Volume 1 • Issue 6 May–June 2000

Introduction to Industrial , Part 4. Part 3 was featured in Issue 5, the March–April 2000. If you would like a copy, please send your request to EXTENSION [email protected] A Technical Supplement to control NETWORK

MULTI-SEGMENT ETHERNET NETWORKS Using Repeaters to Increase Network Diameter By George Thomas, Contemporary Controls

INTRODUCTION that communication is half-duplex. operation or impacting media Although all nodes can send and arbitration. Repeaters are In our very first article on Ethernet receive, there cannot be any commonly viewed as a device that we discussed the basics of its simultaneous sending or receiving. restores the amplitude of the signal operation. We mentioned that This would result in collisions and in order to correct the effects of multi-segment Ethernet networks it is this detection of collisions that cable attenuation. However, can be constructed by using is used to arbitrate media access. Ethernet repeaters are required repeaters and hubs. A segment is Repeaters must not interfere with to do more. Repeaters must do defined as a length of cable this arbitration method by favoring the following: consisting of one or more cable one node over another. sections and associated connectors • Restore the amplitude with each end terminating in its of the signal characteristic impedance. For REPEATER REQUIREMENTS • Restore the symmetry example with 10BASE5, the of the signal segment represents the complete The requirements for repeaters are end to end length of thick coaxial stated in IEEE 802.3. The standard • Retime the signal cable even though several medium uses the term repeater set which attachment units (MAUs) are consists of a repeater with two or • Rebuild the preamble clamped onto the cable. The more attached MAUs. These MAUs • Enforce collisions on maximum length of a 10BASE5 may also have an AUI cable all segments segment is 500 m and this would connecting the repeater to its represent the network diameter of attached MAU but with modern • Extend fragments the Ethernet network if no repeaters this is not usually the repeaters were used. However, case. We will use the terms Ethernet can be expanded to a repeater and repeater set As a signal propagates down a larger network diameter by using interchangeably. A repeater is cable it suffers loss of signal repeaters as long as the network usually viewed as a two-port strength, symbol symmetry and diameter does not exceed the device, while a repeating hub has jitter is introduced due to effects collision domain of Ethernet. This more than two ports. Their identified as inter-symbol article will discuss those operation is the same. A valid interference. These effects must not restrictions. signal on one port is retransmitted accumulate through the use of to all other ports. Regardless if we repeaters. Repeaters must restore For this article, we will limit are using DIX V2.0 or IEEE 802.3 discussions to 10 Mbps, shared the integrity of the signals which frame format, the expansion issues includes retiming. Ethernet. With shared Ethernet, all are the same. Adding a repeater nodes participate in media should be transparent to the The preamble of an arbitration and must reside within network by not causing any consists of 64 bits and it is possible one collision domain. Another disruption of Ethernet’s basic that all bits are not present due to characteristic of shared Ethernet is

1 startup delays. The contribute data latency due to their • When a transmission path repeater must count the bits in the electronics. The IEEE 802.3 consists of four repeaters and incoming preamble and insert bits standard does an exhaustive study five segments, up to three of the if any are missing. This means that on all contributors of data latency segments may be mixing and the the repeater must have a first-in- including cables, and remainder must be link first out (FIFO) buffer in order to the like. These values formulate segments. When five segments accomplish this. All repeated ports the rules that govern the number are present, each fiber optic link will have the proper 64-bit of repeaters that can be cascaded. segment shall not exceed 500m. preamble. A mixing segment is actually a bus Preamble regeneration should not segment such as 10BASE2 or be confused with packet store and APPROACH 1 10BASE5. A link segment consists forwarding. According to the There are two approaches that can of only two MAUs and is capable standard, repeaters are not allowed be used to calculate the number of of full-duplex operation (10BASE- to store and forward. Bridges and repeaters. Approach 1 is more of FL and 10BASE-T qualify). Notice routers provide this functionality, the “cookbook” approach while that although 10BASE-FL is capable not repeaters. approach 2 is the more analytical. of achieving a 2km segment It would be nice to have simple length, it is limited to 500m under Ethernet relies upon collision the above conditions. Figure 1 sensing as it arbitrates access to the cabling rules for expanding an Ethernet network but unfortunately shows this situation. Notice that cable. Repeaters must reinforce the the maximum segment length for detection of a collision by asserting that is not the case. Here are the rules for approach 1: 10BASE2, 10BASE5 and 10BASE-T the same collision signal on all can be achieved. Only the 10BASE- ports. It does this by sending out a • The transmission path permitted FL segment length is restricted. 32-bit jam signal. If the collision between any two DTEs may This rule says that you cannot have was sensed during the 64-bit consist of up to five segments, an all coaxial system when using preamble, the preamble is still four repeater sets (including four repeaters; however, an all repeated but a 32-bit jam signal is optional AUIs), two MAUs, and fiber or all twisted-pair network is appended in order that all ports two AUIs. possible using four repeaters. see a minimum of 96 bits for proper collision detection by A DTE is data terminal equipment • When a transmission path devices connected to the ports. which is either the source or consists of three repeater sets This is called fragment extension. destination of the traffic. A repeater and four segments, the following set is actually a repeater with two restrictions apply: attached medium attachment units (MAUs). An AUI is an attachment – The inter-repeater fiber NETWORK DIAMETER segment can now be 1000m. LIMITATION unit interface which is required if external MAUs are being used. – The end fiber segments Repeaters can be connected in With this rule the two MAUs and (connected to DTEs) can series (cascaded) in order to the two AUIs are reserved for the be 400m. increase the network diameter but DTEs. The repeater sets, by there are restrictions. As mentioned definition, have their own MAUs. – All segments can be mixing. before, repeaters must reinforce collision detection but if the Repeater Set Repeater Set Repeater Set Repeater Set network diameter exceeds a single collision domain, unreliable operation will result. The DTE DTE maximum collision diameter is MAU MAU determined by the round-trip time of a signal propagating between the two furthest nodes. This time AUI 10BASE-T Coax Seg Coax Seg Coax Seg 10BASE-T AUI cannot exceed 575 bits (57.5µs at Link Seg 500 m 10BASE5 500 m 10BASE5 500 m 10BASE5 Link Seg 10 Mbps). 100 m 185 m 10BASE2 185 m 10BASE2 185 m 10BASE2 100 m or FOIRL/ or FOIRL/ 10BASE-FL 10BASE-FL Repeaters impact the maximum Link Seg Link Seg collision diameter since they 500 m 500 m Figure 1. Good example of 5-4-3 rule. Notice the distance limitation on the fiber segments.

2 LEFT END MID-SEGMENT(S) RIGHT END As an example let us assume an all twisted-pair network consisting of DTE MAU MAURPTR MAU MAU RPTR MAU MAU DTE six segments and five repeaters. Since both ends are 10BASE-T segments, there is no significance LEGEND: to left end and right end. If the AUI CABLE MAU— DTE—Data terminal equipment end segments are indeed different, MEDIUM RPTR—Repeater you would need to do the Figure 2. Approach 2 uses this path model. calculation twice since the left and right end delays are different. Use An all coaxial network can be the more generalized approach the worst case calculation. created when using three number 1. For our example, we want to use repeaters, and it appears that an The model used consists of two the maximum allowable segment all fiber system can extend to length of 100 meters. Therefore, 2800 meters. DTEs interconnected by repeaters as shown in figure 2. There is a from the chart select 26.55 and left end DTE and a right end DTE. 176.3 for the ends and 53.3 for the The middle segments are for the four mid-segments. Adding them 5-4-3 Rule repeaters. The round-trip bit times all up yields 416.05 which is less than the 572 limit. There seems to The above rules have lead to a for all devices can be found in the table. This calculation is done first. be much margin. If you do not use simplified procedure for creating the maximum length of the multi-segment Ethernet networks The total round trip delay of all devices or components cannot segments in the calculation, you called the 5-4-3 rule. In the 5-4-3 will need to calculate the actual rule, a total of five segments can exceed 575 bit times. This number is based upon the 64-bit preamble delay value for a particular length exist connected by four repeaters of cable using the following as long as no more than three are followed by 511 bits of frame. You should include some margin and equation: SDV = Base + [Length * bus segments. This is a very simple (RT delay/meter)]. rule and it does not address the the standard recommends not three, two or one repeater exceeding 572. Some technical The next calculation is to configuration. The rule also does references will say the limit is determine the IFG shrinkage. As not address the maximum actually 512 bit times since this is frames are processed through allowable segment length under the slot time. This ignores the 64- repeaters, there may be loss of bits the varying conditions. In general, bit preamble. IEEE 802.3 considers that must be compensated for by fiber segments are limited when the preamble as well. For a more the repeaters. The result is that the using multiple repeaters. For these conservative approach, simply use time between frames might be special situations, approach 2 512 bit times. Table 1 provides a reduced below the minimum stated should be used to determine if the listing of segment delay values in the standard. Therefore, a path proposed expansion method will (SDV) for the various media. variability value (PVV) calculation not exceed the limit of the collision domain.

APPROACH 2 For a detailed analysis on the restrictions for cascading hubs, approach 2 can be used. With this approach two parameters are calculated. First the worst case round trip delay is calculated. Second the interframe gap (IFG) shrinkage is calculated. The IEEE 802.3 standard provides tables for these calculations. This approach is used for situations not covered in Table 1. Segment round-trip delay values in bit times.

3 Table 2. Segment variability values in bit times.

must be made on the worst-case SUMMARY path. Table 2 provides the values. Note that you do not need to Shared Ethernet networks can be consider the receiving end. extended with repeaters as long as Therefore, there are only five the network diameter does not effected segments—the transmitting exceed the limit of a single segment and the four mid- collision domain. The IEEE 802.3 segments. For the transmitting standard mentions two approaches segment use 10.5 and for the mid in determining the limit. Approach segments use 8. The total would 1 provides a set of rules which has be 42.5 which is less than the 49 resulted in the short form 5-4-3 maximum. This example shows rule. Approach 2 is more analytical there is a situation where five and should be used when the repeaters can be used in a row network topology is inconsistent which contradicts approach 1. with the rules. What should be However, if you want to remain remembered is that in a shared conservative, limit your network to Ethernet network, repeaters should four repeaters. Notice that if we not be applied without thought. added one more repeater in our example (one more mid-segment) that the additional 8 bit times in the PVV calculation would exceed 49. Therefore, we could still pass the delay calculation but fail the IFG test. REFERENCES Practical Networking With Ethernet, Charles E. Spurgeon, 1997, International Thomson Computer Press

Switched and , Second Edition, Robert Breyer and Sean Riley, 1996, Macmillan Computer Publishing USA

International Standard ISO/IEC 8802-3 ANSI/IEEE Std 802.3, 1996, The Institute of Electrical and Electronic Engineers, Inc.

www.ccontrols.com

4