Download presentation
Presentation is loading. Please wait.
1
Fiber Distributed Data Interface
FDDI Fiber Distributed Data Interface
2
Introduction FDDI stands for Fiber Distributed Data Interface. In a nutshell, FDDI is a 100 Mbps LAN technology which can run over fiber optic or copper cable. It is the oldest 100 Mbps network type commonly available, and is widely used as a backbone technology to interconnect several smaller Ethernet or Token Ring networks. It is also used whenever high reliability and/or high speed are required for a specific application.
3
Basic Topology FDDI uses three basic topologies: Ring, Star, and Tree.
These topologies can be combined to build large networks (up to 500 nodes) which use the advantages of each while avoiding each topology's drawbacks.
4
Basic Topology A definition of each topology is:
Ring A ring is a network where the cabling loops from one node to the next to form a closed loop. Star A star is a network where each node is connected to a central hub or concentrator. Tree A tree is basically a "star of stars" where hubs are cascaded to other hubs, to which either network nodes or other hubs can be attached.
5
Figure - Network Topologies
6
Combining Topologies As mentioned earlier, it is possible to combine these topologies in one network. For example, assume we have three buildings. In each building we install an FDDI network wired in a tree topology. We can interconnect the buildings in a ring topology, thereby creating a "ring of trees" network.
7
FDDI Cable Types There are four cable types which can be used with FDDI. They are: Multimode Fiber Optic Cable - Fiber optic cable, usually with a core size of 62.5 microns. It allows distances up to 2000 meters (6600 feet). Singlemode Fiber Optic Cable - Fiber optic cable with a core size of 7 to 11 microns. It allows distances up to 10,000 meters (33,000 feet). Category 5 UTP - An unshielded copper cable, usually with eight wires. The wires are twisted together in pairs, and the cable is rated at frequencies up to 100 MHz. It allows distances up to 100 meters (330 feet). IBM Type 1 STP - A heavy, shielded copper cable. It consists of four wires, twisted in to two pairs. Each pair is covered with an individual shield, and an overall shield covers the entire cable. It allows distances up to 100 meters (330 feet).
8
FDDI Cable Types The variety of cable types allows one to design an FDDI network which takes advantage of the strengths of each type in different parts of the network. For example, in areas where long distances are needed, fiber optic cable is commonly used. For areas where distances are fairly short, less expensive Category 5 cable can be used. This gives a lot of flexibility in designing an FDDI network. Regardless of cable type, the maximum overall logical ring length of an FDDI network can not exceed 200,000 meters (660,000 feet). It is strongly recommended to keep the actual ring length below 100,000 meters to allow for situations where the primary ring is "wrapped" around a break. Wrapping basically doubles the length of the ring. Also, there may be no more than 500 nodes on one ring.
9
FDDI Fundamentals FDDI has four key components:
the media access control (MAC) layer the physical (PHY) layer the physical media dependent (PMD) layer the station management (SMT) layer
10
FDDI in the OSI Hierarchy
FDDI is a link-layer protocol, which means that higher-layer protocols operate independently of the FDDI protocol. Applications pass packet-level data using higher-layer protocols down to the logical link control layer, in the same way that they would do over Ethernet or token ring. But because FDDI uses a different physical layer protocol than Ethernet and token ring, traffic must be bridged or routed on and off an FDDI ring. FDDI also allows for larger packet sizes than lower-speed LANs; for this reason, connections between FDDI and Ethernet or token ring LANs require the fragmentation and reassembly of frames.
11
MAC Layer The MAC layer defines addressing, scheduling, and routing data. It also communicates with higher-layer protocols, such as TCP/IP, SNA, IPX, DECnet, DEC LAT, and Appletalk. The FDDI MAC layer accepts Protocol Data Units (PDUs) of up to 9,000 symbols from the upper-layer protocols, adds the MAC header, and then passes packets of up to 4,500 bytes to the PHY layer.
12
PHY Layer The PHY layer handles the encoding and decoding of packet data into symbol streams for the wire. It also handles clock synchronization on the FDDI ring.
13
PMD Layer The PMD layer handles the analog baseband transmission between nodes on the physical media. PMD standards include TP-PMD for twisted-pair copper wires and Fiber-PMD for fiber optic cable.
14
TP-PMD Layer TP-PMD, a new ANSI standard, replaces the proprietary (or "prestandard") approaches previously used for running FDDI traffic over copper wires. The TP-PMD standard is based on an MLT-3 encoding scheme; prestandard implementations used the less reliable NRZ encoding scheme. TP-PMD interfaces are compliant with U.S. and international emission standards and provide reliable transmission over distances up to 100 meters.
15
TP- PMD Layer With TP-PMD in place, network managers now have a standard means to implement FDDI over inexpensive UTP cable, cutting cabling costs by about a third compared with fiber optic cabling.
16
SMT Layer SMT is an overlay function that handles the management of the FDDI ring. Functions handled by SMT include neighbor identific ation, fault detection and reconfiguration, insertion and de-insertion from the ring, and traffic statistics monitoring.
17
DAS and SAS FDDI can be implemented in two basic ways: as a dual-attached ring and as a concentrator-based ring. In the dual-attached scenario, stations are connected directly one to another. FDDI's dual counter-rotating ring design provides a fail-safe in case a node goes down. If any node fails, the ring wraps around the failed node. However, one limitation of the dual counter-rotating ring design is that if two nodes fail, the ring is broken in two places, effectively creating two separate rings. Nodes on one ring are then isolated from nodes on the other ring. External optical bypass devices can solve this problem, but their use is limited because of FDDI optical power requirements.
18
DAS and SAS Another way around this problem is to use concentrators to build networks (see Figure A). Concentrators are devices with multiple ports into which FDDI nodes connect. FDDI concentrators function like Ethernet hubs or token ring multiple access units (MAUs). Nodes are single-attached to the concentrator, which isolates failures occurring at those end-stations. With a concentrator, nodes can be powered on and off without disrupting ring integrity. Concentrators make FDDI networks more reliable and also provide SNMP management functions. For this reason, most FDDI networks are now built with concentrators.
19
SAS Figure A. FDDI concentrators function like token ring MAUs or Ethernet hubs. Concentrators make FDDI networks more reliable by isolating failures that occur at end-stations and by providing SNMP management functions.
20
DAS Figure B. In dual-homed applications, mission-critical servers are connected to redundant concentrators, which in turn are connected to a dual-attached ring for maximum redundancy.
21
DAS Benefits Concentrators that accommodate dual homing also provide high reliability (see Figure B). Under dual homing, mission-critical servers are connected to redundant concentrators, which are attached to a dual-attached ring for maximum redundancy.
22
How It Works At the lowest layer, FDDI creates a network comprised of two rings interconnecting all of the nodes on the network. Each ring transmits data in a direction opposite to the other one. These rings are logical in nature, and exist regardless of how the network is physically connected together. The reason for having two rings is fault tolerance. Most of the time, the primary ring carries the data and the secondary ring is idle. In the event of a break in the ring, the nodes nearest the break will loop the primary ring to the secondary ring, which bypasses the fault and results in an unbroken ring.
23
How It Works FDDI also offers the ability to use both rings for data transmission at the same time. This feature boosts the network speed to 200 Mbps. In the event of a fault, the secondary ring will revert to its previous function, and the overall network speed will drop to 100 Mbps. FDDI uses a token passing protocol which is similar, but not identical to, Token Ring. In such an arrangement a special type of packet called a token is sent around the network. Any node which wishes to transmit data to the network first captures the token, sends a packet of data to the network, then it releases the token. Every station on the network will receive the transmission and repeat it. If a station receives a transmission addressed to it, it will mark the transmission as received and repeat it to the network. The transmission will travel around the ring until it is received by the station which originally sent it, which removes it from the ring. If a station does not receive its transmission back, it assumes that an error occurred somewhere
24
SAS & DAS There are two main ways of interconnecting nodes in an FDDI network. The first way is called Single Attachment Station, or SAS for short. The other is called Dual Attached Station, or DAS. SAS A Single Attachment Station (SAS) FDDI network consists of each node having only one cable connecting it to a concentrator. Each node only connects to the primary ring in this configuration, and operation at 200 Mbps is not possible. The concentrator handles any situation where the primary ring needs to be wrapped back to the secondary ring. DAS A Dual Attachment Station (DAS) FDDI network consists of each node having two connections. These connections can be node to node, both between one node and one concentrator, or one node to two concentrators. The last type is called Dual Homing, and is used for very critical applications to keep a node connected to the network even if one of the concentrators it is connected to should happen to fail. In a DAS network, it is not necessary to use concentrators, although it is a good idea to do so. Concentrators provide a measure of protection by providing a wrapping function. A DAS network without concentrators can survive one break in ring integrity, with a second break isolating at least one and possibly many nodes. A Dual Homed connected DAS network has a considerable amount of redundancy built in, and is very unlikely to fail.
25
SAS & DAS Many FDDI networks are used with a combination of SAS and DAS. For example, a network designer may use SAS for connecting individual workstations to the FDDI concentrators, as SAS is considerably less expensive to implement, and the loss of a workstation will not normally be a significant problem for the overall network. However, the file servers and inter-concentrator links are extremely critical. The loss of one of these could result in a large group of users being isolated from critical data they need to do their jobs. Therefore, these links require the utmost reliability the designer can provide regardless of cost, so dual-homing DAS would be used here.
26
Advantages Like any technology, there are FDDI has strengths and weaknesses. The major ones are shown below: High Speed FDDI runs at a speed of 100 or 200 Mbps. This results in very good performance for demanding applications which need to transfer large amounts of data in a short amount of time. It is also excellent for servicing the needs of a large number of users to ensure everyone has enough bandwidth. FDDI's token-passing network results in a collision-free network which gives excellent performance even under heavy load (80% + utilization). Long Distance With an overall ring length of up to 20 km (66,000 feet), FDDI is an excellent choice for building a building-wide or campus network interconnecting several buildings.
27
Advantages Fault Tolerance FDDI's dual ring architecture and the ability to set up a network with the dual homing provides the ability to design networks which can continue to operate even if a cable run is cut or a concentrator should fail. Since FDDI has been in use for several years, the equipment has been thoroughly debugged and is exceptionally stable. Management FDDI works with all of the popular network management platforms, and most FDDI equipment has management features built-in from the factory. Flexibility FDDI can be used with any of four cable types, allowing the designer to use less expensive UTP or STP cable where runs are short and fiber optic cable where distances are longer and/or electrical noise is a concern.
28
Disadvantages Cost FDDI equipment is higher in cost than other 100 Mbps network technologies. This is due to the complexity of the token passing protocol and certain royalties which must be paid for every piece of equipment manufactured.
29
Backbone Uses Most network users do not require the high speed (and associated high cost) of a full-blown FDDI network. However, sometimes an organization will have such a large number of users that the aggregate bandwidth needed is far more than a 10 Mbps Ethernet or 16 Mbps Token Ring network can provide. One solution for this type of problem is to employ a combination of Switching and FDDI technologies to create a high speed backbone interconnecting a large number of small Ethernet or Token Ring networks. Figure Two shows this type of a network.
31
Backbone Uses In Figure Two, we have two file servers connected via FDDI to two FDDI concentrators. Note that each server has a DAS FDDI card installed in it, and each port on each card is attached to a different concentrator. This provides fault tolerance, as neither server can be knocked off the network by a failure of either concentrator. There is also a 10/100 Ethernet switch connected to the concentrators via a Dual Homed DAS connection. The switch will feed multiple small 10 Base-T networks.
32
Backbone Uses A network of this type allows taking advantage of the speed and reliability of FDDI where it is needed (at the servers) while protecting an existing investment in 10 Base-T technology. None of the workstations on the network need to be upgraded at all to take advantage of the increased aggregate bandwidth available. We simply split them in to smaller groups, with each group having 10 Mbps of speed dedicated for its exclusive use. If we have five groups, then there will be an aggregate of roughly 50 Mbps of bandwidth available where there was previously only 10 Mbps.
33
Backbone Uses Note that this type of solution will eliminate network slowness due to congestion, or too many nodes attempting to use 10 Mbps of bandwidth at once. If the application demands more than 10 Mbps at any workstation (for example, huge CAD files), then simply put an FDDI card in that workstation and connect it directly to one or both FDDI concentrators. This feature allows balancing cost with the actual need for speed and security of each station on the network.
Similar presentations
© 2025 SlidePlayer.com Inc.
All rights reserved.