED). Contains a nondata symbol(T ) and marksthe end of
`the frame, except for the FSfield.
`Frame Status (FS). Contains the error detected (E), address recognized (A),
`and frame copied (F) indicators. Each indicator is represented by a symbol,
`which is R for “reset” or “false” and S for “set” or “true.”
`
`A token frameconsists of the following fields:
`
`Preamble. As above.
`Starting delimiter. As above.
`Frame control (FC). Has the bit format 10000000 or 11000000 to indicate that
`this is a token.
`Ending delimiter (ED). Contains a pair of nondata symbols (T) that termi-
`nate the token frame.
`
`A comparison with the 802.5 frame (Figure 13.6) shows that the two are quite
`similar. The FDDI frame includes a preamble to aid in clocking, which is more
`demandingat the higher data rate. Both 16- and 48-bit addresses are allowed in the
`same network with FDDI; this is more flexible than the scheme used on all the 802
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 13
`
`Viptela, Inc. - Exhibit 1011 - Part 2
`Page 13
`
`
`
`422 CHAPTER 13 / LAN SYSTEMS
`
`standards. Finally, there are some differences in the control bits. For example,
`FDDI doesnotinclude priority and reservation bits; capacity allocation is handled
`in a different way, as described below.
`
`MAC Protocol
`
`The basic (without capacity allocation) FDDI MACprotocol is fundamentally the
`same as IEEE 802.5. There are two key differences:
`
`1. In FDDI,a station waiting for a token seizes the token by aborting (failing to
`repeat) the token transmission as soon as the token frameis recognized. After
`the captured token is completely received, the station begins transmitting one
`or more data frames. The 802.5 technique offlipping a bit to convert a token
`to the start of a data frame was considered impractical because of the high
`data rate of FDDI.
`2. In FDDI, a station that has been transmitting data frames releases a new
`token as soonas it completes data frame transmission,evenif it has not begun
`to receive its own transmission. This,is the same technique as the early token
`release option of 802.5, Again, because of the high data rate, it would be too
`inefficient to require the station to wait for its frame to return, as in normal
`802.5 operation.
`
`Figure 13.9 gives an example of ring operation. After station A has seized the
`token, it transmits frame F1, and immediately transmits a new token. F1 is
`addressed to station C, which copiesit as it circulates past. The frame eventually
`returns to A, which absorbsit. Meanwhile, B seizes the token issued by A and trans-
`mits F2 followed by a token. This action could be repeated any numberof times, so
`that, at any one time, there may be multiple framescirculating the ring. Each sta-
`tion is responsible for absorbing its own frames based on the source addressfield.
`A further word should be said about the frame status (FS) field. Each station
`can check passing bits for errors and can set the E indicator if an error is detected.
`If a station detects its own address, it sets the A indicator; it may also copy the
`frame, setting the C indicator; this allows the originating station, when it absorbs a
`frame that it previously transmitted, to differentiate among three conditions:
`
`e Station nonexistent/nonactive
`® Station active but frame not copied
`e Frame copied
`
`Whena frameis absorbed, the status indicators (E, A, C) in the FS field may be
`examined to determine the result of the transmission. However,if an errororfail-
`ure to receive condition is discovered, the MACprotocolentity does not attemptto
`retransmit the frame, but reports the condition to LLC.It is the responsibility of
`LLCor some higher-layer protocol to take corrective action.
`
`Capacity Allocation
`The priority scheme used in 802.5 will not work in FDDI,as a station will often issue
`a token before its own trans