Translate

Monday, October 3, 2016

FIBRE CHANNEL



 FIBRE CHANNEL
As the speed and memory capacity of personal computers, workstations, and
servers have grown, and as applications have become ever more complex with
greater reliance on graphics and video, the requirement for greater speed in delivering
data to the processor has grown. This requirement affects two methods of data
communications with the processor: I10 channel and network communications.
An I10 channel is a direct point-to-point or multipoint communications link,
predominantly hardware-based and designed for high speed over very short distances.
The I10 channel transfers data between a buffer at the source device and a
buffer at the destination device, moving only the user contents from one device to
another, without regard for the format or meaning of the data. The logic associated
with the channel typically provides the minimum control necessary to manage the
transfer plus hardware error detection. I10 channels typically manage transfers
between processors and peripheral devices, such as disks, graphics equipment, CDROMs,
and video I10 devices.
A network is a collection of interconnected access points with a software protocol
structure that enables communication. The network typically allows many different
types of data transfer, using software to implement the networking protocols
and to provide flow control, error detection, and error recovery. As we have discussed
in this lesson, networks typically manage transfers between end systems over
local, metropolitan, or wide-area distances.
Fibre Channel is designed to combine the best features of both technologiesthe
simplicity and speed of channel communications with the flexibility and interconnectivity
that characterize protocol-based network communications. This fusion
of approaches allows system designers to combine traditional peripheral connection,
host-to-host internetworking, loosely-coupled processor clustering, and multi
media applications in a single multi-protocol interface. The types of channeloriented
facilities incorporated into the Fibre Channel protocol architecture include
Data-type qualifiers for routing frame payload into particular interface
buffers
Link-level constructs associated with individual I10 operations
Protocol interface specifications to allow support of existing I10 channel
architectures, such as the Small Computer System Interface (SCSI)
The types of network-oriented facilities incorporated into the Fibre Channel
protocol architecture include
a Full multiplexing of traffic between multiple destinations
e Peer-to-peer connectivity between any pair of ports on a Fiber Channel
network
Capabilities for internetworking to other connection technologies
Depending on the needs of the application, either channel or networking
approaches can be used for any data transfer. The Fibre Channel Association,
which is the industry consortium promoting Fibre Channel, lists the following ambitious
requirements that Fibre Channel is intended to satisfy [FCA94]:
Full duplex links with two fibers per link
Performance from 100 Mbps to 800 Mbps on a single link (200 Mbps to 1600
Mbps per link)
a Support for distances up to 10 km
Small connectors
High-capacity utilization with distance insensitivity
Greater connectivity than existing multidrop channels
Broad availability (i.e., standard components)
0 Support for multiple costlperformance levels, from small systems to supercomputers
0 Ability to carry multiple existing interface command sets for existing channel
and network protocols
The solution was to develop a simple generic transport mechanism based on
point-to-point links and a switching network. This underlying infrastructure supports
a simple encoding and framing scheme that in turn supports a variety of channel
and network protocols.
Fibre Channel Elements
The key elements of a Fibre Channel network are the end systems, called nodes,
and the network itself, which consists of one or more switching elements. The collection
of switching elements is referred to as a fabric. These elements are interconnected
by point-to-point links between ports on the individual nodes and
switches. Communication consists of the transmission of frames across the point-topoint
links.
Figure 13.15 illustrates these basic elements. Each node includes three or
more ports, called N-ports, for interconnection. Similarly, each fabric-switching
element includes one or more ports, called F-ports. Interconnection is by means of
bidirectional links between ports. Any node can communicate with any other node
connected to the same fabric using the services of the fabric. All routing of frames
between N-ports is done by the fabric. Frames may be buffered within the fabric,
making it possible for different nodes to connect to the fabric at different data rates.
A fabric can be implemented as a single fabric element, as depicted in Figure
13.15, or as a more general network of fabric elements, as shown in Figure 13.16. In
either case, the fabric is responsible for buffering and for routing frames between
source and destination nodes.
The Fibre Channel network is quite different from the other LANs that we
have examined so far. Fibre Channel is more like a traditional circuit-switched or
packet-switched network, in contrast to the typical shared-medium LAN. Thus,
Fibre Channel need not be concerned with medium access control issues. Because
it is based on a switching network, the Fibre Channel scales easily in terms of
N-ports, data rate, and distance covered. This approach provides great flexibility.
Fibre Channel can readily accommodate new transmission media and data rates by
adding new switches and F-ports to an existing fabric. Thus, an existing investment
is not lost with an upgrade to new technologies and equipment. Further, as we shall
see, the layered protocol architecture accommodates existing I10 interface and networking
protocols, preserving the pre-existing investment.
Fibre Channel Protocol architecture
The Fibre Channel standard is organized into five levels. These are illustrated in
Figure 13.17, with brief definitions in Table 13.6. Each level defines a function or set
of related functions. The standard does not dictate a correspondence between levels
and actual implementations, with a specific interface between adjacent levels.
Rather, the standard refers to the level as a "document artifice" used to group
related functions.
Levels FC-0 through FC-2 of the Fibre Channel hierarchy are currently
defined in a standard referred to as Fiber Channel Physical and Signaling Interface
(FC-PH). Currently, there is no final standard for FC-3. At level FC-4, individual
standards have been produced for mapping a variety of channel and network protocols
onto lower levels.
We briefly examine each of these levels in turn in the remainder of this
lesson.
Physical Interface and Media
Fibre Channel level FC-0 allows a variety of physical media and data rates; this
is one of the strengths of the specification. Currently, data rates ranging from
100 Mbps to 800 Mbps per fiber are defined. The physical media are optical fiber,
coaxial cable, and shielded twisted pair. Depending on the data rate and medium
involved, maximum distances for individual point-to-point links range from
50 meters to 10 km.
Transmission Protocol
FC-1, the transmission protocol level, defines the signal encoding technique used
for transmission and for synchronization across the point-to-point link. The encoding
scheme used is 8B/10B, in which each 8 bits of data from level FC-2 is converted
into 10 bits for transmission. See Appendix 13A for a description.
Framing Protocol
Level FC-2, referred to as the Framing Protocol level, deals with the transmission
of data between N-ports in the form of frames. Among the concepts defined at this
level are
Node and N-port and their identifiers
Topologies
Classes of service provided by the fabric
Segmentation of data into frames and reassembly
Grouping of frames into logical entities called sequences and exchanges
Sequencing, flow control, and error control
Common Services
FC-3 provides a set of services that are common across multiple N-Ports of a node.
The functions so-far defined in the draft FC-3 documents include
@ Striping. Makes use of multiple N-Ports in parallel to transmit a single information
unit across multiple links simultaneously; this achieves higher aggregate
throughput. A likely use is for transferring large data sets in real time, as
in video-imaging applications.
Hunt Groups. A hunt group is a set of associated N-Ports at a single node.
This set is assigned an alias identifier that allows any frame sent to this alias
to be routed to any available N-Port within the set. This may decrease latency
by decreasing the chance of waiting for a busy N-Port.
(B Multicast. Delivers a transmission to multiple destinations. This includes
sending to all N-Ports on a fabric (broadcast) or to a subset of the N-Ports on
a fabric.
Mapping
FC-4 defines the mapping of various channel and network protocols to FC-PH. 110
channel interfaces include
Small Computer System Interface (SCSI). A widely used high-speed interface
typically implemented on personal computers, workstations, and server^.^
SCSI is used to support high-capacity and high-data-rate devices, such as disks
and graphics and video equipment.
High-Performance Parallel Interface (HIPPI). A high-speed channel standard
primarily used for mainframe/supercomputer environments. At one
time, HIPPI and extensions to HIPPI were viewed as a possible generalpurpose
high-speed LAN solution, but HIPPI has been superseded by Fibre
Channel.
Network interfaces include
IEEE 802. IEEE 802 MAC frames map onto Fibre Channel frames.
@ Asynchronous Transfer Mode
Fi Internet Protocol (IP). This protocol is described in Lesson 16.
The FC-4 mapping protocols make use of the FC-PH capabilities to transfer
upper-layer protocol (ULP) information. Each FC-4 specification defines the for-
mats and procedures for ULP.
Fibre Channel Physical Media and Topologies
One of the major strengths of the Fibre Channel standard is that it provides a range
of options for the physical medium, the data rate on that medium, and the topology
of the network.
Transmission Media
Table 13.7 summarizes the options that are available under Fibre Channel for physical
transmission medium and data rate. Each entry specifies the maximum pointto-
point link distance (between ports) that is defined for a given transmission
medium at a given data rate. These media may be mixed in an overall configuration.
For example, a single-mode optical link could be used to connect switches in different
buildings, with multimode optical links used for vertical distribution inside, and
shielded twisted pair or coaxial cable links to individual workstations.
Topologies
The most general topology supported by Fibre Channel is referred to as a fabric or
switched topology. This is an arbitrary topology that includes at least one switch to
interconnect a number of N-ports, as shown in Figure 13.18a. The fabric topology
may also consist of a number of switches forming a switched network, with some or
all of these switches also supporting end nodes (Figure 13.16).
Routing in the fabric topology is transparent to the nodes. Each port in the
configuration has a unique address. When data from a node are transmitted into the
fabric, the edge switch to which the node is attached uses the destination port
address in the incoming data frame to determine the destination port location. The
switch then either delivers the frame to another node attached to the same switch
or transfers the frame to an adjacent switch to begin the routing of the frame to a
remote destination.
The fabric topology provides scalability of capacity: As additional ports are
added, the aggregate capacity of the network increases, thus minimizing congestion
and contention, and increasing throughput. The fabric is protocol-independent and
largely distance-insensitive. The technology of the switch itself and of the transmis-
sion links connecting the switch to nodes may be changed without affecting the
overall configuration. Another advantage of the fabric topology is that the burden
on nodes is minimized. An individual Fibre Channel node (end systems) is only
responsible for managing a simple point-to-point connection between itself and the
fabric; the fabric is responsible for routing between N-ports and error detection.
In addition to the fabric topology, the Fibre Channel standard defines two
other topologies. With the point-to-point topology (Figure 13.18b) there are only
two N-ports, and these are directly connected, with no intervening fabric switches.
In this case, there is no routing.
Finally, the arbitrated loop topology (Figure 13.18~)is a simple, low-cost
topology for connecting up to 126 nodes in a loop. The ports on an arbitrated loop
must contain the functions of both N-ports and F-ports; these are called NL-ports.
The arbitrated loop operates in a manner roughly equivalent to the token ring protocols
that we have seen. Each port sees all frames and passes and ignores those not
addressed to itself. There is a token acquisition protocol to control access to the
loop.
The fabric and arbitrated loop topologies may be combined in one configuration
to optimize the cost of the configuration. In this case, one of the nodes on the
arbitrated loop must be a fabric-loop (FL-port) node so that it participates in routing
with the other switches in the fabric configuration.
The type of topology need not be configured manually by a network manager.
Rather, the type of topology is discovered early in the link initialization process.
13.6 WIRELESS LANS
A set of wireless LAN standards has been developed by the IEEE 802.11 committee.
The terminology and some of the specific features of 802.11 are unique to this
standard and are not reflected in all commercial products. However, it is useful to
be familiar with the standard as its features are representative of required wireless
LAN capabilities.
Figure 13.19 indicates the model developed by the 802.11 working group. The
smallest building block of a wireless LAN is a basic service set (BSS), which consists
of some number of stations executing the same MAC protocol and competing for
access to the same shared medium. A basic service set may be isolated, or it may
connect to a backbone distribution system through an access point. The access point
functions as a bridge. The MAC protocol may be fully distributed or controlled by
a central coordination function housed in the access point. The basic service set generally
corresponds to what is referred to as a cell in the literature.
An extended service set (ESS) consists of two or more basic service sets interconnected
by a distribution system. Typically, the distribution system is a wired
backbone LAN. The extended service set appears as a single logical LAN to the
logical link control (LLC) level.
The standard defines three types of stations, based on mobility:
a No-transition. A station of this type is either stationary or moves only within
the direct communication range of the communicating stations of a single
BSS.
BSS-transition. This is defined as a station movement from one BSS to
another BSS within the same ESS. In this case, delivery of data to the station
requires that the addressing capability be able to recognize the new location
of the station.
a ESS-transition. This is defined as a station movement from a BSS in one ESS
to a BSS within another ESS. This case is supported only in the sense that the
station can move. Maintenance of upper-layer connections supported by
802.11 cannot be guaranteed. In fact, disruption of service is likely to occur.
Physical Medium Specification
Three physical media are defined in the current 802.11 standard:
Infrared at 1 Mbps and 2 Mbps operating at a wavelength between 850 and
950 nm.
@ Direct-sequence spread spectrum operating in the 2.4-GHz ISM band. Up to
7 channels, each with a data rate of 1 Mbps or 2 Mbps, can be used.
Frequency-hopping spread spectrum operating in the 2.4-GHz ISM band. The
details of this option are for further study.

Medium Acces Control
The 802.11 working group considered two types of proposals for a MAC algorithm:
distributed-access protocols which, like CSMAICD, distributed the decision to
transmit over all the nodes using a carrier-sense mechanism; and centralized access
protocols, which involve regulation of transmission by a centralized decision maker.
A distributed access protocol makes sense of an ad hoc network of peer workstations
and may also be attractive in other wireless LAN configurations that consist
primarily of bursty traffic. A centralized access protocol is natural for configurations
in which a number of wireless stations are interconnected with each other
and with some sort of base station that attaches to a backbone wired LAN; it is
especially useful if some of the data is time-sensitive or high priority.
The end result of the 802.11 is a MAC algorithm called DFWMAC (distributed
foundation wireless MAC) that provides a distributed access-control mechanism
with an optional centralized control built on top of that. Figure 13.20 illustrates
the architecture. The lower sublayer of the MAC layer is the distributed coordination
function (DCF). DCF uses a contention algorithm to provide access to all traffic.
Ordinary asynchronous traffic directly uses DCF. The point coordination function
(PCF) is a centralized MAC algorithm used to provide contention-free service.
PCF is built on top of DCF and exploits features of DCF to assure access for its
users. Let us consider these two sublayers in turn.
Distributed Coordination Function
The DCF sublayer makes use of a simple CSMA algorithm. If a station has a MAC
frame to transmit, it listens to the medium. If the medium is idle, the station may
transmit; otherwise, the station must wait until the current transmission is complete
before transmitting. The DCF does not include a collision-detection function (i.e.,
CSMAICD) because collision detection is not practical on a wireless network. The
dynamic range of the signals on the medium is very large, so that a transmitting station
cannot effectively distinguish incoming weak signals from noise and the effects
of its own transmission.
To ensure the smooth and fair functioning of this algorithm, DCF includes a
set of delays that amounts to a priority scheme. Let us start by considering a single
delay known as an interframe space (IFS). In fact, there are three different IFS values,
but the algorithm is best explained by initially ignoring this detail. Using an
IFS, the rules for CSMA access are as follows:
I. A station with a frame to transmit senses the medium. If the medium is idle,
the station waits to see if the medium remains idle for a time equal to IFS, and,
if this is so, the station may immediately transmit.
2. If the medium is busy (either because the station initially finds the medium
busy or because the medium becomes busy during the IFS idle time), the station
defers transmission and continues to monitor the medium until the current
transmission is over.
3. Once the current transmission is over, the station delays another IFS. If the
medium remains idle for this period, then the station backs off using a binary
exponential backoff scheme and again senses the medium. If the medium is
still idle, the station may transmit.
As with Ethernet, the binary exponential backoff provides a means of handling
a heavy load. If a station attempts to transmit and finds the medium busy, it
backs off a certain amount and tries again. Repeated failed attempts to transmit
result in longer and longer backoff times.
The above scheme is refined for DCF to provide priority-based access by the
simple expedient of using three values for IFS:
SIFS (short IFS). The shortest IFS, used for all immediate response actions,
as explained below.
PIFS (point coordination function IFS). A mid-length IFS, used by the centralized
controller in the PCF scheme when issuing polls.
DIFS (distributed coordination function IFS). The longest IFS, used as a minimum
delay for asynchronous frames contending for access.
Figure 13.21a illustrates the use of these time values. Consider first the SIFS.
Any station using SIFS to determine transmission opportunity has, in effect, the
highest priority, because it will always gain access in preference to a station waiting
an amount of time equal to PIFS or DIFS. The SIFS is used in the following circumstances:
" Acknowledgment (ACK). When a station receives a frame addressed only to
itself (not multicast or broadcast) it responds with an ACK frame after waiting
only for an SIFS gap; this has two desirable effects. First, because collision
detection is not used, the likelihood of collisions is greater than with
CSMAICD, and the MAC-level ACK provides for efficient collision recovery.
Second, the SIFS can be used to provide efficient delivery of an LLC protocol
data unit (PDU) that requires multiple MAC frames. In this case, the following
scenario occurs. A station with a multiframe LLC PDU to transmit
sends out the MAC frames one at a time. Each frame is acknowledged by the
recipient after SIFS. When the source receives an ACK, it immediately (after
SIFS) sends the next frame in the sequence. The result is that once a station
has contended for the channel, it will maintain control of the channel until it
has sent all of the fragments of an LLC PDU.
" Clear to Send (CTS). A station can ensure that its data frame will get through
by first issuing a small Request to Send (RTS) frame. The station to which this
frame is addressed should immediately respond with a CTS frame if it is ready
to receive. All other stations receive the RTS and defer using the medium
until they see a corresponding CTS, or until a timeout occurs.
Poll response. This is explained in the discussion of PCF, below.
The next longest IFS interval is the PIFS; this is used by the centralized controller
in issuing polls and takes precedence over normal-contention traffic. However,
those frames transmitted using SIFS have precedence over a PCF poll.
Finally, the DIFS interval is used for all ordinary asynchronous traffic.
Point Coordination Function
PCF is an alternative access method implemented on top of the DCF. The operation
consists of polling with the centralized polling master (point coordinator). The
point coordinator makes use of PIFS when issuing polls. Because PIFS is smaller
than DIFS, the point coordinator can seize the medium and lock out all asynchronous
traffic while it issues polls and receives responses.
As an extreme, consider the following possible scenario. A wireless network
is configured so that a number of stations with time-sensitive traffic are controlled
by the point coordinator while remaining traffic, using CSMA, contends for access.
The point coordinator could issue polls in a round-robin fashion to all stations configured
for polling. When a poll is issued, the polled station may respond using
SIFS. If the point coordinator receives a response, it issues another poll using PIFS.
If no response is received during the expected turnaround time, the coordinator
issues a poll.
If the discipline of the preceding paragraph were implemented, the point coordinator
would lock out all asynchronous traffic by repeatedly issuing polls. To prevent
this situation, an interval known as the superframe is defined. During the first
part of this interval, the point coordinator issues polls in a round-robin fashion to
all stations configured for polling. The point coordinator then idles for the remainder
of the superframe, allowing a contention period for asynchronous access.
Figure 13.21b illustrates the use of the superframe. At the beginning of a
superframe, the point coordinator may optionally seize control and issue polls for
a give period of time. This interval varies because of the variable frame size issued
by responding stations. The remainder of the superframe is available for contention-
based access. At the end of the superframe interval, the point coordinator
contends for access to the medium using PIFS. If the medium is idle, the point coordinator
gains immediate access, and a full superframe period follows. However, the
medium may be busy at the end of a superframe. In this case, the point coordinator
must wait until the medium is idle to gain access; this results in a foreshortened
superframe period for the next cycle.

No comments:

Post a Comment

silahkan membaca dan berkomentar