Evaluation of Ethernet based Control Network used in the Distributed Control System

Size: px
Start display at page:

Download "Evaluation of Ethernet based Control Network used in the Distributed Control System"

Transcription

1 Proceedings on the 15th CISL Winter Workshop Kushu, Japan February 2002 Evaluation of Ethernet based Control Network used in the Distributed Control System Jae Young Choi Control Information Systems Lab., School of Electrical Engr. and Computer Science, Seoul National University, Seoul, , Korea Abstract: Distributed control system(dcs) has been used widely in industrial environments. This paper proposes new network system named ERCNet(Ethernet based Real-time Control Network), which satisfies all strict requirements of industrial environment like nuclear power plant. The proposed network, ERCNet uses ring topology, Token passing mechanism and physical media of Fast Ethernet. Proposed network has newly invented device, TCS(Topology Conversion Switch) to adopt ring topology using Fast Ethernet physical media and to enhance the network performance. In this paper, numerical analysis and performance evaluations about this network will be done. Performance enhancement effects of TCS are evaluated by experiments. Keywords: Distributed control system(dcs); Control network; Ring topology; Topology Conversion Switch(TCS); Medium Access Control(MAC) 1 Introduction As digital automation technologies became available in the 1960s, they were used to improve and enlarge the industrial automation systems. The concepts of distributed computer control systems were introduced in the field of industrial automation, and the use of the communication networks has had an almost explosive growth.[1, 2] As the industrial automation systems become large and the number of automation devices increase, it becomes very important for industrial automation to provide high performance network which make it possible to communicate many automation devices and stations in a rapid way. Although there are many network protocols to apply to the industrial network of DCS, they have several their own defects not enough to be applied to high performance DCS like current nuclear power plant. Hence, this paper can be the reference for high performance DCS network architecture. In this paper, a new communication network is proposed and evaluated to fit to the current trend of high performance DCS(Distributed control system). This is named as Ethernet based Real-time Control Network(ERCNet). ERCNet is developed to be able to be implemented as a control network of high performance DCS especially in nuclear power plant. ERCNet can be instrumented in DCS network of nuclear power plant digital I&C system. Today, distributed control systems are being developed using commercial-off-the-shelf (COTS) network products to reduce product development cycle and cost and achieve system interoperability.[4, 5] In the process control industry, Ethernet is becoming a de facto choice for open control network strategies. In accordance with this trend and for the sake of maintainability, ERCNet uses fiber optic physical media of 100Mbps Fast Ethernet. And ERCNet has ring topology with token passing mechanism. To overcome the large broadcasting delay that is one of the major defect of ring topology network, special hardware device that is named TCS(Topology Conversion Switch) is developed and used. And ERC- Net adopts replicated memory DCS system somewhat different from existing replicated memory product like SCRAMNet. The main purpose of this paper is focused on the design and evaluation of DCS network that can satisfy

2 ! \\[[ ZZgffee! jjiihhuttss!! =< ;!! NNMMLLYX > > KJII! $ $ ##"" /. - the tight requirements of industrial environment, such as nuclear power plant. This paper proposes and evaluates the new design and method of high performance DCS network. This paper is organized as follows.in Section 2, the concept and architecture of ERCNet will be described. Section 3 shows the performance enhancement of ERC- Net by implementing TCS. In Section 4, experimental result about the reduction of delay time as the number of nodes is suggested. Finally, conclusions and summarization are made in Section 5. 2 Architecture of ERCNet Hub sensor Motor Valve! ]^_`abcd g! klmnopqr u!! :; <=!! OPQRSTUVW XY ABCDEFGH JK Information Network Gateway Control Network Field Network! %&'()*+,-./ ERCNet is high reliability network that can be used as protection or control instrumentations. ERCNet should be faithful to communicate signal data to control instruments fast and correctly. For this reason, very high speed data exchange and storage should be achieved. ERCNet must consider reliable and swift data exchange mechanism. Also, ERCNet must take into account maintenance. Mostly, DCS is composed of many components. The main components of the DCS are controllers, input/output modules, communication network, sensors, actuators, operator interface stations (OIS), and engineer interface stations (EIS). Among these components, communication network is one of the most important components because all of components are connected by communication network.[6] Generally, communication network in DCS is designed hierarchically. Most DCS communication network is designed as 3 levels, that are information network, control network, and field network like Figure 1. Information network interfaces with users and gets data from control network. Control network transfers data to information network and gathers data from field network. Field network collects data from input/output modules and transfers it to control network. ERCNet corresponds to control network. ERCNet adopts ring topology for the ease of maintainability. Also, it uses Fast Ethernet media, which is used widely and its performance is verified for a long time, to enhance the reliability. It uses fiber-optic cables to reduce the error rate of lines. There are more features in ERCNet. Many features of ERCNet is covered below. 2.1 Replicated Memory method DCS Many DCS system uses distributed shared memory (DSM) scheme for its simplicity and flexibility in software programming. There are two currently existing representative DSM models, that is shared mem- Figure 1: General Architecture of DCS ory and replicated memory.[7] First, typical writeinvalidate protocol model works as follows: Each node has several copies of shared pages, and when a node comes to a pagefault, it sends a request for that page to the other nodes, who send back the page contents through the network. If a node already has a copy, or if it has received a copy form another node, it can access the copied page just the same way. As it accesses pages of normal machine memory(which we will call local memory). When a node tries to write to a page of shared memory, on the other hand, it sends a message to the other nodes in order to invalidate copies of the same page. Second, characteristics of replicated shared memory(called broadcast memory with FIFO)[8, 9] are considered to be almost opposite to those of shared memory. Replicated memory works as follows: Each node has its own copy of the entire contents of shared memory stored in a so-called global memory. A read access to shared memory is performed by reading the contents of its own global memory. When a write access to shared memory is performed, the written data is broadcast to all other nodes on the network to update their own copies. The written data is first stored in a FIFO buffer and sent to the network late, so that the node can resume its work without waiting for acquisition of the network. ERCNet uses replicated memory method network. In shared memory method, there is delay overhead at each memory access of every node and this is a bottleneck of high speed network. To reduce this bottleneck, cache can be used. But in case of cache miss, there comes serious problems. ERCNet uses new replicated memory method DCS and specific behavior is described as follows. All data is updated using broadcasting method with token pass mechanism. Basically, because every node

3 should contain the information of all node, broadcasting is efficient as a data transfer method. When each node receives token, this station(ts) broadcasts its own data. Token is transferred to the next station(ns) to make the next station(ns) broadcast its own data after all of data of TS is transmitted. All of data is updated like this scheme. These procedures can be seen like Figure 2. _`/Z4 _`/Z4 _`/Z4 ; / _`/Z4 ; _`/Z4 : _`/Z4 : _`/Z/ _`/Z D v wyx z { ~ w z Q 2.2 Token D D D E v wyx z {} ~ w z E E E D E v w x z ~ w z {} v w x z {} ~ w z ƒ ˆ ƒ ˆŠŒ ŽŒ Œy y Œ ŒŠ ƒ Figure 2: Data Transmission Process ERCNet uses general Fast Ethernet frames to enhance maintainability. To express token frame, ERCNet uses Type field of Fast Ethernet frame format. The frame format of ERCNet is shown in Figure 3. The first bit of Type field of Ethernet frame is named identifier. When identifier bit is set, it means this frame is token frame.and when identifier is cleared, it means this frame is general data frame. This Type Field is remained for network layer protocols by IEEE standards. /F_ZZc : /Y Z ` \ _ / _ /F _ Z Z c /Y Z /Z /5 / _ c X ] / X X / _ /Z /Z / ] X c 7 a8i _ ỹ šœ œ yž X c / c X ^ / a8 M c X ^ Y ] c X ^ / Z _ X Z ` _ / ` c / X X \ / I _ ] Z ^ Z c D c D c b _ /E : /E /E /E ; /E /E Figure 3: Token frame of ERCNet Since ERCNet doesn t have need to use network layer, this Type Field is not used in ERCNet. ER- CNet contains application layer just on the data link layer. Therefore ERCNet can make use of this field : Z^ freely. ERCNet understands token frame if identifier is set or data frame if identifier is not set. 2.3 TCS In the ring topology network, delays are generated at each node because each node must process every data frame whether frame is destined to itself or not. It is fundamental defects of ring topology network. TCS functions as reducing this delays. Because TCS connects reception line and transmission line in all reception nodes, received data are transmitted immediately and transferred to CPU simultaneously. So TCS can reduce the delay at each node. This scheme reduces CPU processing time at each node. When node receives token and wants to transmit its data, TCS controller disconnects the connection between transmission line and reception line and transmits its data. 100Base-FX Fast Ethernet network should use star topology. However, ERCNet adopts ring topology though physical media of 100Base-FX is used. TCS(Topology Conversion Switch) is the device that makes ERCNet have ring topology with physical media of 100Base-FX. TCS changes topology of network in a moment when station wants to transmit its data. At the moment station want to transmit data, TCS disconnects reception line from transmission line. In this situation, all network can be seen as bus topology, and transmission node broadcasts its data. Figure 4 is block diagram of TCS. Also, TCS connects reception line and transmission line in all the other reception nodes. Using these devices, ERCNet can use Ethernet physical media without hub or switch. ª ««ª OZ : 2 ²y ¹ ½ ² ± Ó ³y ± ± Ø LK L ± ² ³µ ¹ º» ³ ¼ ½ ¹ Ì Íy«yÎÃ Ï Ð ÑyÒ À ÁàÄÆÅ Ç È É Ê Ê Ê Ë Ì Í «Îà ÏÖÐ ÑyÒ À ÁàÄÔÅ Ç È É Ê Ê Õ Ë ¾ ¾ Ÿ Ÿ y ª ««ª c X _ ^ 9 2 Ì Í «¹ ½ ± ± Ø ¾ Z ²y ²y± Î Ï Ð ÑyÒ Ó ³ L LK ± ² ³ÃÓ ¹ ºy» ³ ½ ¹ Ì Í «yîã Ï Ð ÑyÒ OZ/ ^ ` c X _ ^ Z / ^ ` Figure 4: Block Diagram of TCS TCS transmits received frames just after switching analog signal not converting digital signal. It is much faster than converting digital signal. This data transition process can be appeared like Figure 5. In Figure 5, CPM means communication processing module in CPU(Central Processing Unit). Analog switch used to retransmit received data is ADG711 by analog device company. This device is often used in the Ethernet ¾ Ÿ Ÿ

4 switch or hub. This device can be switching at 200MHz bandwidth. Owing to this device, TCS can use ethernet physical media with ring topology. ð ñyò MJ/////////// ñ ó ô õ ö ó ø ö c_/cz c ZZX] ð ñyò MJ/////////// ñ ó ô õ ö ó ø ö c_/cz c The developed hardware in the experiment was a VME 6U board with MPC8260 CPU(Central Processing Unit). Operating system was not installed and all program codes were written in C language. It uses GNU compiler(gcc) and 66Mhz clock. The MPC8260 is integrated communication microprocessor designed for the telecommunications and networking devices. Ù Ú Ú Û Ü Ý Þ ß à á âyã ä Ý å æ Ü ç è Þ é å Ü ê ë Ü ì Ý è å í í Þ ë D:: Ù Ú Ú ÛŒÜ Ý Þ ß à á â ã ä Ý å æ Ü ç è Þ é å Ü î Þ æ Þ å ï Þ ë `_c`]/ Z_X] D _ X]` Ù Ú ÚyÛ Ü Ý Þ ßŒà á âyã ä Ý å æ Ü ç è Þ éyå Ü ê ë Ü ì Ý è å í í Þ ë D:: Ù Ú Ú Û Ü Ý Þ ß à á â ã ä Ý å æ Ü ç è Þ é å Ü î Þ æ Þ å ï Þ ë `_c`]/ Z_X] 3.3 Analysis This section describes the analysis of ERCNet. Numerical modeling of ERCNet is proposed and performance difference in case of using TCS or not is also suggested. Parameters used in this model are like this : c X _ ^ Z /J` O Z /J` Amount of packets assigned to node i : Q i (bytes) Figure 5: Signal Transition Diagram of TCS TCS controller is needed to make TCS turn analog switch on and off as shown in Figure 4. This TCS controller is implemented in the communication processing module of MPC8260 CPU. TCS controller generates 1 or 0 using CPU ports. 1 is generated when data is received, 0 is generated when data is transmitted. This signal connects and disconnects transmission line and reception line. 3 Performance Evaluation In this chapter, performance enhancement features of TCS in ERCNet is evaluated by experiments. Also, numerical analysis about the architecture of ERCNet is done. 3.1 Evaluation Properties ERCNet contrives to enhance the performance using TCS. In a general ring network, one node of network receives data and copies it to the local memory and then retransmits it to the next node. But in ERCNet, receiving and retransmitting data occurs simultaneously using TCS. In this chapter, reduction of delay by this architecture is experimented. The variance of delay as nodes increase is shown. Test software is compiled by GNU compiler(gcc) and monitored by serial communication. Many functions like token mechanism or data transmission is developed. 3.2 Experiment Environment All experiments are performed on a testbed network consisting of three MPC8260 boards connected together with fiber optic cable. All boards communicate each other using fiber optic cables. Transmission speed : 100Mbits/sec (Fast Ethernet) One-bit time : T b The number of nodes : N Authorization rotating time : T rot Propagation delay : P i (5ns/m in case of 100Base- FX) Header size (OH) : 22 bytes Length of CRC (CRC) : 4 bytes Data frame payload length : F d ( 46 bytes F d 1.5 Kbytes) Optical-to-electrical conversion delay : D oe Electrical-to-optical conversion delay : D eo TCS processing delay : D tcs Cable length between node i and i+1 : L i (L max = 2000 m) Authorization processing delay : D A Interframe gap : D g The number of packets that the node i sends : m i The number of frames assigned to i-th node m i is m i = Qi The payload length of the last frame of i-th node r i is Fd r i = Q i Fd(m i 1) The transmission time of the last frame T f is

5 Tf = (r i +OH + CRC) Tb The transmission time of the usual frame T n is Tn = (Fd +OH + CRC) Tb The authorization passing time of i-th node A i is Ai = (Tn + Dg)(m i 1) + Tf +(Deo + Pi + Doe) + DA + Dtcs where P i = 5L i (5 us/km) in case that the optical fiber is 100Base-FX[10] The authorization rotating time in the whole network T rot is Trot = n {(Tn + Dg)(m i 1) + Tf +(Deo + Pi + Doe) i=1 + DA + Dtcs} The authorization passing time of i-th node A i means processing time to acknowledge the fact that token is received and to transmit its own data. And authorization rotating time means time that token passes through the whole network. In experiments, D tcs term is removed and D A term is increased in case of not using TCS. If TCS is not used, CPU itself has to copy data from receive buffer to transmit buffer. This increases D A value. If TCS is used, D A value is decreased and D tcs term exists. But D tcs is so small because D tcs is just composed of analog signal switching delay. 4 Experiment Results This experiment built test network with 2, 3, and 8 nodes and measured frame rotating time in each case. Frame rotation time is defined as the time from sending data frame to the other nodes to receiving its own data frame. In this experiment, 1Kbytes data frame is transmitted and frame rotation time is measured using two 32bit timers provided by MPC8260 CPU. In case that TCS is used, all frames are switched and transmitted soon after received. In case of no TCS, DMA(Direct Memory Access) controller reads receive buffer and copies it to the transmit buffer using DMA. Figure 6 and table 1 show the experimental result. Two frame rotating times, in case of using TCS in ER- CNet and in case of not using TCS and data is copied using DMA are measured as node increases. X-axis means number of node and Y-axis time with microsecond scale. All data was gathered as the average of enough iteration. This result shows that frame rotation time of ERCNet with TCS increases slightly as Table 1: Frame Rotation Time(us) Number of Node TCS Without TCS Figure 6: Experimental Result-Authorization Rotation Time node increases in comparison with the case of not using TCS in ERCNet. In ERCNet, frames are retransmitted just after switching received analog signals. Frame rotation time of ERCNet with TCS can be smaller than data rotation time of FDDI. If TCS is not used in ERCNet, ERCNet shows result worse than the case of using TCS. It is because data retransmission is processed by software. CPU copies data from receive buffer to transmit buffer. It takes much more time than frames are retransmitted by analog switching. Although this experiment shows good result, TCS can make signal distortions because TCS switches analog signal directly. So it is probable that signals should be corrected and amplified appropriately in case that node increases. 5 Conclusion In industrial environment, the amount of data to be processed is increasing continuously and users want more convenience. Considering these situation, existing network protocols have some difficulties in operating current distributing control system. It is necessary that higher performance network should be developed. As a high performance network for these requirements, ER-

6 CNet is proposed in this paper. ERCNet is developed gathering the advantages of existing high speed networks, and it has enough performance to satisfy strict requirements of industrial environment. ERCNet is high performance network with high maintainability and speed as much as 100Mbps. Maintenance and repair is easy because it uses widely-used Fast Ethernet physical media. Wiring is simple because it uses ring topology. In general, ethernet network is implemented as star topology. But TCS device is developed to be capable of ring topology based upon ethernet physical media. Also, TCS have an effect on reducing time delay at each node, that is one of the most significant defects of ring topology network. We make network behave deterministically using token passing mechanism. Token passing mechanism is implemented by means of making use of unused field of Ethernet frame format. Performance enhancement effect of TCS in ERCNet is measured by experiment. This experiment shows that frame rotation time is slightly increased as node increases in comparison with not using TCS. It is because the time CPU copies data from receive buffer to transmit buffer is reduced. TCS retransmits frames just after switching analog signal that comes from 100Base-FX receiver. At this moment, distortion of signal may happen. Effect of distortion as number of node is not yet evaluated. Experimental evaluation about the signal distortion by TCS is needed. ERCNet can be used as the network system demanded by distributed control system. It is designed to satisfy strict requirements that most of distributed control system needs. Especially it is developed to meet the strict requirements like nuclear power plant. ER- CNet is planning to be used as DCS network in the nuclear power plant. Also, it can be adapted to almost industrial environment. evaluation, IEEE International Performance, Computing and Communications Conference, pp , Feb [5] A. Koyama, L. Barolli, and Z. Cheng, Performance evaluation of an adaptive ring access protocol for super high-speed networks, Preceedings of 15th International Conference on Information Networking, pp , [6] J. Cao, R. Steele, L.J. Yao, and W. Jia, Design and simulation of a reliable token-ring protocol for realtime communications, Proceedings of IEEE International Computer Performance and Dependability Symposium, pp , [7] M. Oguchi, H. Aida, and T. Saito, A proposal for a DSM architecture suitable for a widely distributed environment and its evaluation, Proceedings of the Fourth IEEE International Symposium on High Performance Distributed Computing, pp , [8] T. Saito, H. Aida, Oguchi M., and M. Kuroiwa, Implementation and Evaluation of a Shared Memory Using Broadcast Memory with FIFO, Transactions of the Institute of Electronics, Information and Communication Engineers, vol. J75- D-I, no. 12, pp , December [9] Oguchi M., H. Aida, and T. Saito, A Study of Synchronization Mechanisms for Ring-Connected type Replicated Shared Memory, IFIP Conference on South East Asia Communications, pp , October [10] B. Albert and A.P. Jayasumana, Performance analysis of FDDI LANs using numerical methods, IEE Proceedings-Computers and Digital Techniques, vol. 144, no. 3, pp , May References [1] Hong ju Moon, Performance analysis and design of a communication network for industrial automation : a case study of the Mini-Map network, Ph. D Thesis, Seoul National University, [2] John R. Freer, Computer Communications and Networks, Plenum Press, [3] John W. Bernard, CIM in the Process Industries, Instrument Society of America, [4] J. Huang, S. Song, L. Li, P. Kappler, R. Freimark, J. Gustin, and T. Kozlik, An open solution to fault-tolerant Ethernet: design, prototyping, and

Pointers. CS2023 Winter 2004

Pointers. CS2023 Winter 2004 Pointers CS2023 Winter 2004 Outcomes: Introduction to Pointers C for Java Programmers, Chapter 8, sections 8.1-8.8 Other textbooks on C on reserve After the conclusion of this section you should be able

More information

Pointers & Arrays. CS2023 Winter 2004

Pointers & Arrays. CS2023 Winter 2004 Pointers & Arrays CS2023 Winter 2004 Outcomes: Pointers & Arrays C for Java Programmers, Chapter 8, section 8.12, and Chapter 10, section 10.2 Other textbooks on C on reserve After the conclusion of this

More information

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0.

This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version 3.0. Range: This file contains an excerpt from the character code tables and list of character names for The Unicode Standard, Version.. isclaimer The shapes of the reference glyphs used in these code charts

More information

Lecture 5 C Programming Language

Lecture 5 C Programming Language Lecture 5 C Programming Language Summary of Lecture 5 Pointers Pointers and Arrays Function arguments Dynamic memory allocation Pointers to functions 2D arrays Addresses and Pointers Every object in the

More information

More on LANS. LAN Wiring, Interface

More on LANS. LAN Wiring, Interface More on LANS Chapters 10-11 LAN Wiring, Interface Mostly covered this material already NIC = Network Interface Card Separate processor, buffers incoming/outgoing data CPU might not be able to keep up network

More information

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC

APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC APPLESHARE PC UPDATE INTERNATIONAL SUPPORT IN APPLESHARE PC This update to the AppleShare PC User's Guide discusses AppleShare PC support for the use of international character sets, paper sizes, and date

More information

DESIGN OF AN ETHERNET BUS INTERFACE CONTROLLER IN A NUCLEAR POWER PLANT SIMULATOR

DESIGN OF AN ETHERNET BUS INTERFACE CONTROLLER IN A NUCLEAR POWER PLANT SIMULATOR Proceedings of the 18th International Conference on Nuclear Engineering Proceedings of the 18th International Conference on Nuclear Engineering ICONE18 ICONE18 May 17-21, 2010, Xi'an, China May 17-21,

More information

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CARRIER SENSE MULTIPLE ACCESS (CSMA): Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

More information

Guide to Networking Essentials Fifth Edition. Chapter 2 Network Design Essentials

Guide to Networking Essentials Fifth Edition. Chapter 2 Network Design Essentials Guide to Networking Essentials Fifth Edition Chapter 2 Network Design Essentials Objectives Explain the basics of a network layout Describe the standard networking topologies Explain the variations on

More information

Modules. CS2023 Winter 2004

Modules. CS2023 Winter 2004 Modules CS2023 Winter 2004 Outcomes: Modules C for Java Programmers, Chapter 7, sections 7.4.1-7.4.6 Code Complete, Chapter 6 After the conclusion of this section you should be able to Understand why modules

More information

Personal Conference Manager (PCM)

Personal Conference Manager (PCM) Chapter 3-Basic Operation Personal Conference Manager (PCM) Guidelines The Personal Conference Manager (PCM) interface enables the conference chairperson to control various conference features using his/her

More information

) $ G}] }O H~U. G yhpgxl. Cong

) $ G}] }O H~U. G yhpgxl. Cong » Þ åî ïî á ë ïý þý ÿ þ ë ú ú F \ Œ Œ Ÿ Ÿ F D D D\ \ F F D F F F D D F D D D F D D D D FD D D D F D D FD F F F F F F F D D F D F F F D D D D F Ÿ Ÿ F D D Œ Ÿ D Ÿ Ÿ FŸ D c ³ ² í ë óô ò ð ¹ í ê ë Œ â ä ã

More information

Rapid Prototyping of flexible Embedded Systems on multi-dsp Architectures

Rapid Prototyping of flexible Embedded Systems on multi-dsp Architectures Rapid Prototyping of flexible Embedded Systems on multi-dsp Architectures Bernhard Rinner, Martin Schmid and Reinhold Weiss Institut für Technische Informatik Technische Universität Graz Inffeldgasse 16/1,

More information

Network protocols and. network systems INTRODUCTION CHAPTER

Network protocols and. network systems INTRODUCTION CHAPTER CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

ERNST. Environment for Redaction of News Sub-Titles

ERNST. Environment for Redaction of News Sub-Titles ERNST Environment for Redaction of News Sub-Titles Introduction ERNST (Environment for Redaction of News Sub-Titles) is a software intended for preparation, airing and sequencing subtitles for news or

More information

Part3. Local Area Networks (LAN)

Part3. Local Area Networks (LAN) Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed

More information

Cartons (PCCs) Management

Cartons (PCCs) Management Final Report Project code: 2015 EE04 Post-Consumer Tetra Pak Cartons (PCCs) Management Prepared for Tetra Pak India Pvt. Ltd. Post Consumer Tetra Pak Cartons (PCCs) Management! " # $ " $ % & ' ( ) * +,

More information

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010)

Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) Chapter 6: DataLink Layer - Ethernet Olivier Bonaventure (2010) 6.3.2. Ethernet Ethernet was designed in the 1970s at the Palo Alto Research Center [Metcalfe1976]. The first prototype [5] used a coaxial

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. Four data rates are

More information

To provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts.

To provide state and district level PARCC assessment data for the administration of Grades 3-8 Math and English Language Arts. 200 West Baltimore Street Baltimore, MD 21201 410-767-0100 410-333-6442 TTY/TDD msde.maryland.gov TO: FROM: Members of the Maryland State Board of Education Jack R. Smith, Ph.D. DATE: December 8, 2015

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

Using Time Division Multiplexing to support Real-time Networking on Ethernet

Using Time Division Multiplexing to support Real-time Networking on Ethernet Using Time Division Multiplexing to support Real-time Networking on Ethernet Hariprasad Sampathkumar 25 th January 2005 Master s Thesis Defense Committee Dr. Douglas Niehaus, Chair Dr. Jeremiah James,

More information

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science 1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

IEEE 802 LANs SECTION C

IEEE 802 LANs SECTION C IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus

More information

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Integrating Information Systems: Technology, Strategy, and Organizational Factors MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network

More information

Media Access Control (MAC) Sub-layer and Ethernet

Media Access Control (MAC) Sub-layer and Ethernet Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF MAC Sub-layer The MAC sub-layer is a sub-layer

More information

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs.

Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Internetworking Multiple networks are a fact of life: Growth. Individual departments in a university buy LANs for their own machines and eventually want to interconnect with other campus LANs. Fault isolation,

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

2. LAN Topologies Gilbert Ndjatou Page 1

2. LAN Topologies Gilbert Ndjatou Page 1 2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers

More information

1. Data Link Layer Protocols

1. Data Link Layer Protocols 1. Data Link Layer Protocols Purpose of the Data Link Layer The Data Link Layer Purpose of the Data Link Layer Data Link Sublayers Network LLC Sublayer Data Link Physical MAC Sublayer 802.3 Ethernet 802.11

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #2 Due Thursday, Nov 10 th By midnight Homework #5 Due Thursday, Nov 17 th Later this semester: Homework

More information

SCRAMNet GT. A New Technology for Shared-Memor y Communication in High-Throughput Networks. Technology White Paper

SCRAMNet GT. A New Technology for Shared-Memor y Communication in High-Throughput Networks. Technology White Paper Technology White Paper SCRAMNet GT A New Technology for Shared-Memor y Communication in High-Throughput Networks Introduction A number of today s most advanced networking applications require the fast

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

Introduction to Real-Time Systems ECE 397-1

Introduction to Real-Time Systems ECE 397-1 Introduction to Real-Time Systems ECE 397-1 Northwestern University Department of Computer Science Department of Electrical and Computer Engineering Teachers: Robert Dick Peter Dinda Office: L477 Tech

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

LAN Systems. Bus topology LANs

LAN Systems. Bus topology LANs Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong

More information

Medium Access Control

Medium Access Control TC 3TCA NET Département Télécommunications Services & Usages Intervenant Razvan Stanica razvan.stanica@insa-lyon.fr. Ingénieur Télécom-Réseaux ENSEEIHT, promo 2008. Thèse sur le Contrôle de Congestion

More information

Fundamentals of Networking Introduction to Networking Devices

Fundamentals of Networking Introduction to Networking Devices Fundamentals of Networking Introduction to Networking Devices Kuldeep Sonar 1 NIC (Network Interface Card) A network interface provides connectivity from an end-user PC or laptop to the public network.

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

Maximum Number of Users Which Can Be Served by TETRA Systems

Maximum Number of Users Which Can Be Served by TETRA Systems Maximum Number of Users Which Can Be Served by TETRA Systems Martin Steppler Aachen University of Technology Communication Networks Prof. Dr.-Ing. Bernhard Walke Kopernikusstr. 16 D-52074 Aachen Germany

More information

Banner 8 Using International Characters

Banner 8 Using International Characters College of William and Mary Banner 8 Using International Characters A Reference and Training Guide Banner Support January 23, 2009 Table of Contents Windows XP Keyboard Setup 3 VISTA Keyboard Setup 7 Creating

More information

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of

More information

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B

KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B KIBABII UNIVERSITY COLLEGE DEPARTMENT COMPUTER SCIENCE & IT TITLE: DATACOMMUNICATION COURSE CODE: 223 SECTION A: 30 Marks ANSWER ALL QUESTIONS IN SECTION A AND ANY TWO QUESTIONS IN SECTION B TIME ALLOWED:

More information

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media

More information

Version /10/2015. Type specimen. Bw STRETCH

Version /10/2015. Type specimen. Bw STRETCH Version 1.00 08/10/2015 Bw STRETCH type specimen 2 Description Bw Stretch is a compressed grotesque designed by Alberto Romanos, suited for display but also body text purposes. It started in 2013 as a

More information

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded Communication Roland Institute of Computer Engineering Vienna University of Technology 10. November 2010 Overview 1. Definition of a protocol 2. Protocol properties 3. Basic Principles 4. system communication

More information

Network Infrastructure

Network Infrastructure Network Infrastructure For building computer networks more complex than e.g. a short bus, some additional components are needed. They can be arranged hierarchically regarding their functionality: Repeater

More information

AN ETHERNET BASED AIRBORNE DATA ACQUISITION SYSTEM

AN ETHERNET BASED AIRBORNE DATA ACQUISITION SYSTEM AN ETHERNET BASED AIRBORNE DATA ACQUISITION SYSTEM Item Type text; Proceedings Authors Dai, Jiwang; DeSelms, Thomas; Grozalis, Edward Publisher International Foundation for Telemetering Journal International

More information

Comparison Of Network Topologies For Optical Fiber Communication

Comparison Of Network Topologies For Optical Fiber Communication Comparison Of Network Topologies For Optical Fiber Communication Mr. Bhupesh Bhatia Department of Electronics and Communication, Ms. Ashima Bhatnagar Bhatia Department of Computer Science, Guru Prem Sukh

More information

M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location

More information

Data Communication. Chapter # 1: Introduction. By: William Stalling

Data Communication. Chapter # 1: Introduction. By: William Stalling Data Communication Chapter # 1: By: Introduction William Stalling Data Communication The exchange of data between two devices via some form of transmission medium such as cable wire. For data communications

More information

USB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual

USB-ASC232. ASCII RS-232 Controlled USB Keyboard and Mouse Cable. User Manual USB-ASC232 ASCII RS-232 Controlled USB Keyboard and Mouse Cable User Manual Thank you for purchasing the model USB-ASC232 Cable HAGSTROM ELECTRONICS, INC. is pleased that you have selected this product

More information

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017 CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology

More information

Distributed Queue Dual Bus

Distributed Queue Dual Bus Distributed Queue Dual Bus IEEE 802.3 to 802.5 protocols are only suited for small LANs. They cannot be used for very large but non-wide area networks. IEEE 802.6 DQDB is designed for MANs It can cover

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

FOUNDATION Fieldbus Fieldbus Basics & its Benefits

FOUNDATION Fieldbus Fieldbus Basics & its Benefits FOUNDATION Fieldbus Fieldbus Basics & its Benefits James Loh Yokogawa Engineering Asia On behalf of Fieldbus Foundation TM Vietnam FF Seminar Fieldbus Basics - Agenda 1. H1 Basic Review. 2. H1 Benefits.

More information

Chapter 8 LAN Topologies

Chapter 8 LAN Topologies Chapter 8 LAN Topologies Point-to-Point Networks In a Point-to-Point network, each wire connects exactly two computers Point To Point Link Machine A Machine B Figure 1: Each line connects two machines

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Introduction to Networking Devices

Introduction to Networking Devices Introduction to Networking Devices Objectives Explain the uses, advantages, and disadvantages of repeaters, hubs, wireless access points, bridges, switches, and routers Define the standards associated

More information

Local Area Network(LAN)

Local Area Network(LAN) Local Area Network() Sarawuth Chaimool ศราว ธ ช ยม ล jaounarak@hotmail.com Wireless Communications Research Group (WCR) Department of Electrical Engineering King Mongkut s Institute of Technology North

More information

Chemistry Hour Exam 2

Chemistry Hour Exam 2 Chemistry 838 - Hour Exam 2 Fall 2003 Department of Chemistry Michigan State University East Lansing, MI 48824 Name Student Number Question Points Score 1 15 2 15 3 15 4 15 5 15 6 15 7 15 8 15 9 15 Total

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Ch. 4 - WAN, Wide Area Networks

Ch. 4 - WAN, Wide Area Networks 1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

CS61C Machine Structures Lecture 37 Networks. No Machine is an Island!

CS61C Machine Structures Lecture 37 Networks. No Machine is an Island! CS61C Machine Structures Lecture 37 Networks April 24, 2006 John Wawrzynek Page 1 No Machine is an Island! Computer Processor (active) Control ( brain ) Datapath ( brawn ) Memory (passive) (where programs,

More information

Chapter 9 & 12: Wired LAN

Chapter 9 & 12: Wired LAN hapter 9 & 12: Wired LAN Abdullah Konak School of Information Sciences and Technology Penn State Berks LAN Applications and Models LANs P LANs (Office/Home Networks) High Speed Office Networks Backend

More information

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Analysis of End-to-End Delay Characteristics among Various Packet Sizes in Modern Substation Communication Systems based on IEC 61850

Analysis of End-to-End Delay Characteristics among Various Packet Sizes in Modern Substation Communication Systems based on IEC 61850 Analysis of End-to-End Delay Characteristics among Various Packet Sizes in Modern Substation Communication Systems based on IEC 6185 Narottam Das, Senior Member, IEEE, Tze Jia Wong, and Syed Islam, Senior

More information

1999, Scott F. Midkiff

1999, Scott F. Midkiff Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams

More information

Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper December 2011

Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide. An Oracle White Paper December 2011 Oracle Primavera P6 Enterprise Project Portfolio Management Performance and Sizing Guide An Oracle White Paper December 2011 Disclaimer The following is intended to outline our general product direction.

More information

ConMan. A Web based Conference Manager for Asterisk. How I Managed to get Con'd into skipping my summer vacation by building this thing

ConMan. A Web based Conference Manager for Asterisk. How I Managed to get Con'd into skipping my summer vacation by building this thing ConMan A Web based Conference Manager for Asterisk -or- How I Managed to get Con'd into skipping my summer vacation by building this thing $90503&07 $:3.74889028,-47,94708 $90503&078:3.42 Sun Labs, slide

More information

LAN PROTOCOLS. Beulah A AP/CSE

LAN PROTOCOLS. Beulah A AP/CSE LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety

More information

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided. 83 Chapter 6 Ethernet Technologies and Ethernet Switching Ethernet and its associated IEEE 802.3 protocols are part of the world's most important networking standards. Because of the great success of the

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

NETWORK SECURITY ITEC 435

NETWORK SECURITY ITEC 435 NETWORK SECURITY ITEC 435 Agenda Chapter 2: Introduction to Networking Introduction to Networking Networking Fundamentals Reasons to Network Getting the Message Across Analog Information on an Analog Medium

More information

PD215 Mechatronics. Week 3/4 Interfacing Hardware and Communication Systems

PD215 Mechatronics. Week 3/4 Interfacing Hardware and Communication Systems PD215 Mechatronics Week 3/4 Interfacing Hardware and Communication Systems Interfacing with the physical world A compute device (microprocessor) in mechatronic system needs to accept input information

More information

REAL-TIME ANALYSIS OF A MULTI-CLIENT MULTI-SERVER ARCHITECTURE FOR NETWORKED CONTROL SYSTEMS

REAL-TIME ANALYSIS OF A MULTI-CLIENT MULTI-SERVER ARCHITECTURE FOR NETWORKED CONTROL SYSTEMS REAL-TIME ANALYSIS OF A MULTI-CLIENT MULTI-SERVER ARCHITECTURE FOR NETWORKED CONTROL SYSTEMS Abhish K. and Rakesh V. S. Department of Electronics and Communication Engineering, Vidya Academy of Science

More information

The Design of Embedded MCU Network Measure and Control System

The Design of Embedded MCU Network Measure and Control System Available online at www.sciencedirect.com Energy Procedia 17 (2012 ) 983 989 2012 International Conference on Future Electrical Power and Energy Systems The Design of Embedded MCU Network Measure and Control

More information

CMPT 470 Based on lecture notes by Woshun Luk

CMPT 470 Based on lecture notes by Woshun Luk * ) ( & 2XWOLQH &RPSRQHQ 2EMHF 0RGXOHV CMPT 470 ased on lecture notes by Woshun Luk What is a DLL? What is a COM object? Linking two COM objects Client-Server relationships between two COM objects COM

More information

OOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement

OOstaExcel.ir. J. Abbasi Syooki. HTML Number. Device Control 1 (oft. XON) Device Control 3 (oft. Negative Acknowledgement OOstaExcel.ir J. Abbasi Syooki HTML Name HTML Number دهدهی ا کتال هگزاد سیمال باینری نشانه )کاراکتر( توضیح Null char Start of Heading Start of Text End of Text End of Transmission Enquiry Acknowledgment

More information

State of Connecticut Workers Compensation Commission

State of Connecticut Workers Compensation Commission State of Connecticut Workers Compensation Commission Notice to Employees Workers Compensation Act Chapter 568 of the Connecticut General Statutes (the Workers Compensation Act) requires your employer,

More information

III. CLAIMS ADMINISTRATION

III. CLAIMS ADMINISTRATION III. CLAIMS ADMINISTRATION Insurance Providers: Liability Insurance: Greenwich Insurance Company American Specialty Claims Representative: Mark Thompson 142 N. Main Street, Roanoke, IN 46783 Phone: 260-672-8800

More information

Using CAN with flexible data-rate in CANopen systems

Using CAN with flexible data-rate in CANopen systems Using CAN with flexible data-rate in CANopen systems Heinz-Jürgen Oertel, port GmbH Shortly after the Controller Area Network developed by Bosch was introduced in cars, it started to be used in industrial

More information

HoneyBee User s Guide

HoneyBee User s Guide HoneyBee User s Guide font faq HOW TO INSTALL YOUR FONT You will receive your files as a zipped folder. For instructions on how to unzip your folder, visit LauraWorthingtonType.com/faqs/. Your font is

More information

Chapter 16 Networking

Chapter 16 Networking Chapter 16 Networking Outline 16.1 Introduction 16.2 Network Topology 16.3 Network Types 16.4 TCP/IP Protocol Stack 16.5 Application Layer 16.5.1 Hypertext Transfer Protocol (HTTP) 16.5.2 File Transfer

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:

More information

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review.

THE OSI MODEL. Application Presentation Session Transport Network Data-Link Physical. OSI Model. Chapter 1 Review. THE OSI MODEL Application Presentation Session Transport Network Data-Link Physical OSI Model Chapter 1 Review By: Allan Johnson Table of Contents Go There! Go There! Go There! Go There! Go There! Go There!

More information

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing

More information