Automation Systems Discrete Event Control Systems and Networked Automation Systems

Size: px
Start display at page:

Download "Automation Systems Discrete Event Control Systems and Networked Automation Systems"

Transcription

1 Automation Systems Discrete Event Control Systems and Networked Automation Systems 10 th Lecture Signals and Communication in Automation Systems

2 Outline Signals analogue vs. digital cyclic vs. event-driven Analogue vs. Digital Transmission and Control Communication on different layers sensor/actuator-bus, field bus, plant bus Medium Access 264

3 Information in the Automation Pyramid Communication Networks in general are used to transmit information from one point to another Type of information is important for the design of communication system Networks in Automation transport different types of information depending on their placement in the Automation Pyramid Higher Levels: refined data (status reports) low frequency long response time (s, min, h) Lower Levels: raw data (measured sensor values) high frequency short response time (ns or ms) real-time 265

4 Data on Lowest Level: Physical Values Physical data to be measured for automation purposes Continuous in value and time Examples: temperature, velocity, Physical data to be influenced for automation purposes Continuous in value and time Examples: same as above 266

5 Sensors and Actuators Measurement in automation: Sensors (Sensoren, Messglieder) Convert physical values from different domains (mechanics, thermodynamics, chemistry, ) into electrical ones Measurement may be continuous or discrete Measurement of temperature using thermo-couple Measurement of position using limit-switch Influence on the process: Actuators (Aktuatoren, Stellglieder) Convert electrical values to other phyiscal values Actuation may be continuous or discrete Acceleration using motor with variable speed switching of a motor In most cases sensors already include Transducers (Messwertumformer) to produce electrical signals conforming to some standardized range (4..20mA, 0..10V, 0..24V, etc.) Today the output of a Transducer is often already in digital form 267

6 Example: Analogue speed measurement: tachometer A tachometer is a rotating permanent magnet that induces a voltage into a stator winding. This voltage is converted into an analogue voltage or current, conforming to some standard range. Alternatively, the output is directly converted to a digital signal; Transducer contains an A/D-Converter (A/D-Wandler). angular speed U ~ transducer analogue: ma digital: Source: Prof. Kirrmann 268

7 Vorlesungstitel 4-20 ma loop standard Sensor Transducer Instrument 1 Instrument 2 Instrument 3 voltage source V R1 R2 R3 measurand angular speed i = f(v) 0, ma Transducer acts as a current source delivering a current between 4 and 20 ma, proportional to the measurand (Messgrösse) 0 ma signals an error (wire disconnection) Number of loads connected in series is limited by the operating voltage Covered distance is limited due to induced noise Simple devices are powered directly by the residual current (4mA) allowing to transmit signal and power through a single pair of wires Source: Prof. Kirrmann 269

8 Vorlesungstitel Example of analog transducer High voltage Field house Transducer Current Transformer Protection 0..1A rms R = Load ma PLC Emergency panel Control Room Source: Prof. Kirrmann 270

9 Pros and Cons of Analogue Transmission Pros Very simple/cheap sensors (no intelligence needed) Simple installation (only electrical setup, no programming) Cons Interference-prone Only short distances (high energy loss rate on long distances) Practically no error detection and correction possible detection: limited to detection of complete breakdown correction: limited to filtering No intelligence at sensor level possible No diagnosis One-way communication No parameterization Changes require re-wiring Large amount of wiring Today data is processed in digital form anyway (first thing at an analogue input of a PLC is A/D-conversion) Aside on Analog vs. Digital Computation 271

10 Vorlesungstitel Control (Computation) using analogue values AT 3 Example endim 2000 Modular Analogue Computer Based on electron tube technology Calculation-Voltage: 100V Producer: Rechenelektronik Glashütte (Sachsen) Built: , (20 Pieces) Example Meda 42 Modular Analogue Computer Based on transistor technology Calculation-Voltage: 10V Producer: Aritma AT, Prague Built: from 1968, until late 70s 272

11 Vorlesungstitel Control (Computation) using analogue values AT 3 Programming Example Meda 42 Modular Analogue Computer Based on transistor technology Calculation-Voltage: 10V Producer: Aritma AT, Prague Built: from 1968, until late 70s 273

12 Handling of Analogue and Binary Data in PLCs y(t) y(t) y(k) u(k) u(t) time analogue variable (e.g mA) filtering & scaling sampling analogdigital converter input memory digitalanalog converter amplifier analogue variable e.g. -10V..10V binary variable (e.g V) filtering & scaling sampling processing output memory transistor or relay binary variable (e.g V) y(t) y(t) u time 274 time

13 Analogue to Digital Conversion Digital Signals are quantized in values sampled in time encoded and serialized quantized & sampled quantized sampled encoded & serialized t preamble start payload end delimiter 275

14 Cyclic (equidistant) versus Event-Driven sampling / communication hysteresis x% cyclic: sample/send value strictly every n milliseconds sample period n ms misses the (fast) peak always the same, why transmit? time event-driven: sample/send when value change by more than x% of range how much hysteresis? - coarse (bad accuracy) - fine (high frequency) misses values (limited update frequency) nevertheless transmit: - every m ms as I m alive sign - when data is internally updated - upon quality change (failure) 276

15 Pros and Cons of Digital Transmission Pros Less interference-prone Longer distances are possible Error detection and correction possible (depends on encoding) Additional information can be added to the bit stream diagnosis Two-way communication possible parameterization Easier change of an installation Sharing of resources is possible Networking Cons Protocols are needed for communication Less simple/cheap sensors (intelligence needed, A/D-converter, ) Less simple installation (additional know-how needed) 277

16 Digital Communication using direct connections Advantages of digital communication can be gained (and have been) without networking: A/D-conversion directly at sensor level Grouping of sensors/actuators possible: several (dumb) components connected to an intelligent access point point-to-point communication using serial or parallel interfaces parallel: + fast, - much more wiring, - possible crosstalk serial: - slower, + less wiring, + less crosstalk Example: RS232 Completely different and very successful approach: HART Protocol HART uses the well-known analogue approach (4-20 ma) Digital Information is added on the analogue connection Measurement of the process variable Configuration or re-configuration data Diagnostic information Values of additional measured variables (multi-variable devices) Device Status 278

17 HART: Concept HART ("Highway Addressable Remote Transducer") popular digital communication protocol for industrial process measurement applications uses low-level modulation superimposed on the standard 4-20 ma current loop widely used for such measurements average value of the HART signal is zero (FSK) without significant effect on analogue current signal analogue signal can still be used compatibility with existing systems digital advantage: device configuration, status checking, diagnostics 279

18 HART: Applications Communication to field devices with additional information (bidirectional) Closing of control-loops in the actuator-sensor-level Multi-drop communication with up to 15 devices (analog value is fixed to 4 ma and communication is only based on digital signal, polling) Final step to digital communication 280

19 Digital Communication using direct connections Remaining problem: Amount of wiring (HART in multi-drop has limited number of devices) Response-Time (HART: 2 updates per second, 4 in burst-mode) Idea: Sharing of the communication medium (wires) bus possible since digital signals are only transmitted at intervals between two samplings the communication medium can by used by others also digital transmission allows to add additional information (source, ) 281

20 Vorlesungstitel The original idea: save wiring field bus COM I/O switching cabinet dumb devices PLC PLC field bus Note: the number of end-points remains the same! energy must be supplied to smart devices 282

21 What is a field bus? Communication network, in an automation system, characterized by: transmission of numerous small data items (process variables) with bound delay (1ms..1s) harsh environment (temperature, vibrations, EM-disturbances, water, salt, ) robust and easy installation by skilled people high integrity (no undetected errors) high availability (redundant layout) clock synchronization (milliseconds down to a few microseconds) continuous supervision and diagnostics low attachment costs moderate data rates (50 kbit/s 5 Mbit/s) but large distance range (10m.. 4 km) non-real-time traffic for commissioning (e.g. download) and diagnostics Source: Prof. Kirrmann 283

22 Main Problem of Networking Medium Access How to make sure that on a shared communication line only one connected participant sends at a time? Side-conditions for this problem keep waiting times low use the available medium bandwidth provide deterministic response time (depends on application) Medium Access deterministic (controlled) non-deterministic (carrier sense multiple access) centralized de-centralized collision detection collision avoidance master/slave token bus CSMA/CD CSMA/CA token ring 284

23 Master/Slave General Idea: There is one node in the bus that handles the communication control: MTER The master assigns the right to write on the bus to the slaves according to some internal algorithm (e.g. fixed sequence) Advantage: dumb slave nodes address Bus Master devices (slaves) plant Example: Cyclic activation of slaves time [ms] 285

24 Token Problem of Master/Slave: Single point-of-failure (MTER) General Idea: Each node at the bus can handle the communication control The right is handed over using a token Two possibilities: token bus: physically a line (bus), however logically a ring token ring: physically as well as logically a ring Drawback: More intelligence needed in all nodes 286

25 Token Bus Token Bus A node receives the free-token Now he has the medium or a pre-defined maximum time After finishing its transmission the token is sent to the next (by address) node The node with the highest address sends it to the node with the lowest ( logical ring) 287

26 Token Ring Token ring A node receives the free-token If the node wants to submit data it converts it in a busy-token, appends the data and sends it Next station receives data (if it is the receiver, data is copied into internal memory) Data is sent on to the next station until it comes back to the sender (check) After finished sending, the token is sent to the next station 288

27 Drawbacks of Deterministic Approaches Access strategies have to be defined off-line Extension of the system requires careful choices in setting new timeslots priorities, Idea of non-deterministic access: Just connect nodes to the network Let the nodes check for themselves whether they can send Requires some intelligence 289

28 Main Problem of Networking Medium Access How to make sure that on a shared communication line only one connected participant sends at a time? Side-conditions for this problem keep waiting times low use the available medium bandwidth provide deterministic response time (depends on application) Medium Access deterministic (controlled) non-deterministic (carrier sense multiple access) centralized de-centralized collision detection collision avoidance master/slave token bus CSMA/CD CSMA/CA token ring 290

29 Drawbacks of Deterministic Approaches Deterministic Ideas: Master/Slave, Token-Bus, and Token-Ring Access strategies have to be defined off-line Extension of the system requires careful choices in setting new timeslots priorities, Use of medium not optimal Long waiting for medium even if others do not want to communicate Problem of Single-Point-Of-Failure in Master/Slave Similar problems in Token Approaches Broken ring in Token-Ring Lost token if active device fails Idea of non-deterministic access: Just connect nodes to the network Let the nodes check for themselves whether they can send Requires some intelligence 291

30 Carrier Sense Multiple Access (CSMA) Carrier Sense Multiple Access (CSMA) is a probabilistic Media Access Control (MAC) protocol in which a node verifies the absence of other traffic before transmitting on a shared physical medium, such as an electrical bus, or a band of electromagnetic spectrum. "Carrier Sense" describes the fact that a transmitter listens for carrier wave before trying to send. That is, it tries to detect the presence of an encoded signal from another station before attempting to transmit. If a carrier is sensed, the node waits for the transmission in progress to finish before initiating its own transmission. "Multiple Access" describes the fact that multiple nodes send and receive on the medium. Transmissions by one node are generally received by all other nodes using the medium. In pure CSMA, only the carrier sense is used to avoid collisions. If two nodes try to send a frame at nearly the same time, neither detects a carrier so both begin transmitting at the same time. The transmitters do not detect collisions, so transmit the entire frame. Receivers cannot distinguish between collisions and other sources of frame errors, so collision recovery relies on the ability of the communicating nodes to detect frame errors and invoke an error recovery procedure. 292

31 CSMA Extensions In Carrier Sense Multiple Access With Collision Avoidance (CSMA/CA), each node must inform other nodes of an intent to transmit. When the other nodes have been notified, the information is transmitted. This arrangement prevents collision because all nodes are aware of a transmission before it occurs. However, collisions are still possible, and are not detected so have the same consequences as in pure CSMA. In Carrier Sense Multiple Access With Collision Detection (CSMA/CD), sending nodes are able to detect when a collision occurs and stop transmitting immediately, backing off for a random amount of time before trying again. This results in much more efficient use of the media since the bandwidth of transmitting the entire frame is not wasted. In Carrier Sense Multiple Access with Bitwise Arbitration (CSMA/BA), all of the nodes on the bus are assigned an identification number or priority code. When a collision occurs, one of the nodes that are attempting to send at the same time will be given priority to transmit according to its identification number or priority code (as opposed to waiting a random amount of time and then retransmitting, as in CSMA/CD). 293

32 Summary of Chapter 10 This lecture gave an introduction to Signals and Communication in Automation Systems considering the following aspects: Types of Data in Automation Systems Analogue vs. Digital Data and D/A-Conversion Analogue vs. Digital Communication including HART Extension of Digital Communication to Networks Bus Systems (Linear Architecture in Networks) Methods for Medium Access in Networks 294

Grundlagen der Automatisierungstechnik. 10. Signale und Kommunikation in der Automatisierungstechnik

Grundlagen der Automatisierungstechnik. 10. Signale und Kommunikation in der Automatisierungstechnik Grundlagen der Automatisierungstechnik (Automatisierungstechnik 1) 10. Signale und Kommunikation in der Automatisierungstechnik Outline Signals analogue vs. digital cyclic vs. event-driven Analogue vs.

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

Real-Time (Paradigms) (47)

Real-Time (Paradigms) (47) Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Key points to consider for MAC Types/Modes of communication: Although the medium is shared,

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Level 1: Physical Level 2: Data link Level 3: Network Level 4: Transport

Level 1: Physical Level 2: Data link Level 3: Network Level 4: Transport Network protocols Aside from the issues of the physical network (signal types and voltage levels, connector pinouts, cabling, topology, etc.), there needs to be a standardized way in which communication

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights

More information

Device Management Protocols Protocoles de gestion des appareils Gerätezugangsprotokolle. The HART Protocol

Device Management Protocols Protocoles de gestion des appareils Gerätezugangsprotokolle. The HART Protocol Automation Industrielle Industrielle Automation 4. Device Management Protocols Protocoles de gestion des appareils Gerätezugangsprotokolle 4.1.1 The HART Protocol 2009 March HK Prof. Dr. H. Kirrmann ABB

More information

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded Communication Roland Institute of Computer Engineering Vienna University of Technology 10. November 2010 Overview 1. Definition of a protocol 2. Protocol properties 3. Basic Principles 4. system communication

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

What is SCADA? What is Telemetry? What is Data Acquisition? Differences between SCADA and DCS? Components of SCADA. Field Instrumentation

What is SCADA? What is Telemetry? What is Data Acquisition? Differences between SCADA and DCS? Components of SCADA. Field Instrumentation SCADA Primer This document discusses the basics of SCADA systems. It serves as introduction for those who are not familiar with it, and as a reviewer for those who are already knowledgeable about the SCADA

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Embedded Systems. 8. Communication

Embedded Systems. 8. Communication Embedded Systems 8. Communication Lothar Thiele 8-1 Contents of Course 1. Embedded Systems Introduction 2. Software Introduction 7. System Components 10. Models 3. Real-Time Models 4. Periodic/Aperiodic

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

CSE/EE 461 Wireless and Contention-Free Protocols

CSE/EE 461 Wireless and Contention-Free Protocols CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application

More information

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16

CMPE 150/L : Introduction to Computer Networks. Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 CMPE 150/L : Introduction to Computer Networks Chen Qian Computer Engineering UCSC Baskin Engineering Lecture 16 1 Final project demo Please do the demo next week to the TAs. So basically you may need

More information

EtherCAT or Ethernet for Motion Control

EtherCAT or Ethernet for Motion Control June-16 EtherCAT or Ethernet for Motion Control Choosing the Right Network Solution for your Application Intro Ethernet based bus solutions have become the dominant method of communications in the motion

More information

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media

More information

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College

CHAPTER 7 MAC LAYER PROTOCOLS. Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College CHAPTER 7 MAC LAYER PROTOCOLS Dr. Bhargavi Goswami Associate Professor & Head Department of Computer Science Garden City College MEDIUM ACCESS CONTROL - MAC PROTOCOLS When the two stations transmit data

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Today. Last Time. Motivation. CAN Bus. More about CAN. What is CAN?

Today. Last Time. Motivation. CAN Bus. More about CAN. What is CAN? Embedded networks Characteristics Requirements Simple embedded LANs Bit banged SPI I2C LIN Ethernet Last Time CAN Bus Intro Low-level stuff Frame types Arbitration Filtering Higher-level protocols Today

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control

Message, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control Links EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/ Announcements Homework

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

CSC 4900 Computer Networks: The Link Layer

CSC 4900 Computer Networks: The Link Layer CSC 4900 Computer Networks: The Link Layer Professor Henry Carter Fall 2017 Last Time We talked about intra-as routing protocols: Which routing algorithm is used in RIP? OSPF? What techniques allow OSPF

More information

CS 4453 Computer Networks Winter

CS 4453 Computer Networks Winter CS 4453 Computer Networks Chapter 2 OSI Network Model 2015 Winter OSI model defines 7 layers Figure 1: OSI model Computer Networks R. Wei 2 The seven layers are as follows: Application Presentation Session

More information

Data Link Layer: Multi Access Protocols

Data Link Layer: Multi Access Protocols Digital Communication in the Modern World Data Link Layer: Multi Access Protocols http://www.cs.huji.ac.il/~com1 com1@cs.huji.ac.il Some of the slides have been borrowed from: Computer Networking: A Top

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Integrating Information Systems: Technology, Strategy, and Organizational Factors MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications

More information

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg

Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Getting Connected (Chapter 2 Part 4) Networking CS 3470, Section 1 Sarah Diesburg Five Problems Encoding/decoding Framing Error Detection Error Correction Media Access Five Problems Encoding/decoding Framing

More information

Goals of Today s Lecture. Adaptors Communicating

Goals of Today s Lecture. Adaptors Communicating Goals of Today s Lecture EE 122: Link Layer Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 9 th class; 19 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 9 th class; 19 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Contention-based MAC: ALOHA Users transmit whenever they have data to send Collisions occur,

More information

Hardware Robot Operating System. D-module STUDY CASE

Hardware Robot Operating System. D-module STUDY CASE Hardware Robot Operating System D-module STUDY CASE Han s Robot D-module Han s Robot Han s Robot is a global supplier in direct drive technology, ranging from linear motors, torque motors, servo drives,

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Configuration Guideline for CANopen Networks

Configuration Guideline for CANopen Networks Configuration Guideline for CANopen Networks Martin Rostan, Beckhoff Unlike most other fieldbus systems, CANopen provides many degrees of freedom to configure the communication behaviour of the network.

More information

Chapter 5: Link layer

Chapter 5: Link layer Chapter 5: Link layer our goals: v understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple access link layer addressing local area networks:

More information

MULTIPLE ACCESS PROTOCOLS 2. 1

MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS PROTOCOLS AND WIFI 1 MULTIPLE ACCESS PROTOCOLS 2. 1 MULTIPLE ACCESS LINKS, PROTOCOLS Two types of links : point-to-point broadcast (shared wire or medium) POINT-TO-POINT PPP for dial-up

More information

HART. Actuator Control. Redefining Flow Control

HART. Actuator Control. Redefining Flow Control HART Actuator Control Contents Section Page Introduction 3 Actuator Control 4 HART Module 5 HART Network 5 Point-To-Point Network 6 Multi-Drop Network 6 Commands 7 Control Features 8-9 Device Description

More information

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste

Goal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a

More information

PROFIBUS. Sharani Sankaran

PROFIBUS. Sharani Sankaran PROFIBUS Sharani Sankaran fq8610@wayne.edu Outline Introduction TransmissionTechnologies Communication Protocol Application Profiles Integration Technologies Technical Support INTRODUCTION: Field buses

More information

Lecture 8 Link Layer: functionality, error detection, media access algorithm

Lecture 8 Link Layer: functionality, error detection, media access algorithm Lecture 8 Link Layer: functionality, error detection, media access algorithm From Kurose & Ross Book slightly modified by Romaric Duvignau duvignau@chalmers.se Thanks and enjoy! JFK/KWR All material copyright

More information

Lecture 19. Principles behind data link layer services Framing Multiple access protocols

Lecture 19. Principles behind data link layer services Framing Multiple access protocols Link Layer Lecture 19 Principles behind data link layer services Framing Multiple access protocols ALOHA *The slides are adapted from ppt slides (in substantially unaltered form) available from Computer

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation

Jaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Introduction to PROFIBUS for Process Automation

Introduction to PROFIBUS for Process Automation Introduction to PROFIBUS for Process Automation Andy Verwer Verwer Training & Consultancy Ltd Gold distributor PROFIBUS Characteristics PROFIBUS is a bi-directional digital communication network for field

More information

DDL DEVELOPMENT FOR APPLICATIONS BASED ON HART PROTOCOL. Alexandre Baratella Lugli and Ana Carolina de Oliveira Patrício

DDL DEVELOPMENT FOR APPLICATIONS BASED ON HART PROTOCOL. Alexandre Baratella Lugli and Ana Carolina de Oliveira Patrício International Journal of Innovative Computing, Information and Control ICIC International c 2018 ISSN 1349-4198 Volume 14, Number 2, April 2018 pp. 549 560 DDL DEVELOPMENT FOR APPLICATIONS BASED ON HART

More information

The MAC Address Format

The MAC Address Format Directing data is what addressing is all about. At the Data Link layer, this is done by pointing PDUs to the destination MAC address for delivery of a frame within a LAN. The MAC address is the number

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

Random Assignment Protocols

Random Assignment Protocols Random Assignment Protocols Random assignment strategies attempt to reduce problem occur in fixed assignment strategy by eliminating pre allocation of bandwidth to communicating nodes. Random assignment

More information

Wireless Communications

Wireless Communications 4. Medium Access Control Sublayer DIN/CTC/UEM 2018 Why do we need MAC for? Medium Access Control (MAC) Shared medium instead of point-to-point link MAC sublayer controls access to shared medium Examples:

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application Ling Wang ling.wang2@wayne.edu Outline Introduction Parameterization Differentiation Evaluation

More information

Media Access Control. Networked Systems (H) Lecture 5

Media Access Control. Networked Systems (H) Lecture 5 Media Access Control Networked Systems (H) Lecture 5 Lecture Outline Controlling access to the channel Link contention Media access control protocols Contention-based protocols CSMA/CD Token ring Slotted

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users

MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users MAC Sublayer(1) Principal service of the Medium Access Control Sublayer: Allocating a single broadcast channel (mostly a LAN) among competing users Static Channel Allocation: Frequency Division Multiplexing

More information

Additional Slides (informative)

Additional Slides (informative) Automation Systems Discrete Event Control Systems and Networked Automation Systems Additional Slides (informative) Application Automotive Networks (LIN, CAN, FlexRay, MOST) Vorlesungstitel Vehicle Bus

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30 EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access

More information

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan

Physical Layer. Medium Access Links and Protocols. Point-to-Point protocols. Modems: Signaling. Modems Signaling. Srinidhi Varadarajan P Physical Layer Srinidhi Varadarajan Medium Access Links and Protocols Three types of links : point-to-point (single wire, e.g. PPP, SLIP) broadcast (shared wire or medium; e.g, Ethernet, Wavelan, etc.)

More information

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012

Chapter 5 Link Layer. Computer Networking: A Top Down Approach. 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Chapter 5 Link Layer A note on the use of these ppt slides: We re making these slides freely available to all (faculty, students, readers). They re in PowerPoint form so you see the animations; and can

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

PAST PRESENT & FUTURE TRENDS IN INDUSTRIAL AUTOMATION

PAST PRESENT & FUTURE TRENDS IN INDUSTRIAL AUTOMATION PAST PRESENT & FUTURE TRENDS IN INDUSTRIAL AUTOMATION Dr. J. PRAKASH ASSISTANT PROFESSOR IN INSTRUMENTATION ENGINEERING Madras Institute of Technology ANNA UNIVERSITY DATA ACQUISITION SYSTEM (DAS) SUPERVISORY

More information

Physical and Data Link layers

Physical and Data Link layers Physical and Data Link layers Youki Kadobayashi Graduate School of Science Nara Institute of Science and Technology Physical Layer All rights reserved. 2 Types of transmission medium! Cables Optical fiber

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

Network Media and Layer 1 Functionality

Network Media and Layer 1 Functionality Network Media and Layer 1 Functionality BSAD 146 Dave Novak Dean, Chapter 3, pp 93-124 Objectives Introduction to transmission media Basic cabling Coaxial Twisted pair Optical fiber Basic wireless (NIC)

More information

Real-Time Communications. LS 12, TU Dortmund

Real-Time Communications. LS 12, TU Dortmund Real-Time Communications Prof. Dr. Jian-Jia Chen LS 12, TU Dortmund 20, Jan., 2016 Prof. Dr. Jian-Jia Chen (LS 12, TU Dortmund) 1 / 29 Random Access no access control; requires low medium utilization Prof.

More information

Strengthening Unlicensed Band Wireless Backhaul

Strengthening Unlicensed Band Wireless Backhaul be in charge Strengthening Unlicensed Band Wireless Backhaul Use TDD/TDMA Based Channel Access Mechanism WHITE PAPER Strengthening Unlicensed Band Wireless Backhaul: Use TDD/TDMA Based Channel Access Mechanism

More information

DESINA installation technology

DESINA installation technology DEcentralized Standardized INstAllation technology DESINA describes an extensive concept for the standardization and decentralization of the fluid power and electrical installation of machines and applications.

More information

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CARRIER SENSE MULTIPLE ACCESS (CSMA): Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

More information

Multiple Access Links and Protocols

Multiple Access Links and Protocols Multiple Access Links and Protocols Two types of links : point-to-point PPP for dial-up access point-to-point link between Ethernet switch and host broadcast (shared wire or medium) old-fashioned Ethernet

More information

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services

Link layer, LANs: outline. Chapter 5-1 Link Layer. Link layer: introduction. Link layer services Chapter 5 Link Layer Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Link layer, LANs: outline 5.1 introduction, services 5.2 error detection, correction

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 83 Chapter 6 Ethernet Technologies and Ethernet Switching Ethernet and its associated IEEE 802.3 protocols are part of the world's most important networking standards. Because of the great success of the

More information

High Precision Drive Synchronisation with CANopen

High Precision Drive Synchronisation with CANopen High Precision Drive Synchronisation with CANopen Martin Rostan, Beckhoff Josef Langfermann, Lenze Corp. For many users and suppliers CAN is the first choice for drive communication Ð due to its reliability,

More information

4-20 ma Transmitter vs. Machine Saver s VTBNet

4-20 ma Transmitter vs. Machine Saver s VTBNet Machine Saver The Solution Before the Problem 4-20 ma Transmitter vs. Machine Saver s VTBNet www.machinesaver.com The 4-20 ma Transmitter vs. Machine Saver s VTBNet OUT WITH THE OLD IN WITH THE NEW Protecting

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Basic Communication Concepts

Basic Communication Concepts Chapter 3 Basic Communication Concepts 3.1 Introduction This chapter introduces some of the basic concepts of signals and information communication. The following section, 3.2, looks at some of the ways

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

Fieldbus technology An Overview

Fieldbus technology An Overview An Overview 00 Introduction to fieldbus 00.1 Industry-standard solutions for automation from HARTING Present day and future automation solutions are evolving from being isolated applications solutions

More information

A CAN-Based Architecture for Highly Reliable Communication Systems

A CAN-Based Architecture for Highly Reliable Communication Systems A CAN-Based Architecture for Highly Reliable Communication Systems H. Hilmer Prof. Dr.-Ing. H.-D. Kochs Gerhard-Mercator-Universität Duisburg, Germany E. Dittmar ABB Network Control and Protection, Ladenburg,

More information

CSC 401 Data and Computer Communications Networks

CSC 401 Data and Computer Communications Networks CSC 401 Data and Computer Communications Networks Link Layer: Intro, Errors, Multiple Access Sec 6.1, 6.2, 6.3 Prof. Lina Battestilli Fall 2017 Chapter 6: Link layer Goals: understand principles behind

More information

Modbus. Serial communication and control of Rotork actuators. Established Leaders in Valve Actuation. Electric Actuators and Control Systems

Modbus. Serial communication and control of Rotork actuators. Established Leaders in Valve Actuation. Electric Actuators and Control Systems Electric Actuators and Control Systems Established Leaders in Valve Actuation Modbus Serial communication and control of Rotork actuators Publication S117E Issue 04/09 Rotork actuators have been in use

More information

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class

Data Link Layer. Goals of This Lecture. Engineering Questions. Outline of the Class Data Link Layer Kuang Chiu Huang TCM NCKU Goals of This Lecture Through the lecture and in-class discussion, students are enabled to describe role and functions of the link layer, and compare different

More information

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58

CSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 CSE 461: Multiple Access Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 Next Topic Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion

More information

1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media?

1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? CCNA 1 Chapter 4 v5.0 Exam Answers 2015 (100%) 1. Which layer of the OSI model is responsible for specifying the encapsulation method used for specific types of media? application transport data link physical

More information