Simulation of FDDI-based Distributed Energy Management Systems

Size: px
Start display at page:

Download "Simulation of FDDI-based Distributed Energy Management Systems"

Transcription

1 Simulation of FDDI-based Distributed Energy Management Systems Tetiana Lo, Felix F. Wu, Shau-Ming Luo Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, California, USA Abstract We have developed a simulator to evaluate the instantaneous performance of FDDI-based Energy Management Systems(EMS) and show by example the ease of modifying operating parameters of the network configuration, and constructing various distributed EMS design alternatives. Hence, we demonstrate the flexibility of our simulation approach and FDDI's enormous potential as a backbone network for an energy management system. Keywords : SCADA/EMS hardware implementation and design, system architecture, networks, open systems, local area network performance evaluation, object-oriented simulation 1. Introduction Traditional EMS design is basically centralized: the configuration consists of centrally located processors that receive data from the entire power system. Recent advances in computer and communications technology have increased the number of options available to EMS designers. Microprocessors are capable of operating at increasingly higher rates, and computer networking has become more sophisticated, supporting a much wider range of applications. Together, these advances have resulted in higher-level performance and lower implementation costs. It is now technologically and economically feasible to distribute the processing load of an EMS among several processors, leading to the concept of a Distributed EMS[l]. A distributed EMS may possess several possible configurations. Currently, all proposed distributed EMS designs are local area network(lan)-based (i.e., [2],[3]). A prototype of a functionally distributed system was proposed and implemented to validate EMS performance in [ 4]. EMS functions were executed in separate workstations connected by a dual LAN. This approach allowed the evaluation of processing performance and the verification of system operation. However, prototyping has its limitations; it is difficult to consider many EMS configuration options in advance and implement future configurations to which the system could evolve. Using simulation methods is the most practical and effective way of evaluating EMS performance and comparing design options. In [5], a method for simulating a generic LAN-based EMS for a typical operating scenario in a control center was presented. The simulation results showed how the average performance of the distributed system could be predicted. However, while an EMS may have acceptable average performance, it still may fail to meet the real-time response requirements. These examples demonstrate the need for a new approach to EMS performance evaluation and design. At UC Berkeley an integrated planning and analysis environment for communication networks, Netplan, has been developed, based on object-oriented technology[6]. A LAN simulator, LANSIM, has been developed as one of the tools in Netplan. In this study we use LANSIM to examine a type of distributed EMS based on FDDI, a high-speed LAN. Specifically, we evaluate the instantaneous performance of this particular type of distributed EMS under heavily-loaded conditions, to observe if the EMS is still capable of satisfying its real-time requirements. Using our simulator, LANSIM, we show by example the ease of modifying operating parameters of the network configuration, and constructing various distributed EMS design alternatives. Hence, we demonstrate the flexibility of our simulation approach and FDDI's enormous potential as a backbone network for an energy management system. This paper is an extension of our previous work in the simulation of LAN-based distributed EMSs[7]. Whereas the objective of the previous paper was to compare EMS performance based on Ethernet and FDDI, the focus of the present paper is on the potential provided by FDDI to further improve EMS performance by tuning various network parameters. The paper is organized as follows. In Section 2 we introduce key characteristics of the FDDI network. The LAN and workstation models we developed using LAN SIM are proposed in Section 3. In Section 4 we present the simulation cases and discuss the results. We conclude in Section 5 and propose future directions. 2. LAN Simulator 2.1 Ptolemy Our LAN simulator, LANSIM, is based on the Ptolemy software environment, an object-oriented system developed at UC Berkeley[8]. Programmed in C++ 865

2 and running on a UNIX workstation, Ptolemy is a very flexible framework, supporting heterogeneous system specification, simulation, and design. Each model of computation is called a domain and consists of an extensible library of functional blocks. The basic unit of computation in Ptolemy is the block, represented graphically by an icon with terminals, corresponding to its portholes. A block may be atomic (star) or composite(galaxy). Applications are constructed graphically by connecting blocks. At runtime, a scheduler determines the order in which the blocks are executed. Data is exchanged between the blocks in the form of particles; discrete units which may be of several types: integer, real, complex, or a general structure such as a data packet. Blocks may have states, user-settable data structures which may be monitored from one execution to another. Ptolemy's strength and uniqueness lie in its capability of supporting the many aspects of communication system modeling and simulation and the ease with which new application-specific design environments may be built. 2.2 DE Domain Individual nodes of the FDDI network are modeled as stars in the discrete-event(de) domain. DE stars function as event-processing units which receive and process particles from the outside and generate output events after a user-given latency. A ring interconnection of stars constitute the local area network. A data packet, defined as one type of particle, has an associated time-stamp generated by the block producing the particle and represents an event corresponding to a change of system state. The DE scheduler processes events in chronological order until the global time reaches a user-specified "stop time." The global event queue contains particles currently in the system, sorted by time stamp. The scheduler retrieves an event from the head of the queue, the earliest event, and sends it to an input porthole of its destination block. When a new event appears at the input portholes of a star, the scheduler retrieves and sends all other simultaneous events destined to the same star. The star is then executed(fired). After execution, events generated at the output portholes, i.e., packets to be transmitted to another station, are placed in the global event queue. The scheduler repeats this retrieving and firing process until the given terminating condition is met. 2.3 Station Model A workstation model has been developed for the simulation of a distributed EMS, as shown in Figure 1. We model an individual FDDI station as possessing two layers: the traffic generator(upper) and the medium access control(mac) layer(lower). Upon receiving a traffic generator protocol data unit(pdu), the MAC layer appends header and control fields, and pads the resulting MAC Pdu, if necessary, to meet the minimum packet size requirement. The packet is then placed in the appropriate queue, a star obtained from the Ptolemy library which accumulates packets in a finite capacity FIFO queue and produces outputs on demand, and awaits transmission onto the medium.,... ~.~~~... ~ ~ ---~~~-.~- ~ ~ I ealdldly... ~ ,-... ~... l Figure l Station Model The receiver and traffic generator are peer entities. The receiver accumulates and processes Pdus produced by all traffic generators and passes them to the report generators. The traffic generator in each station utilizes the adjoining traffic models to generate messages of desired lengths and distributions, uniform and exponential, for example. A message is represented by a data structure with several information fields including length, timestamp, source and destination addresses, and type of traffic. The user may build a particular station, a generation processor(gen), for example, by first selecting a LAN technology(mac layer) from the Protocol Library, and various applications such as economic dispatch(ed) and automatic generation control(agc) from the Application Library. Outputs may be chosen then for report generation or statistical information, such as delay calculations and distributions, from the Report Library. Finally, stations are interconnected to form a LAN. A simulation case may be constructed based on the particular configuration of the LAN-based EMS we wish to simulate. This includes specifying the number of workstations, functions distributed in each station, and 'the communication protocol operating in the system. Individual workstation models may be built by selecting blocks from the class libraries. Each station model is defined as a composite block and represented as an icon in the LAN SIM user interface. These icons are connected graphically according to the system topology. The simulation case is then executed. Parameters such as execution frequency of a function and propagation delays in the 866

3 communication protocol may be easily entered or changed by using pop-up menus at runtime. Alternative EMS configurations may be implemented by creating and connecting additional station models. For example, the communication protocol can be changed by replacing the original protocol block with an alternative block from the protocol library in each station model. The distribution of the EMS functions can also be varied: to study the effects of executing SE in a separate processor, an additional station is created, containing the the newly-defined SE traffic model. New EMS functions and communication technologies may be incorporated by developing models for them in the LANSIM class libraries. In our model the transmission media and nodes are assumed error-free; packets are transmitted and arrive at destinations without error. Furthermore, it is assumed that no node failures or ring malfunctions occur, and the network operates at a fixed transmission rate of 100 Mbps. 3. FDDI Modeling FDDI is a 100 Mbps local area network having an optical fiber dual ring topology and using a timed token rotation protocol[9]. The FDDI Standard complies with the OSI Reference Model, with the network providing services specified by the Data Link Layer and Physical Layer. The MAC schedules and performs data transfers on the ring. A node gains access to the medium to begin transmission by capturing the token, a unique frame which is circulated sequentially. Immediately after completing transmission, the node issues and forwards a new token. Each node repeats the frames it receives to its downstream neighbor. If the destination address of a frame matches that of the MAC's, and no error is indicated, the frame is copied into a local buffer. The MAC modifies indicator symbols as the frame is repeated to indicate the detection of an error, address recognition, and the copying of the frame. Frames returning to the originating node are stripped by not being retransmitted. Two modes of transmission are supported by FDDI: synchronous and asynchronous. Synchronous traffic utilizes a preallocated bandwidth and has a guaranteed maximum response time. This traffic may be transmitted by a node whenever it receives the token. Asynchronous traffic bandwidth is allocated dynamically from the remaining unused and unallocated bandwidth. Transmission is not allowed if the time since receiving the last token exceeds the operational target token rotation time (T_Opr), the expected token rotation time; a value negotiated during ring initialization. Eight asynchronous priority levels are provided within each node. A single FDDI ring is modeled based on the ANSI Standard for FDDI[IO]. Queues in each station distinguish between traffic received from the ring and that generated by the station itself, and separate synchronous and asynchronous data. The user assigns the address, synchronous bandwidth, T_Opr, and eight asynchronous priority thresholds(t _Pri) for each node. Initially, it is assumed that an arbitrarily chosen node possesses the token. The token is a fixed-length frame generated by the MAC layer of the station sending the token, uniquely identified by its control field bits. During the first token rotation, all node late count registers are set to I; only synchronous data may be transmitted. Thereafter, normal ring operation ensues. MAC protocol Several important parameters used in the timed token rotation protocol are defined below: a. TTRT: Target-token rotation time; a station-dependent value; the expected time between successive receptions of the token. b. T_Opr: Operating target token rotation time; the lowest of all station TTRT values is selected as T_Opr of the system. c. lrt: Token rotation timer; each station has a lrt, reset by T_Opr. d. ST: Synchronous bandwidth timer; preallocated bandwidth for synchronous frames. Initially, ST is assigned as a percentage oft_opr. The total synchronous bandwidth of all stations should not exceed T_Opr. e. LCT: Late count register; within each station the register is incremented each time TRT expires, and cleared when the token is received. f. THT: Token holding timer; if LCT is zero when the token arrives, the current value oftrt is placed into THT. Asynchronous frames may be transmitted only under this condition after synchronous frames are served. Upon receiving the token, the station carries out several processes: 1. Check LCT. If LCT is zero, the current TRT value is placed into THT, and lrt is reset by T_Opr. IfLCT is greater than zero, TRT is not reset. 2. Transmit synchronous frames until ST expires or no synchronous frames are available. 3. Transmit single priority asynchronous frames (if TRT was reset earlier) until THT expires or no asynchronous frames are available. For multi-priority asynchronous frames, serve the ones of higher priority first. THT is required to be greater than a threshold value T_Pri(n) before a frame of priority level n may be transmitted. If either THT or TRT expires while a station is transmitting, 867

4 the station completes the transmission of the current frame before forwarding the token. It is important to note that 1RT is enabled during the transmission of both synchronous and asynchronous frames. However, THT is enabled only during the transmission of asynchronous frames. The FDDI MAC protocol is modeled as shown in the flow chart in Figure 2[11 ]. data packet to the neigh boring node, without resetting the eottimer. When a station receives a SOT event, the event is passed to the downstream station. Upon receiving a data packet, the station examines the destination address, stripping the packet and placing it in the appropriate queue if a match is found, or forwarding the packet otherwise. LCT=O l LCT>O Ring states Under light traffic loading conditions, stations may not have packets available for transmission when the token arrives. As a result, upon arrival, the -token is forwarded immediately; the token traverses the ring continuously. To decrease event-processing time and improve simulation efficiency while maintaining ring functionality, two ring states are defined and implemented: normal and deterministic. In the normal state, the token is circulated sequentially by the stations, as defined in the FDDI protocol. Since we may determine the time between successive arrivals of the token at any node, and hence, the time at which a node will receive the token, the token passing process may be eliminated when there are no packet transmissions on the ring for one token rotation time. During this period the ring is said to be in the deterministic state. The token-passing process resumes, and the ring returns to the normal state when any station receives a self-generated packet for transmission. m;nrrab!ld t.ll)'llimc STapiul Cl'IDl)IL hmc 4. Distributed EMS 4.1 System Configuration In this study, we investigate the FDDI LAN technol-. ogy in terms of its ability to satisfy EMS performance requirements. Our base configuration, shown in Figure 3, Figure 2 FDDI MAC Protocol Model ~- ~ \I FF.P Packet transmission Packet transmission is modeled as occurring in two phases; the transmission of a SOT event, followed later by the data packet. We assume that the transmitting station possesses the token, a data packet from the appropriate queue is available, and if the data is asynchronous, the threshold criterion is satisfied. The station transmits a SOT event onto the ring; the end-of-transmission timer (eottimer) is set to the transmission time of the packet. Expiration of the eottimer signals that transmission has been completed and triggers the station to transmit the Console Conaole Console Figure 3 Base Configuration is basically the same as that used in [5], except 5 dis- 868

5 patcher consoles are assumed here. The front-end processor(fep) collects data from the remote terminal units(rtus). AGC and ED functions run in.the GEN processor. Security analysis functions, including state estimation, are performed in the NET processor. The DB processor contains the shared database management system. The Consoles are MMI processors. The configurations studied are generic models for a distributed EMS, and are not intended to represent any specific supplier's configuration. Other configurations, such as those using additional LANs and alternate highspeed interconnects, are also possible, but have not been included to keep the analysis generic. In addition to system configuration, certain user-settable parameters are also significant factors affecting FDDI-based EMS performance. The variables may be assigned by the system manager based on the traffic distribution and application requirements, and include T _ Opr, asynchronous priorities and thresholds. In this study we vary these values to evaluate their impact on system performance. An EMS has several stringent real-time requirements. For example, digital status data should be processed within 10 ms. These real-time requirements must be met even under the worst-case loading conditions, since the EMS still must be capable of performing its basic function, controlling the power system.. Our simulations focus on the worst-case, short-term behavior of the system under peak loading conditions, rather than the average performance over a longer observation period[6]. While a network may have acceptable average performance, it may fail to meet stringent real-time requirements. 4.2 Traffic Our study is based on EMS requirements typical of a medium-sized utility, with 50 dispatchable generator units, 500 buses in the internal network model, and 500 buses in the external network model. We assume that during peak conditions, study functions are suspended. The front-end processor polls the RTUs every 2 seconds, acquiring analog and digital status data which is sent to the SCADAdatabase processor(db). The state estimation(se) results from the n~twork processor(net) are sent to DB; this process is assumeg to occur every minute in the base case. The output from AGC and ED in the generation processor(gen) is also sent to DB. Alarm data is sent from DB to Consoles; this occurrence is assumed random, with a uniform distribution. The Consoles send alarm acknowledgments to DB. There is also data from DB to Consoles for updating the local database. Here, we assume that the picture data is stored in the local database of the Consoles, consistent with the client-server architecture of present-day fullgraphics MMI. Supervisory control requires data to be sent from the Consoles to FEP; this traffic is assumed random with a Poisson distribution. Other background traffic includes that from DB to GEN and DB to NEf. For the configuration where a dedicated workstation is used for state estimation, we assume that 150 kbytes are transmitted from SE to NET after each execution of SE. The packet rate and length of each type of traffic are given in Table 1. For traffic modeled as random, the packet rate is to be interpreted as its expected value. In this paper, we study EMS performance with both synchronous and asynchronous traffic; however, we focus primarily on the delay of real-time data, such as digital status data from FFP to DB. FEP 4000/scc (digital) (8) FEP SOO/sec ( andog) (12) NET GEN (AGC) DB Console NET GEN FEP l/min (!SOit) If]. ICC (lk) GEN l/s sec (ED) (800) DB Console 10-IS/scc l/8scc S/scc (100) (SOk) (100) S/sec l/soscc l/2ssec (100) (200) (100) Table 1 Traffic in Distributed EMS Study { Packet rate in packets per time interval ( packet length in bytes ) } S. Simulation Results A 30-second period is used to ensure that only one peak traffic load occurs when SE data are sent from NET to DB. Our observ~tion period is defined as a one-second period which contains the peak traffic load. The average and maximum delay values obtained ' during our observation period for the base case are shown in Table 2. Average Maximum SCADA data (FEP to DB) SE (NET to DB) ms 6.4 ms ms 13.6ms T_Opr = 8ms Table 2 for the Base Case 869

6 We define the frame delay as the duration of time since the frame was generated until it is received by the destination. The average and maximum delays are well within real-time requirements (10 ms for digital data and 100 ms for analog data). The digital delay distribution over the observation period for the base case is shown in Figure 4. ~lay (ms) 8.0 Figures 6 and 7 show the maximum delay of traffic from NEf to DB for different values of T_Opr and T_Pri, respectively. A comparison of these two graphs reveal that both T_Opr and T_Pri may be used to control the maximum response time of the system. It should be noted that T_Opr is a system-dependent variable while T_Pri varies from station to station and may be assigned to optimize EMS perfonnance. ~ NET >DB 4.0 Dd17 ( ) I.SO Tone(scc)... II 1J u T_OprV e ( ) Figure 6 Effect of T_Opr on Packet " Figure 4 Packet of Digital Data The peak delay is a result of the transmission of a large amount of data from NEf to DB. However, the maximum delay is always bounded above by T_Opr. This demonstrates FDDI's ability to guarantee response time by its bandwidth allocation scheme. We also examine the maximum delay of two types of traffic: one consisting of small packets with fixed interarrival times(fep to DB), and another, a large amount of data generated over a short period of time(nef to DB). For a fixed asynchronous threshold value, the delays are unaffected by increasing the traffic load from NEf to DB, and are in fact bounded by T_Pri. The results are shown in Figure 5. ( ).. 25JD IUD IOJll S.IO... u u u " T_PrlValH (ms) -- ~ NET >DB FF.l' >DB T_Opr:8111 Figure 7 Effect of T_Pri on Packet ll Del17 ~ (111)» If 151 4!1 "' -- NET >DB FEP >DB Packet Size ( kbjte) Figure 5 Maximum vs. Load We run the SE and AGC functions in a single processor and assign different priority levels to the corresponding traffic loads. The results are listed in Table 3. From this example we observe that the use of priorities can improve the perfonnance of time-stringent applications such as AGC. 870

7 -... Digital data AGC SE (FEP to DB) (GEN-> DB) (NET-> DB) Average ms 6.202ms ms Maximum ms ms ms T_Opr = 8 ms Table 3 SE and AGC in One Processor Next we investigate the effects of assigning different asynchronous thresholds to EMS applications running distributedly. We assume that SE and AGC, two applications running in separate processors, transmit large amounts of data to DB simultaneously. In the first case, the asynchronous priority thresholds of the generated traffic for both applications are set equal to zero ms. In the second case, we reduce the available asynchronous bandwidth for SE by setting its T_Pri to 7.5 ms; T_Pri for AGC is set to 4 ms. As shown in the results listed in Table 4, appropriate settings oft _Pri can significantly improve the perfonnance of time-stringent applications such as AGC. Average Maximum Case I Case II SE AGC SE AGC 8.1 ms 16.1 ms 40.8 ms 14.1 ms 21.9 ms 30.0 ms 52.8 ms 24.9 ms Case I: T_Opr = 8ms, T_Pri (SE)= 0 ms, T_pri(AGC) = 0 ms Case II; T_Opr = 8ms, T_Pri(SE) = 7.5ms, T_Pri(AGC) = 4 ms Table 4 with Different T_pri Values 6. Conclusion We have developed a LAN perfonnance simulation tool to evaluate the instantaneous network perfonnance of a FDDI-based distributed EMS under peak loading conditions. The FDDI network provides exceptional realtime performance for a distributed EMS under nonnal operating conditions and is capable of supporting traffic loads of much higher magnitude without performance degradation. We have shown the effects of varying several FDDI protocol parameters on system perfonnance. Future work includes enhancing the existing LAN models to simulate the behavior of distributed EMSs under various failure conditions, the development of additional LAN models, the further analysis of the relationship between MAC protocol parameters and ring perfonnance, and the tuning offddi network parameters to optimize FDDI-based EMS performance. Acknowledgment We thank Dr. Amitava Sen and Mr. Bob Bum of ABB Systems Control for providing the traffic data and performance requirements used in this paper. References [l] L.Murphy and F.F. Wu,' An Open Design Approach for Distributed Energy Management Systems', paper 92SM447-3 presented at IEEE/PES Summer Meeting, Seattle, WA, July 12-16, [2] G. Ockwell and R. Kreger, 'The Impact of Hardware on Open Architecture Design', paper 92WM159-4, presented at IEEE /PES Winter Meeting, New York, Jan , [3] R. Podmore, 'Criteria for Evaluating Open Energy Management Systems', paper 92WM157-8, presented at IEEE/PES Winter Meeting, New York, Jan , 1992.,~ [4] M. Kunugi, M. Yohda,etal, 'Performance Val~dation of a Functionally Distributed Energy Management Architecture', IEEE Trans. on Power Systems, Vol. 7, No. 2, pp , May [5] K. Kato and H.R. Fudeh, 'Performance Simulation of Distributed Energy Management Systems', IEEE Trans. on Power Systems, Vol. 7, No. 2, pp , May [6] S.M. Lun, F.F. Wu et al, 'Netplan: An Integrated Network Planning Environment', Int. Workshop on Modeling, Analysis, and Simulation of Computer and Telecomm. Systems, Jan [7] S.M. Lun, T. Lo, F. F. Wu et al. 'LANSIM and Its Applications to Distributed EMS', 1993 IEEE PICA Conference. [8] J. Buck, S. Ha, E.A. Lee, and D.G. Messerschmitt, 'Ptolemy: A Platform for Heterogeneous Simulation and Prototyping,' Proc. European Simulation Conf., Copenhagen, June [9] J. Walrand, Communication Networks: A First Course, Aksen Associates, [10] American National Standards Institute, 'FDDI Token Ring Media Access Control,' American National Standard, ASC X3T9.5, [11] R. Sankar and Y.Y. Yang, 'Performance Analysis of FDDI,' 14th Conf. of Local Computer Networks, pp , June

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing

More information

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall

IEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06

More information

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem

Medium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE

More information

1999, Scott F. Midkiff

1999, Scott F. Midkiff Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams

More information

FDDI by default supports Early Token Release. Below is the operation of FDDI ring.

FDDI by default supports Early Token Release. Below is the operation of FDDI ring. Lecture 9 Fault Tolerance FDDI is also built for fault tolerance. It is actually two networks, one going counter-clockwise and the other clockwise (as usually drawn). Normally only the primary links, i.e.

More information

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks

Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed

More information

FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC

FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC Kang G. Shin Real-time Computing Laboratory EECS Department The University of Michigan Ann Arbor, Michigan 48109 &in Zheng Mitsubishi

More information

Performance Analysis of FDDI. By Raj Jain

Performance Analysis of FDDI. By Raj Jain Performance Analysis of FDDI By Raj Jain This paper is a modified version of "Performance Analysis of FDDI Token Ring Networks: Effect of Parameters and Guidelines for Setting TTRT," by Raj Jain, published

More information

This formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go

This formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go Chapter 3 Problem 2 In Figure 3.43 of the text every node transmits R bps, and we assume that both network partitions consist of 1 N nodes. So the total traffic generated by the nodes 2 of each Ethernet

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

Integrating Information Systems: Technology, Strategy, and Organizational Factors

Integrating Information Systems: Technology, Strategy, and Organizational Factors MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

Lecture 9: Bridging & Switching"

Lecture 9: Bridging & Switching Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada

More information

FDDI. L26 - Fibre Distributed Data Interface (FDDI) L26 - Fibre Distributed Data Interface (FDDI) FDDI - Fiber Distributed Data Interface

FDDI. L26 - Fibre Distributed Data Interface (FDDI) L26 - Fibre Distributed Data Interface (FDDI) FDDI - Fiber Distributed Data Interface FDDI - Fiber Distributed Data Interface FDDI Fiber Distributed Data Interface Principles, Framing and Procedures set of standards defining a shared media 100 Mbps LAN (MAN) main topology: dual ring of

More information

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

Chapter 15 Local Area Network Overview

Chapter 15 Local Area Network Overview Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus

More information

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1

Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1 455 Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1 Assistant Professor, Department of Computer Science and Engineering Punjabi University

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

LAN Overview (part 2) Interconnecting LANs - Hubs

LAN Overview (part 2) Interconnecting LANs - Hubs LAN Overview (part 2) CSE 3213 Fall 2011 1 November 2011 Interconnecting LANs - Hubs active central element of star layout each station connected to hub by two UTP lines hub acts as a repeater limited

More information

Local Area Networks CONSYL Introduction to Computer Communications and Networks

Local Area Networks CONSYL Introduction to Computer Communications and Networks Local rea Networks 4/11/40 page 1 Faculty of Engineering, Kasetsart University Local rea Networks 1-1 LN characteristics confined within geographical area relatively high data rate under single management

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21! CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

Local Area Network(LAN)

Local Area Network(LAN) Local Area Network(LAN) A local area network (LAN) is a computer network that interconnects computers within a limited area. Example: a residence, school, laboratory, university campus,office building

More information

A comparison of DQDB and FDDI for the interconnection of LANs

A comparison of DQDB and FDDI for the interconnection of LANs Distributed Systems Engineering A comparison of DQDB and FDDI for the interconnection of LANs To cite this article: R Ahmad and F Halsall 1994 Distrib. Syst. Engng. 1 127 View the article online for updates

More information

Chapter 8 LAN Topologies

Chapter 8 LAN Topologies Chapter 8 LAN Topologies Point-to-Point Networks In a Point-to-Point network, each wire connects exactly two computers Point To Point Link Machine A Machine B Figure 1: Each line connects two machines

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan

More information

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

Chapter 11 in Stallings 10 th Edition

Chapter 11 in Stallings 10 th Edition Local Area Network Overview Chapter 11 in Stallings 10 th Edition CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network Page 1 of 6 1 Introduction This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency as well as provide some real world examples.

More information

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,

More information

CSE/EE 461 Section 2

CSE/EE 461 Section 2 CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Comparison Of Network Topologies For Optical Fiber Communication

Comparison Of Network Topologies For Optical Fiber Communication Comparison Of Network Topologies For Optical Fiber Communication Mr. Bhupesh Bhatia Department of Electronics and Communication, Ms. Ashima Bhatnagar Bhatia Department of Computer Science, Guru Prem Sukh

More information

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis

Computer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Chapter 6 Connecting Device

Chapter 6 Connecting Device Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks

More information

ISO IEC. INTERNATIONAL ISO/IEC STANDARD Information technology Fibre Distributed Data Interface (FDDI) Part 5: Hybrid Ring Control (HRC)

ISO IEC. INTERNATIONAL ISO/IEC STANDARD Information technology Fibre Distributed Data Interface (FDDI) Part 5: Hybrid Ring Control (HRC) INTERNATIONAL ISO/IEC STANDARD 9314-5 First edition 1995-02-01 Information technology Fibre Distributed Data Interface (FDDI) Part 5: Hybrid Ring Control (HRC) Technologies de l'information Interface de

More information

An optically transparent ultra high speed LAN-ring employing OTDM

An optically transparent ultra high speed LAN-ring employing OTDM An optically transparent ultra high speed LAN-ring employing OTDM K. Bengi, G. Remsak, H.R. van As Vienna University of Technology, Institute of Communication Networks Gusshausstrasse 25/388, A-1040 Vienna,

More information

DESIGN AND IMPLEMENTATION OF AN AVIONICS FULL DUPLEX ETHERNET (A664) DATA ACQUISITION SYSTEM

DESIGN AND IMPLEMENTATION OF AN AVIONICS FULL DUPLEX ETHERNET (A664) DATA ACQUISITION SYSTEM DESIGN AND IMPLEMENTATION OF AN AVIONICS FULL DUPLEX ETHERNET (A664) DATA ACQUISITION SYSTEM Alberto Perez, Technical Manager, Test & Integration John Hildin, Director of Network s John Roach, Vice President

More information

Network protocols and. network systems INTRODUCTION CHAPTER

Network protocols and. network systems INTRODUCTION CHAPTER CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more

More information

M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

CARRIER SENSE MULTIPLE ACCESS (CSMA):

CARRIER SENSE MULTIPLE ACCESS (CSMA): Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA

More information

Cabletron Systems FDDI TECHNOLOGY GUIDE

Cabletron Systems FDDI TECHNOLOGY GUIDE Cabletron Systems FDDI TECHNOLOGY GUIDE NOTICE Cabletron Systems reserves the right to make changes in specifications and other information contained in this document without prior notice. The reader should

More information

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure

The random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of

More information

I uc I I CS-MUX I. Real-Time Traffic in FDDI-I1 Packet Switching vs. Circuit Switching. 12B.l.l. Thomas Meuser. Peter Martini

I uc I I CS-MUX I. Real-Time Traffic in FDDI-I1 Packet Switching vs. Circuit Switching. 12B.l.l. Thomas Meuser. Peter Martini Real-Time Traffic in FDDI-I1 Packet Switching vs. Circuit Switching Peter Martini University of Paderbom Dept. of Math. and Comp. Science P.O. Box 1621; 4790 Paderbom; Germany e-mail: martini@uni-paderbom.de

More information

OSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Data Link Layer Network Fundamentals Chapter 7 Version 4.0 1 Objectives Explain the role of Data Link layer protocols in data transmission. Describe how the Data Link layer prepares data for transmission

More information

Good day. In the last lecture, we talked about various multiple access schemes and one of this set of schemes is token bus DQD etc.

Good day. In the last lecture, we talked about various multiple access schemes and one of this set of schemes is token bus DQD etc. Computer Networks Prof. Sujoy Ghosh Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 14 Token-Based MAC Good day. In the last lecture, we talked about various

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network FAQ 07/2014 Latency on a Switched Ethernet Network RUGGEDCOM Ethernet Switches & Routers http://support.automation.siemens.com/ww/view/en/94772587 This entry is from the Siemens Industry Online Support.

More information

A Token Based Distributed Algorithm for Medium Access in an Optical Ring Network

A Token Based Distributed Algorithm for Medium Access in an Optical Ring Network A Token Based Distributed Algorithm for Medium Access in an Optical Ring Network A. K. Turuk, R. Kumar, and R. Badrinath Department of Computer Science and Engineering Indian Institute of Technology Kharagpur

More information

Communicating over the Network

Communicating over the Network Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

DP83261 BMAC TM Device (FDDI Media Access Controller)

DP83261 BMAC TM Device (FDDI Media Access Controller) DP83261 BMAC TM Device (FDDI Media Access Controller) General Description The DP83261 BMAC device implements the Media Access Control (MAC) protocol for operation in an FDDI token ring The BMAC device

More information

An Empirical Performance Study of Connection Oriented Time Warp Parallel Simulation

An Empirical Performance Study of Connection Oriented Time Warp Parallel Simulation 230 The International Arab Journal of Information Technology, Vol. 6, No. 3, July 2009 An Empirical Performance Study of Connection Oriented Time Warp Parallel Simulation Ali Al-Humaimidi and Hussam Ramadan

More information

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering

McGill University - Faculty of Engineering Department of Electrical and Computer Engineering McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access

More information

Chapter 1. Computer Networks and the Internet

Chapter 1. Computer Networks and the Internet Chapter 1 Computer Networks and the Internet Internet traffic What s the Internet? (hardware) PC server wireless laptop cellular handheld wired links millions of connected computing devices: hosts = end

More information

PON Functional Requirements: Services and Performance

PON Functional Requirements: Services and Performance PON Functional Requirements: Services and Performance Dolors Sala Ajay Gummalla {dolors,ajay}@broadcom.com July 10-12, 2001 Ethernet in the First Mile Study Group 1 July 2001 Objective Outline the PON-specific

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

P D1.1 RPR OPNET Model User Guide

P D1.1 RPR OPNET Model User Guide P802.17 D1.1 RPR OPNET Model User Guide Revision Nov7 Yan F. Robichaud Mark Joseph Francisco Changcheng Huang Optical Networks Laboratory Carleton University 7 November 2002 Table Of Contents 0 Overview...1

More information

x25 remote-red x25 remote-red This command is no longer supported. Cisco IOS Wide-Area Networking Command Reference WR

x25 remote-red x25 remote-red This command is no longer supported. Cisco IOS Wide-Area Networking Command Reference WR x25 remote-red x25 remote-red This command is no longer supported. WR-553 x25 retry x25 retry To activate a secondary route while also retrying a failed primary route, use the x25 retry interface configuration

More information

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network

More information

Data always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send

Data always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send Token Ring Developed by IBM, adopted by IEEE as 802.5 standard Token rings latter extended to FDDI (Fiber Distributed Data Interface) and 802.17 (Resilient Packet Ring) standards Nodes connected in a ring

More information

Source-Route Bridging

Source-Route Bridging 25 CHAPTER Chapter Goals Describe when to use source-route bridging. Understand the difference between SRB and transparent bridging. Know the mechanism that end stations use to specify a source-route.

More information

Outline: Connecting Many Computers

Outline: Connecting Many Computers Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point

More information

Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs

Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs Hello and welcome to today s lecture on high speed

More information

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control

Chapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside

More information

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded Communication Roland Institute of Computer Engineering Vienna University of Technology 10. November 2010 Overview 1. Definition of a protocol 2. Protocol properties 3. Basic Principles 4. system communication

More information

Real-Time (Paradigms) (47)

Real-Time (Paradigms) (47) Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed

More information

TSIN01 Information Networks Lecture 3

TSIN01 Information Networks Lecture 3 TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information

More information

Basic Low Level Concepts

Basic Low Level Concepts Course Outline Basic Low Level Concepts Case Studies Operation through multiple switches: Topologies & Routing v Direct, indirect, regular, irregular Formal models and analysis for deadlock and livelock

More information

An Introduction to Network Simulation Using Ptolemy Software Tool

An Introduction to Network Simulation Using Ptolemy Software Tool An Introduction to Network Simulation Using Ptolemy Software Tool Nazy Alborz nalborz@sfu.ca Communication Networks Laboratory Simon Fraser University 1 Road Map: History Introduction to Ptolemy, its architecture

More information

ACLASS of users that has drawn much attention over the

ACLASS of users that has drawn much attention over the 296 IEEE TRANSACTIONS ON BROADCASTING, VOL. 56, NO. 3, SEPTEMBER 2010 Statistical Multiplexing of Upstream Transmissions in DOCSIS Cable Networks César Heyaime-Duvergé and Vasant K. Prabhu, Life Fellow,

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

2. LAN Topologies Gilbert Ndjatou Page 1

2. LAN Topologies Gilbert Ndjatou Page 1 2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers

More information

Switched LANs A Set of Local Area Networks Interconnected by Switches

Switched LANs A Set of Local Area Networks Interconnected by Switches Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this lab will help

More information

More on LANS. LAN Wiring, Interface

More on LANS. LAN Wiring, Interface More on LANS Chapters 10-11 LAN Wiring, Interface Mostly covered this material already NIC = Network Interface Card Separate processor, buffers incoming/outgoing data CPU might not be able to keep up network

More information

Local Area Networks. Lecture 17 Fall Token Ring and FDDI

Local Area Networks. Lecture 17 Fall Token Ring and FDDI Local Area Networks Lecture 17 Fall 2010 Token Ring and FDDI IEEE 802.5 Ring LAN Unidirectional ring network 4 Mbps and 16 Mbps on twisted pair Differential Manchester line coding Token passing protocol

More information

Layer 2 functionality bridging and switching

Layer 2 functionality bridging and switching Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How

More information

FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM

FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM 1 M. R. M. Rizk, Senior Member, IEEE, 2 M. I. Dessouky, 3 Sami A. El-Dolil, and 4 Mohammed

More information

Dynamic Scheduling Implementation to Synchronous Data Flow Graph in DSP Networks

Dynamic Scheduling Implementation to Synchronous Data Flow Graph in DSP Networks Dynamic Scheduling Implementation to Synchronous Data Flow Graph in DSP Networks ENSC 833 Project Final Report Zhenhua Xiao (Max) zxiao@sfu.ca April 22, 2001 Department of Engineering Science, Simon Fraser

More information

Different network topologies

Different network topologies Network Topology Network topology is the arrangement of the various elements of a communication network. It is the topological structure of a network and may be depicted physically or logically. Physical

More information

Token Ring/IEEE 802.5

Token Ring/IEEE 802.5 CHAPTER 9 Token /IEEE 802.5 Background The Token network was originally developed by IBM in the 1970s. It is still IBM s primary local area network (LAN) technology and is second only to Ethernet/IEEE

More information

CSE/EE 461 Wireless and Contention-Free Protocols

CSE/EE 461 Wireless and Contention-Free Protocols CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application

More information

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed

LANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among

More information