DQDB

advertisement
DQDB
Network Security
What is DQDB?
•
•
•
•
•
•
•
•
Distributed Queue Dual Bus
DQDB is a DLL comm. protocol for MAN
Unlike FDDI, DQDB is an IEEE standard: 802.6
Designed for both voice & video
Topology used: Dual Bus - uses 2 unidirectional logical
buses
Extend up to 30 miles at 34-55 Mbps
Uses optical fibre links
Queued-packet distributed switch (QPSX) algorithm
Network Security
About DQDB
• Works on Data-link layer (specially in MAC sub-layer)
• Used in data, voice and video transmissions
• Used in data over cable services
• Based on Cell Relay Technology (like ATM)
• Provides connection-oriented, connection less services &
asynchronous services
Network Security
Few technical facts of DQDB
•
•
•
•
•
Distance up to 200 KM
Medium: Copper or Fiber
At distance up to 160 KM approx speed is 44.73 Mbps
(Copper)
At distance up to 100 KM approx speed is 150 Mbps (Fiber)
Transmission Rate: 34 Mbps to 150 Mbps
Network Security
DQDB Architecture
•
•
•
•
Each bus supports traffic in only one direction
Beginning of bus is denoted by a square and end by a triangle
Bus B traffic moves from right to left and Bus A traffic from left to
right
Each bus connects to stations directly through input and output
ports
Network Security
DQDB Architecture (Cont…)
•
The DQDB is composed of a two bus lines with stations
attached to both and a cell (Empty slots) generator at the
start of each bus.
•
The buses run in parallel in such a fashion as to allow the
cells generated to travel across the stations in opposite
directions.
•
The cell generator (head-end) is constantly producing
empty cells consisting of fifty-three bytes (a five byte
header and a forty-eight byte payload).
Network Security
Upstream & Downstream
•
As Bus A is configured
•
•
•
Stations 2 & 3 are considered to be upstream w.r.t station 1
Stations 1 & 2 are considered to be downstream w.r.t. station 3
As Bus B is configured
•
•
Station 2 & 3 are considered to be downstream w.r.t. station 1
Stations 1 & 2 are considered to be upstream w.r.t. station 3
Network Security
DQDB working
•
•
•
Head-ends generate fixed size cells in both directions (cell
generators)
To transmit, a host must know whether the destination is to
its right or its left
• If right, the host must send on left bus
• If left, the host must send on the right bus
A “Distributed Queue” is used to make sure that cells are
transmitted on a first-come first-serve basis
Network Security
DQDB Cell Format
 Segment Type (ST): Identify the cell as one of the following:
Single Segment
•
First Segment
•
Intermediate Segment
•
Last Segment
Message Identifier (MID): MID is the same for all DQDB cells
from the same MAC frame. This allows the identification of
intermediate segments.
Information: Actual Data
Length (LEN): The length of the information field.
CRC: For error correction
•




Network Security
DQDB cell header
Access Control Field (ACF):
This contains the BUSY and REQUEST bits that are used in the
operation of the DQDB. The BUSY bit indicates the cell is in use.
The REQUEST bit is set in a cell by a node that is waiting to
transmit.
Virtual Channel Identifier (VCI):
This is used to identify a virtual channel address.
Payload type (PT): 1st bit Data or Control ; 2nd
bit congestion.
Cell loss priority (CLP): Retain / Discard on
congestion.
Header Error Control (HEC): CRC for the
header.
Network Security
Download