Evaluation of Ethernet based Control Network used in the Distributed Control System
|
|
- Austen Melton
- 5 years ago
- Views:
Transcription
1 Proceedings on the 15th CISL Winter Workshop Kushu, Japan February 2002 Evaluation of Ethernet based Control Network used in the Distributed Control System Jae Young Choi Control Information Systems Lab., School of Electrical Engr. and Computer Science, Seoul National University, Seoul, , Korea Abstract: Distributed control system(dcs) has been used widely in industrial environments. This paper proposes new network system named ERCNet(Ethernet based Real-time Control Network), which satisfies all strict requirements of industrial environment like nuclear power plant. The proposed network, ERCNet uses ring topology, Token passing mechanism and physical media of Fast Ethernet. Proposed network has newly invented device, TCS(Topology Conversion Switch) to adopt ring topology using Fast Ethernet physical media and to enhance the network performance. In this paper, numerical analysis and performance evaluations about this network will be done. Performance enhancement effects of TCS are evaluated by experiments. Keywords: Distributed control system(dcs); Control network; Ring topology; Topology Conversion Switch(TCS); Medium Access Control(MAC) 1 Introduction As digital automation technologies became available in the 1960s, they were used to improve and enlarge the industrial automation systems. The concepts of distributed computer control systems were introduced in the field of industrial automation, and the use of the communication networks has had an almost explosive growth.[1, 2] As the industrial automation systems become large and the number of automation devices increase, it becomes very important for industrial automation to provide high performance network which make it possible to communicate many automation devices and stations in a rapid way. Although there are many network protocols to apply to the industrial network of DCS, they have several their own defects not enough to be applied to high performance DCS like current nuclear power plant. Hence, this paper can be the reference for high performance DCS network architecture. In this paper, a new communication network is proposed and evaluated to fit to the current trend of high performance DCS(Distributed control system). This is named as Ethernet based Real-time Control Network(ERCNet). ERCNet is developed to be able to be implemented as a control network of high performance DCS especially in nuclear power plant. ERCNet can be instrumented in DCS network of nuclear power plant digital I&C system. Today, distributed control systems are being developed using commercial-off-the-shelf (COTS) network products to reduce product development cycle and cost and achieve system interoperability.[4, 5] In the process control industry, Ethernet is becoming a de facto choice for open control network strategies. In accordance with this trend and for the sake of maintainability, ERCNet uses fiber optic physical media of 100Mbps Fast Ethernet. And ERCNet has ring topology with token passing mechanism. To overcome the large broadcasting delay that is one of the major defect of ring topology network, special hardware device that is named TCS(Topology Conversion Switch) is developed and used. And ERC- Net adopts replicated memory DCS system somewhat different from existing replicated memory product like SCRAMNet. The main purpose of this paper is focused on the design and evaluation of DCS network that can satisfy
2 ! \\[[ ZZgffee! jjiihhuttss!! =< ;!! NNMMLLYX > > KJII! $ $ ##"" /. - the tight requirements of industrial environment, such as nuclear power plant. This paper proposes and evaluates the new design and method of high performance DCS network. This paper is organized as follows.in Section 2, the concept and architecture of ERCNet will be described. Section 3 shows the performance enhancement of ERC- Net by implementing TCS. In Section 4, experimental result about the reduction of delay time as the number of nodes is suggested. Finally, conclusions and summarization are made in Section 5. 2 Architecture of ERCNet Hub sensor Motor Valve! ]^_`abcd g! klmnopqr u!! :; <=!! OPQRSTUVW XY ABCDEFGH JK Information Network Gateway Control Network Field Network! %&'()*+,-./ ERCNet is high reliability network that can be used as protection or control instrumentations. ERCNet should be faithful to communicate signal data to control instruments fast and correctly. For this reason, very high speed data exchange and storage should be achieved. ERCNet must consider reliable and swift data exchange mechanism. Also, ERCNet must take into account maintenance. Mostly, DCS is composed of many components. The main components of the DCS are controllers, input/output modules, communication network, sensors, actuators, operator interface stations (OIS), and engineer interface stations (EIS). Among these components, communication network is one of the most important components because all of components are connected by communication network.[6] Generally, communication network in DCS is designed hierarchically. Most DCS communication network is designed as 3 levels, that are information network, control network, and field network like Figure 1. Information network interfaces with users and gets data from control network. Control network transfers data to information network and gathers data from field network. Field network collects data from input/output modules and transfers it to control network. ERCNet corresponds to control network. ERCNet adopts ring topology for the ease of maintainability. Also, it uses Fast Ethernet media, which is used widely and its performance is verified for a long time, to enhance the reliability. It uses fiber-optic cables to reduce the error rate of lines. There are more features in ERCNet. Many features of ERCNet is covered below. 2.1 Replicated Memory method DCS Many DCS system uses distributed shared memory (DSM) scheme for its simplicity and flexibility in software programming. There are two currently existing representative DSM models, that is shared mem- Figure 1: General Architecture of DCS ory and replicated memory.[7] First, typical writeinvalidate protocol model works as follows: Each node has several copies of shared pages, and when a node comes to a pagefault, it sends a request for that page to the other nodes, who send back the page contents through the network. If a node already has a copy, or if it has received a copy form another node, it can access the copied page just the same way. As it accesses pages of normal machine memory(which we will call local memory). When a node tries to write to a page of shared memory, on the other hand, it sends a message to the other nodes in order to invalidate copies of the same page. Second, characteristics of replicated shared memory(called broadcast memory with FIFO)[8, 9] are considered to be almost opposite to those of shared memory. Replicated memory works as follows: Each node has its own copy of the entire contents of shared memory stored in a so-called global memory. A read access to shared memory is performed by reading the contents of its own global memory. When a write access to shared memory is performed, the written data is broadcast to all other nodes on the network to update their own copies. The written data is first stored in a FIFO buffer and sent to the network late, so that the node can resume its work without waiting for acquisition of the network. ERCNet uses replicated memory method network. In shared memory method, there is delay overhead at each memory access of every node and this is a bottleneck of high speed network. To reduce this bottleneck, cache can be used. But in case of cache miss, there comes serious problems. ERCNet uses new replicated memory method DCS and specific behavior is described as follows. All data is updated using broadcasting method with token pass mechanism. Basically, because every node
3 should contain the information of all node, broadcasting is efficient as a data transfer method. When each node receives token, this station(ts) broadcasts its own data. Token is transferred to the next station(ns) to make the next station(ns) broadcast its own data after all of data of TS is transmitted. All of data is updated like this scheme. These procedures can be seen like Figure 2. _`/Z4 _`/Z4 _`/Z4 ; / _`/Z4 ; _`/Z4 : _`/Z4 : _`/Z/ _`/Z D v wyx z { ~ w z Q 2.2 Token D D D E v wyx z {} ~ w z E E E D E v w x z ~ w z {} v w x z {} ~ w z ƒ ˆ ƒ ˆŠŒ ŽŒ Œy y Œ ŒŠ ƒ Figure 2: Data Transmission Process ERCNet uses general Fast Ethernet frames to enhance maintainability. To express token frame, ERCNet uses Type field of Fast Ethernet frame format. The frame format of ERCNet is shown in Figure 3. The first bit of Type field of Ethernet frame is named identifier. When identifier bit is set, it means this frame is token frame.and when identifier is cleared, it means this frame is general data frame. This Type Field is remained for network layer protocols by IEEE standards. /F_ZZc : /Y Z ` \ _ / _ /F _ Z Z c /Y Z /Z /5 / _ c X ] / X X / _ /Z /Z / ] X c 7 a8i _ ỹ šœ œ yž X c / c X ^ / a8 M c X ^ Y ] c X ^ / Z _ X Z ` _ / ` c / X X \ / I _ ] Z ^ Z c D c D c b _ /E : /E /E /E ; /E /E Figure 3: Token frame of ERCNet Since ERCNet doesn t have need to use network layer, this Type Field is not used in ERCNet. ER- CNet contains application layer just on the data link layer. Therefore ERCNet can make use of this field : Z^ freely. ERCNet understands token frame if identifier is set or data frame if identifier is not set. 2.3 TCS In the ring topology network, delays are generated at each node because each node must process every data frame whether frame is destined to itself or not. It is fundamental defects of ring topology network. TCS functions as reducing this delays. Because TCS connects reception line and transmission line in all reception nodes, received data are transmitted immediately and transferred to CPU simultaneously. So TCS can reduce the delay at each node. This scheme reduces CPU processing time at each node. When node receives token and wants to transmit its data, TCS controller disconnects the connection between transmission line and reception line and transmits its data. 100Base-FX Fast Ethernet network should use star topology. However, ERCNet adopts ring topology though physical media of 100Base-FX is used. TCS(Topology Conversion Switch) is the device that makes ERCNet have ring topology with physical media of 100Base-FX. TCS changes topology of network in a moment when station wants to transmit its data. At the moment station want to transmit data, TCS disconnects reception line from transmission line. In this situation, all network can be seen as bus topology, and transmission node broadcasts its data. Figure 4 is block diagram of TCS. Also, TCS connects reception line and transmission line in all the other reception nodes. Using these devices, ERCNet can use Ethernet physical media without hub or switch. ª ««ª OZ : 2 ²y ¹ ½ ² ± Ó ³y ± ± Ø LK L ± ² ³µ ¹ º» ³ ¼ ½ ¹ Ì Íy«yÎÃ Ï Ð ÑyÒ À ÁàÄÆÅ Ç È É Ê Ê Ê Ë Ì Í «Îà ÏÖÐ ÑyÒ À ÁàÄÔÅ Ç È É Ê Ê Õ Ë ¾ ¾ Ÿ Ÿ y ª ««ª c X _ ^ 9 2 Ì Í «¹ ½ ± ± Ø ¾ Z ²y ²y± Î Ï Ð ÑyÒ Ó ³ L LK ± ² ³ÃÓ ¹ ºy» ³ ½ ¹ Ì Í «yîã Ï Ð ÑyÒ OZ/ ^ ` c X _ ^ Z / ^ ` Figure 4: Block Diagram of TCS TCS transmits received frames just after switching analog signal not converting digital signal. It is much faster than converting digital signal. This data transition process can be appeared like Figure 5. In Figure 5, CPM means communication processing module in CPU(Central Processing Unit). Analog switch used to retransmit received data is ADG711 by analog device company. This device is often used in the Ethernet ¾ Ÿ Ÿ
4 switch or hub. This device can be switching at 200MHz bandwidth. Owing to this device, TCS can use ethernet physical media with ring topology. ð ñyò MJ/////////// ñ ó ô õ ö ó ø ö c_/cz c ZZX] ð ñyò MJ/////////// ñ ó ô õ ö ó ø ö c_/cz c The developed hardware in the experiment was a VME 6U board with MPC8260 CPU(Central Processing Unit). Operating system was not installed and all program codes were written in C language. It uses GNU compiler(gcc) and 66Mhz clock. The MPC8260 is integrated communication microprocessor designed for the telecommunications and networking devices. Ù Ú Ú Û Ü Ý Þ ß à á âyã ä Ý å æ Ü ç è Þ é å Ü ê ë Ü ì Ý è å í í Þ ë D:: Ù Ú Ú ÛŒÜ Ý Þ ß à á â ã ä Ý å æ Ü ç è Þ é å Ü î Þ æ Þ å ï Þ ë `_c`]/ Z_X] D _ X]` Ù Ú ÚyÛ Ü Ý Þ ßŒà á âyã ä Ý å æ Ü ç è Þ éyå Ü ê ë Ü ì Ý è å í í Þ ë D:: Ù Ú Ú Û Ü Ý Þ ß à á â ã ä Ý å æ Ü ç è Þ é å Ü î Þ æ Þ å ï Þ ë `_c`]/ Z_X] 3.3 Analysis This section describes the analysis of ERCNet. Numerical modeling of ERCNet is proposed and performance difference in case of using TCS or not is also suggested. Parameters used in this model are like this : c X _ ^ Z /J` O Z /J` Amount of packets assigned to node i : Q i (bytes) Figure 5: Signal Transition Diagram of TCS TCS controller is needed to make TCS turn analog switch on and off as shown in Figure 4. This TCS controller is implemented in the communication processing module of MPC8260 CPU. TCS controller generates 1 or 0 using CPU ports. 1 is generated when data is received, 0 is generated when data is transmitted. This signal connects and disconnects transmission line and reception line. 3 Performance Evaluation In this chapter, performance enhancement features of TCS in ERCNet is evaluated by experiments. Also, numerical analysis about the architecture of ERCNet is done. 3.1 Evaluation Properties ERCNet contrives to enhance the performance using TCS. In a general ring network, one node of network receives data and copies it to the local memory and then retransmits it to the next node. But in ERCNet, receiving and retransmitting data occurs simultaneously using TCS. In this chapter, reduction of delay by this architecture is experimented. The variance of delay as nodes increase is shown. Test software is compiled by GNU compiler(gcc) and monitored by serial communication. Many functions like token mechanism or data transmission is developed. 3.2 Experiment Environment All experiments are performed on a testbed network consisting of three MPC8260 boards connected together with fiber optic cable. All boards communicate each other using fiber optic cables. Transmission speed : 100Mbits/sec (Fast Ethernet) One-bit time : T b The number of nodes : N Authorization rotating time : T rot Propagation delay : P i (5ns/m in case of 100Base- FX) Header size (OH) : 22 bytes Length of CRC (CRC) : 4 bytes Data frame payload length : F d ( 46 bytes F d 1.5 Kbytes) Optical-to-electrical conversion delay : D oe Electrical-to-optical conversion delay : D eo TCS processing delay : D tcs Cable length between node i and i+1 : L i (L max = 2000 m) Authorization processing delay : D A Interframe gap : D g The number of packets that the node i sends : m i The number of frames assigned to i-th node m i is m i = Qi The payload length of the last frame of i-th node r i is Fd r i = Q i Fd(m i 1) The transmission time of the last frame T f is
5 Tf = (r i +OH + CRC) Tb The transmission time of the usual frame T n is Tn = (Fd +OH + CRC) Tb The authorization passing time of i-th node A i is Ai = (Tn + Dg)(m i 1) + Tf +(Deo + Pi + Doe) + DA + Dtcs where P i = 5L i (5 us/km) in case that the optical fiber is 100Base-FX[10] The authorization rotating time in the whole network T rot is Trot = n {(Tn + Dg)(m i 1) + Tf +(Deo + Pi + Doe) i=1 + DA + Dtcs} The authorization passing time of i-th node A i means processing time to acknowledge the fact that token is received and to transmit its own data. And authorization rotating time means time that token passes through the whole network. In experiments, D tcs term is removed and D A term is increased in case of not using TCS. If TCS is not used, CPU itself has to copy data from receive buffer to transmit buffer. This increases D A value. If TCS is used, D A value is decreased and D tcs term exists. But D tcs is so small because D tcs is just composed of analog signal switching delay. 4 Experiment Results This experiment built test network with 2, 3, and 8 nodes and measured frame rotating time in each case. Frame rotation time is defined as the time from sending data frame to the other nodes to receiving its own data frame. In this experiment, 1Kbytes data frame is transmitted and frame rotation time is measured using two 32bit timers provided by MPC8260 CPU. In case that TCS is used, all frames are switched and transmitted soon after received. In case of no TCS, DMA(Direct Memory Access) controller reads receive buffer and copies it to the transmit buffer using DMA. Figure 6 and table 1 show the experimental result. Two frame rotating times, in case of using TCS in ER- CNet and in case of not using TCS and data is copied using DMA are measured as node increases. X-axis means number of node and Y-axis time with microsecond scale. All data was gathered as the average of enough iteration. This result shows that frame rotation time of ERCNet with TCS increases slightly as Table 1: Frame Rotation Time(us) Number of Node TCS Without TCS Figure 6: Experimental Result-Authorization Rotation Time node increases in comparison with the case of not using TCS in ERCNet. In ERCNet, frames are retransmitted just after switching received analog signals. Frame rotation time of ERCNet with TCS can be smaller than data rotation time of FDDI. If TCS is not used in ERCNet, ERCNet shows result worse than the case of using TCS. It is because data retransmission is processed by software. CPU copies data from receive buffer to transmit buffer. It takes much more time than frames are retransmitted by analog switching. Although this experiment shows good result, TCS can make signal distortions because TCS switches analog signal directly. So it is probable that signals should be corrected and amplified appropriately in case that node increases. 5 Conclusion In industrial environment, the amount of data to be processed is increasing continuously and users want more convenience. Considering these situation, existing network protocols have some difficulties in operating current distributing control system. It is necessary that higher performance network should be developed. As a high performance network for these requirements, ER-
6 CNet is proposed in this paper. ERCNet is developed gathering the advantages of existing high speed networks, and it has enough performance to satisfy strict requirements of industrial environment. ERCNet is high performance network with high maintainability and speed as much as 100Mbps. Maintenance and repair is easy because it uses widely-used Fast Ethernet physical media. Wiring is simple because it uses ring topology. In general, ethernet network is implemented as star topology. But TCS device is developed to be capable of ring topology based upon ethernet physical media. Also, TCS have an effect on reducing time delay at each node, that is one of the most significant defects of ring topology network. We make network behave deterministically using token passing mechanism. Token passing mechanism is implemented by means of making use of unused field of Ethernet frame format. Performance enhancement effect of TCS in ERCNet is measured by experiment. This experiment shows that frame rotation time is slightly increased as node increases in comparison with not using TCS. It is because the time CPU copies data from receive buffer to transmit buffer is reduced. TCS retransmits frames just after switching analog signal that comes from 100Base-FX receiver. At this moment, distortion of signal may happen. Effect of distortion as number of node is not yet evaluated. Experimental evaluation about the signal distortion by TCS is needed. ERCNet can be used as the network system demanded by distributed control system. It is designed to satisfy strict requirements that most of distributed control system needs. Especially it is developed to meet the strict requirements like nuclear power plant. ER- CNet is planning to be used as DCS network in the nuclear power plant. Also, it can be adapted to almost industrial environment. evaluation, IEEE International Performance, Computing and Communications Conference, pp , Feb [5] A. Koyama, L. Barolli, and Z. Cheng, Performance evaluation of an adaptive ring access protocol for super high-speed networks, Preceedings of 15th International Conference on Information Networking, pp , [6] J. Cao, R. Steele, L.J. Yao, and W. Jia, Design and simulation of a reliable token-ring protocol for realtime communications, Proceedings of IEEE International Computer Performance and Dependability Symposium, pp , [7] M. Oguchi, H. Aida, and T. Saito, A proposal for a DSM architecture suitable for a widely distributed environment and its evaluation, Proceedings of the Fourth IEEE International Symposium on High Performance Distributed Computing, pp , [8] T. Saito, H. Aida, Oguchi M., and M. Kuroiwa, Implementation and Evaluation of a Shared Memory Using Broadcast Memory with FIFO, Transactions of the Institute of Electronics, Information and Communication Engineers, vol. J75- D-I, no. 12, pp , December [9] Oguchi M., H. Aida, and T. Saito, A Study of Synchronization Mechanisms for Ring-Connected type Replicated Shared Memory, IFIP Conference on South East Asia Communications, pp , October [10] B. Albert and A.P. Jayasumana, Performance analysis of FDDI LANs using numerical methods, IEE Proceedings-Computers and Digital Techniques, vol. 144, no. 3, pp , May References [1] Hong ju Moon, Performance analysis and design of a communication network for industrial automation : a case study of the Mini-Map network, Ph. D Thesis, Seoul National University, [2] John R. Freer, Computer Communications and Networks, Plenum Press, [3] John W. Bernard, CIM in the Process Industries, Instrument Society of America, [4] J. Huang, S. Song, L. Li, P. Kappler, R. Freimark, J. Gustin, and T. Kozlik, An open solution to fault-tolerant Ethernet: design, prototyping, and
Pointers. CS2023 Winter 2004
Pointers CS2023 Winter 2004 Outcomes: Introduction to Pointers C for Java Programmers, Chapter 8, sections 8.1-8.8 Other textbooks on C on reserve After the conclusion of this section you should be able
More informationPointers & Arrays. CS2023 Winter 2004
Pointers & Arrays CS2023 Winter 2004 Outcomes: Pointers & Arrays C for Java Programmers, Chapter 8, section 8.12, and Chapter 10, section 10.2 Other textbooks on C on reserve After the conclusion of this
More informationThis file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0.
Range: This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version.. isclaimer The shapes of the reference glyphs used in these code charts
More informationLecture 5 C Programming Language
Lecture 5 C Programming Language Summary of Lecture 5 Pointers Pointers and Arrays Function arguments Dynamic memory allocation Pointers to functions 2D arrays Addresses and Pointers Every object in the
More informationMore on LANS. LAN Wiring, Interface
More on LANS Chapters 10-11 LAN Wiring, Interface Mostly covered this material already NIC = Network Interface Card Separate processor, buffers incoming/outgoing data CPU might not be able to keep up network
More informationAPPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC
APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date
More informationDESIGN OF AN ETHERNET BUS INTERFACE CONTROLLER IN A NUCLEAR POWER PLANT SIMULATOR
Proceedings of the 18th International Conference on Nuclear Engineering Proceedings of the 18th International Conference on Nuclear Engineering ICONE18 ICONE18 May 17-21, 2010, Xi'an, China May 17-21,
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationGuide to Networking Essentials Fifth Edition. Chapter 2 Network Design Essentials
Guide to Networking Essentials Fifth Edition Chapter 2 Network Design Essentials Objectives Explain the basics of a network layout Describe the standard networking topologies Explain the variations on
More informationModules. CS2023 Winter 2004
Modules CS2023 Winter 2004 Outcomes: Modules C for Java Programmers, Chapter 7, sections 7.4.1-7.4.6 Code Complete, Chapter 6 After the conclusion of this section you should be able to Understand why modules
More informationPersonal Conference Manager (PCM)
Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her
More information) $ G}] }O H~U. G yhpgxl. Cong
» Þ åî ïî á ë ïý þý ÿ þ ë ú ú F \ Œ Œ Ÿ Ÿ F D D D\ \ F F D F F F D D F D D D F D D D D FD D D D F D D FD F F F F F F F D D F D F F F D D D D F Ÿ Ÿ F D D Œ Ÿ D Ÿ Ÿ FŸ D c ³ ² í ë óô ò ð ¹ í ê ë Œ â ä ã
More informationRapid Prototyping of flexible Embedded Systems on multi-dsp Architectures
Rapid Prototyping of flexible Embedded Systems on multi-dsp Architectures Bernhard Rinner, Martin Schmid and Reinhold Weiss Institut für Technische Informatik Technische Universität Graz Inffeldgasse 16/1,
More informationNetwork protocols and. network systems INTRODUCTION CHAPTER
CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationERNST. Environment for Redaction of News Sub-Titles
ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or
More informationPart3. Local Area Networks (LAN)
Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed
More informationCartons (PCCs) Management
Final Report Project code: 2015 EE04 Post-Consumer Tetra Pak Cartons (PCCs) Management Prepared for Tetra Pak India Pvt. Ltd. Post Consumer Tetra Pak Cartons (PCCs) Management! " # $ " $ % & ' ( ) * +,
More informationChapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)
Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial
More informationZarządzanie sieciami telekomunikacyjnymi
Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. Four data rates are
More informationTo provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts.
200 West Baltimore Street Baltimore, MD 21201 410-767-0100 410-333-6442 TTY/TDD msde.maryland.gov TO: FROM: Members of the Maryland State Board of Education Jack R. Smith, Ph.D. DATE: December 8, 2015
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationUsing Time Division Multiplexing to support Real-time Networking on Ethernet
Using Time Division Multiplexing to support Real-time Networking on Ethernet Hariprasad Sampathkumar 25 th January 2005 Master s Thesis Defense Committee Dr. Douglas Niehaus, Chair Dr. Jeremiah James,
More informationLAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science
1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we
More informationLocal Area Network Overview
Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and
More informationIEEE 802 LANs SECTION C
IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison
More informationIntroduction to LAN Protocols
CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus
More informationIntegrating Information Systems: Technology, Strategy, and Organizational Factors
MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications
More informationInterface The exit interface a packet will take when destined for a specific network.
The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network
More informationInternetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on
CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network
More informationMedia Access Control (MAC) Sub-layer and Ethernet
Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF MAC Sub-layer The MAC sub-layer is a sub-layer
More informationGrowth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.
Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,
More informationMcGill University - Faculty of Engineering Department of Electrical and Computer Engineering
McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More information2. LAN Topologies Gilbert Ndjatou Page 1
2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers
More information1. Data Link Layer Protocols
1. Data Link Layer Protocols Purpose of the Data Link Layer The Data Link Layer Purpose of the Data Link Layer Data Link Sublayers Network LLC Sublayer Data Link Physical MAC Sublayer 802.3 Ethernet 802.11
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #2 Due Thursday, Nov 10 th By midnight Homework #5 Due Thursday, Nov 17 th Later this semester: Homework
More informationSCRAMNet GT. A New Technology for Shared-Memor y Communication in High-Throughput Networks. Technology White Paper
Technology White Paper SCRAMNet GT A New Technology for Shared-Memor y Communication in High-Throughput Networks Introduction A number of today s most advanced networking applications require the fast
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationContention Protocols and Networks
4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks
More informationIntroduction to Real-Time Systems ECE 397-1
Introduction to Real-Time Systems ECE 397-1 Northwestern University Department of Computer Science Department of Electrical and Computer Engineering Teachers: Robert Dick Peter Dinda Office: L477 Tech
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationLAN Systems. Bus topology LANs
Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong
More informationMedium Access Control
TC 3TCA NET Département Télécommunications Services & Usages Intervenant Razvan Stanica razvan.stanica@insa-lyon.fr. Ingénieur Télécom-Réseaux ENSEEIHT, promo 2008. Thèse sur le Contrôle de Congestion
More informationFundamentals of Networking Introduction to Networking Devices
Fundamentals of Networking Introduction to Networking Devices Kuldeep Sonar 1 NIC (Network Interface Card) A network interface provides connectivity from an end-user PC or laptop to the public network.
More informationCH : 15 LOCAL AREA NETWORK OVERVIEW
CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating
More informationMaximum Number of Users Which Can Be Served by TETRA Systems
Maximum Number of Users Which Can Be Served by TETRA Systems Martin Steppler Aachen University of Technology Communication Networks Prof. Dr.-Ing. Bernhard Walke Kopernikusstr. 16 D-52074 Aachen Germany
More informationBanner 8 Using International Characters
College of William and Mary Banner 8 Using International Characters A Reference and Training Guide Banner Support January 23, 2009 Table of Contents Windows XP Keyboard Setup 3 VISTA Keyboard Setup 7 Creating
More informationThe random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure
Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of
More informationKIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B
KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT TITLE: DATACOMMUNICATION COURSE CODE: 223 SECTION A: 30 Marks ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B TIME ALLOWED:
More informationContent. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control
Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media
More informationVersion /10/2015. Type specimen. Bw STRETCH
Version 1.00 08/10/2015 Bw STRETCH type specimen 2 Description Bw Stretch is a compressed grotesque designed by Alberto Romanos, suited for display but also body text purposes. It started in 2013 as a
More informationSystems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded
Communication Roland Institute of Computer Engineering Vienna University of Technology 10. November 2010 Overview 1. Definition of a protocol 2. Protocol properties 3. Basic Principles 4. system communication
More informationNetwork Infrastructure
Network Infrastructure For building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater
More informationAN ETHERNET BASED AIRBORNE DATA ACQUISITION SYSTEM
AN ETHERNET BASED AIRBORNE DATA ACQUISITION SYSTEM Item Type text; Proceedings Authors Dai, Jiwang; DeSelms, Thomas; Grozalis, Edward Publisher International Foundation for Telemetering Journal International
More informationComparison Of Network Topologies For Optical Fiber Communication
Comparison Of Network Topologies For Optical Fiber Communication Mr. Bhupesh Bhatia Department of Electronics and Communication, Ms. Ashima Bhatnagar Bhatia Department of Computer Science, Guru Prem Sukh
More informationM242 COMPUTER NETWORS AND SECURITY
M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location
More informationData Communication. Chapter # 1: Introduction. By: William Stalling
Data Communication Chapter # 1: By: Introduction William Stalling Data Communication The exchange of data between two devices via some form of transmission medium such as cable wire. For data communications
More informationUSB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual
USB-ASC232 ASCII RS-232 Controlled USB Keyboard and Mouse Cable User Manual Thank you for purchasing the model USB-ASC232 Cable HAGSTROM ELECTRONICS, INC. is pleased that you have selected this product
More informationCS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017
CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology
More informationDistributed Queue Dual Bus
Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover
More informationChapter 4 NETWORK HARDWARE
Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.
More informationFOUNDATION Fieldbus Fieldbus Basics & its Benefits
FOUNDATION Fieldbus Fieldbus Basics & its Benefits James Loh Yokogawa Engineering Asia On behalf of Fieldbus Foundation TM Vietnam FF Seminar Fieldbus Basics - Agenda 1. H1 Basic Review. 2. H1 Benefits.
More informationChapter 8 LAN Topologies
Chapter 8 LAN Topologies Point-to-Point Networks In a Point-to-Point network, each wire connects exactly two computers Point To Point Link Machine A Machine B Figure 1: Each line connects two machines
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationIntroduction to Networking Devices
Introduction to Networking Devices Objectives Explain the uses, advantages, and disadvantages of repeaters, hubs, wireless access points, bridges, switches, and routers Define the standards associated
More informationLocal Area Network(LAN)
Local Area Network() Sarawuth Chaimool ศราว ธ ช ยม ล jaounarak@hotmail.com Wireless Communications Research Group (WCR) Department of Electrical Engineering King Mongkut s Institute of Technology North
More informationChemistry Hour Exam 2
Chemistry 838 - Hour Exam 2 Fall 2003 Department of Chemistry Michigan State University East Lansing, MI 48824 Name Student Number Question Points Score 1 15 2 15 3 15 4 15 5 15 6 15 7 15 8 15 9 15 Total
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationCh. 4 - WAN, Wide Area Networks
1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationCS61C Machine Structures Lecture 37 Networks. No Machine is an Island!
CS61C Machine Structures Lecture 37 Networks April 24, 2006 John Wawrzynek Page 1 No Machine is an Island! Computer Processor (active) Control ( brain ) Datapath ( brawn ) Memory (passive) (where programs,
More informationChapter 9 & 12: Wired LAN
hapter 9 & 12: Wired LAN Abdullah Konak School of Information Sciences and Technology Penn State Berks LAN Applications and Models LANs P LANs (Office/Home Networks) High Speed Office Networks Backend
More informationToken Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1
Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationAnalysis of End-to-End Delay Characteristics among Various Packet Sizes in Modern Substation Communication Systems based on IEC 61850
Analysis of End-to-End Delay Characteristics among Various Packet Sizes in Modern Substation Communication Systems based on IEC 6185 Narottam Das, Senior Member, IEEE, Tze Jia Wong, and Syed Islam, Senior
More information1999, Scott F. Midkiff
Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams
More informationOracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper December 2011
Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper December 2011 Disclaimer The following is intended to outline our general product direction.
More informationConMan. A Web based Conference Manager for Asterisk. How I Managed to get Con'd into skipping my summer vacation by building this thing
ConMan A Web based Conference Manager for Asterisk -or- How I Managed to get Con'd into skipping my summer vacation by building this thing $90503&07 $:3.74889028,-47,94708 $90503&078:3.42 Sun Labs, slide
More informationLAN PROTOCOLS. Beulah A AP/CSE
LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.
83 Chapter 6 Ethernet Technologies and Ethernet Switching Ethernet and its associated IEEE 802.3 protocols are part of the world's most important networking standards. Because of the great success of the
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationNETWORK SECURITY ITEC 435
NETWORK SECURITY ITEC 435 Agenda Chapter 2: Introduction to Networking Introduction to Networking Networking Fundamentals Reasons to Network Getting the Message Across Analog Information on an Analog Medium
More informationPD215 Mechatronics. Week 3/4 Interfacing Hardware and Communication Systems
PD215 Mechatronics Week 3/4 Interfacing Hardware and Communication Systems Interfacing with the physical world A compute device (microprocessor) in mechatronic system needs to accept input information
More informationREAL-TIME ANALYSIS OF A MULTI-CLIENT MULTI-SERVER ARCHITECTURE FOR NETWORKED CONTROL SYSTEMS
REAL-TIME ANALYSIS OF A MULTI-CLIENT MULTI-SERVER ARCHITECTURE FOR NETWORKED CONTROL SYSTEMS Abhish K. and Rakesh V. S. Department of Electronics and Communication Engineering, Vidya Academy of Science
More informationThe Design of Embedded MCU Network Measure and Control System
Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 983 989 2012 International Conference on Future Electrical Power and Energy Systems The Design of Embedded MCU Network Measure and Control
More informationCMPT 470 Based on lecture notes by Woshun Luk
* ) ( & 2XWOLQH &RPSRQHQ 2EMHF 0RGXOHV CMPT 470 ased on lecture notes by Woshun Luk What is a DLL? What is a COM object? Linking two COM objects Client-Server relationships between two COM objects COM
More informationOOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement
OOstaExcel.ir J. Abbasi Syooki HTML Name HTML Number دهدهی ا کتال هگزاد سیمال باینری نشانه )کاراکتر( توضیح Null char Start of Heading Start of Text End of Text End of Transmission Enquiry Acknowledgment
More informationState of Connecticut Workers Compensation Commission
State of Connecticut Workers Compensation Commission Notice to Employees Workers Compensation Act Chapter 568 of the Connecticut General Statutes (the Workers Compensation Act) requires your employer,
More informationIII. CLAIMS ADMINISTRATION
III. CLAIMS ADMINISTRATION Insurance Providers: Liability Insurance: Greenwich Insurance Company American Specialty Claims Representative: Mark Thompson 142 N. Main Street, Roanoke, IN 46783 Phone: 260-672-8800
More informationUsing CAN with flexible data-rate in CANopen systems
Using CAN with flexible data-rate in CANopen systems Heinz-Jürgen Oertel, port GmbH Shortly after the Controller Area Network developed by Bosch was introduced in cars, it started to be used in industrial
More informationHoneyBee User s Guide
HoneyBee User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is
More informationChapter 16 Networking
Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer
More informationIntroduction to LAN Protocols
CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various
More informationModelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks
Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:
More informationTHE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.
THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!
More informationECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII
ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing
More information