Simulation of FDDI-based Distributed Energy Management Systems
|
|
- Piers Sparks
- 6 years ago
- Views:
Transcription
1 Simulation of FDDI-based Distributed Energy Management Systems Tetiana Lo, Felix F. Wu, Shau-Ming Luo Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, California, USA Abstract We have developed a simulator to evaluate the instantaneous performance of FDDI-based Energy Management Systems(EMS) and show by example the ease of modifying operating parameters of the network configuration, and constructing various distributed EMS design alternatives. Hence, we demonstrate the flexibility of our simulation approach and FDDI's enormous potential as a backbone network for an energy management system. Keywords : SCADA/EMS hardware implementation and design, system architecture, networks, open systems, local area network performance evaluation, object-oriented simulation 1. Introduction Traditional EMS design is basically centralized: the configuration consists of centrally located processors that receive data from the entire power system. Recent advances in computer and communications technology have increased the number of options available to EMS designers. Microprocessors are capable of operating at increasingly higher rates, and computer networking has become more sophisticated, supporting a much wider range of applications. Together, these advances have resulted in higher-level performance and lower implementation costs. It is now technologically and economically feasible to distribute the processing load of an EMS among several processors, leading to the concept of a Distributed EMS[l]. A distributed EMS may possess several possible configurations. Currently, all proposed distributed EMS designs are local area network(lan)-based (i.e., [2],[3]). A prototype of a functionally distributed system was proposed and implemented to validate EMS performance in [ 4]. EMS functions were executed in separate workstations connected by a dual LAN. This approach allowed the evaluation of processing performance and the verification of system operation. However, prototyping has its limitations; it is difficult to consider many EMS configuration options in advance and implement future configurations to which the system could evolve. Using simulation methods is the most practical and effective way of evaluating EMS performance and comparing design options. In [5], a method for simulating a generic LAN-based EMS for a typical operating scenario in a control center was presented. The simulation results showed how the average performance of the distributed system could be predicted. However, while an EMS may have acceptable average performance, it still may fail to meet the real-time response requirements. These examples demonstrate the need for a new approach to EMS performance evaluation and design. At UC Berkeley an integrated planning and analysis environment for communication networks, Netplan, has been developed, based on object-oriented technology[6]. A LAN simulator, LANSIM, has been developed as one of the tools in Netplan. In this study we use LANSIM to examine a type of distributed EMS based on FDDI, a high-speed LAN. Specifically, we evaluate the instantaneous performance of this particular type of distributed EMS under heavily-loaded conditions, to observe if the EMS is still capable of satisfying its real-time requirements. Using our simulator, LANSIM, we show by example the ease of modifying operating parameters of the network configuration, and constructing various distributed EMS design alternatives. Hence, we demonstrate the flexibility of our simulation approach and FDDI's enormous potential as a backbone network for an energy management system. This paper is an extension of our previous work in the simulation of LAN-based distributed EMSs[7]. Whereas the objective of the previous paper was to compare EMS performance based on Ethernet and FDDI, the focus of the present paper is on the potential provided by FDDI to further improve EMS performance by tuning various network parameters. The paper is organized as follows. In Section 2 we introduce key characteristics of the FDDI network. The LAN and workstation models we developed using LAN SIM are proposed in Section 3. In Section 4 we present the simulation cases and discuss the results. We conclude in Section 5 and propose future directions. 2. LAN Simulator 2.1 Ptolemy Our LAN simulator, LANSIM, is based on the Ptolemy software environment, an object-oriented system developed at UC Berkeley[8]. Programmed in C++ 865
2 and running on a UNIX workstation, Ptolemy is a very flexible framework, supporting heterogeneous system specification, simulation, and design. Each model of computation is called a domain and consists of an extensible library of functional blocks. The basic unit of computation in Ptolemy is the block, represented graphically by an icon with terminals, corresponding to its portholes. A block may be atomic (star) or composite(galaxy). Applications are constructed graphically by connecting blocks. At runtime, a scheduler determines the order in which the blocks are executed. Data is exchanged between the blocks in the form of particles; discrete units which may be of several types: integer, real, complex, or a general structure such as a data packet. Blocks may have states, user-settable data structures which may be monitored from one execution to another. Ptolemy's strength and uniqueness lie in its capability of supporting the many aspects of communication system modeling and simulation and the ease with which new application-specific design environments may be built. 2.2 DE Domain Individual nodes of the FDDI network are modeled as stars in the discrete-event(de) domain. DE stars function as event-processing units which receive and process particles from the outside and generate output events after a user-given latency. A ring interconnection of stars constitute the local area network. A data packet, defined as one type of particle, has an associated time-stamp generated by the block producing the particle and represents an event corresponding to a change of system state. The DE scheduler processes events in chronological order until the global time reaches a user-specified "stop time." The global event queue contains particles currently in the system, sorted by time stamp. The scheduler retrieves an event from the head of the queue, the earliest event, and sends it to an input porthole of its destination block. When a new event appears at the input portholes of a star, the scheduler retrieves and sends all other simultaneous events destined to the same star. The star is then executed(fired). After execution, events generated at the output portholes, i.e., packets to be transmitted to another station, are placed in the global event queue. The scheduler repeats this retrieving and firing process until the given terminating condition is met. 2.3 Station Model A workstation model has been developed for the simulation of a distributed EMS, as shown in Figure 1. We model an individual FDDI station as possessing two layers: the traffic generator(upper) and the medium access control(mac) layer(lower). Upon receiving a traffic generator protocol data unit(pdu), the MAC layer appends header and control fields, and pads the resulting MAC Pdu, if necessary, to meet the minimum packet size requirement. The packet is then placed in the appropriate queue, a star obtained from the Ptolemy library which accumulates packets in a finite capacity FIFO queue and produces outputs on demand, and awaits transmission onto the medium.,... ~.~~~... ~ ~ ---~~~-.~- ~ ~ I ealdldly... ~ ,-... ~... l Figure l Station Model The receiver and traffic generator are peer entities. The receiver accumulates and processes Pdus produced by all traffic generators and passes them to the report generators. The traffic generator in each station utilizes the adjoining traffic models to generate messages of desired lengths and distributions, uniform and exponential, for example. A message is represented by a data structure with several information fields including length, timestamp, source and destination addresses, and type of traffic. The user may build a particular station, a generation processor(gen), for example, by first selecting a LAN technology(mac layer) from the Protocol Library, and various applications such as economic dispatch(ed) and automatic generation control(agc) from the Application Library. Outputs may be chosen then for report generation or statistical information, such as delay calculations and distributions, from the Report Library. Finally, stations are interconnected to form a LAN. A simulation case may be constructed based on the particular configuration of the LAN-based EMS we wish to simulate. This includes specifying the number of workstations, functions distributed in each station, and 'the communication protocol operating in the system. Individual workstation models may be built by selecting blocks from the class libraries. Each station model is defined as a composite block and represented as an icon in the LAN SIM user interface. These icons are connected graphically according to the system topology. The simulation case is then executed. Parameters such as execution frequency of a function and propagation delays in the 866
3 communication protocol may be easily entered or changed by using pop-up menus at runtime. Alternative EMS configurations may be implemented by creating and connecting additional station models. For example, the communication protocol can be changed by replacing the original protocol block with an alternative block from the protocol library in each station model. The distribution of the EMS functions can also be varied: to study the effects of executing SE in a separate processor, an additional station is created, containing the the newly-defined SE traffic model. New EMS functions and communication technologies may be incorporated by developing models for them in the LANSIM class libraries. In our model the transmission media and nodes are assumed error-free; packets are transmitted and arrive at destinations without error. Furthermore, it is assumed that no node failures or ring malfunctions occur, and the network operates at a fixed transmission rate of 100 Mbps. 3. FDDI Modeling FDDI is a 100 Mbps local area network having an optical fiber dual ring topology and using a timed token rotation protocol[9]. The FDDI Standard complies with the OSI Reference Model, with the network providing services specified by the Data Link Layer and Physical Layer. The MAC schedules and performs data transfers on the ring. A node gains access to the medium to begin transmission by capturing the token, a unique frame which is circulated sequentially. Immediately after completing transmission, the node issues and forwards a new token. Each node repeats the frames it receives to its downstream neighbor. If the destination address of a frame matches that of the MAC's, and no error is indicated, the frame is copied into a local buffer. The MAC modifies indicator symbols as the frame is repeated to indicate the detection of an error, address recognition, and the copying of the frame. Frames returning to the originating node are stripped by not being retransmitted. Two modes of transmission are supported by FDDI: synchronous and asynchronous. Synchronous traffic utilizes a preallocated bandwidth and has a guaranteed maximum response time. This traffic may be transmitted by a node whenever it receives the token. Asynchronous traffic bandwidth is allocated dynamically from the remaining unused and unallocated bandwidth. Transmission is not allowed if the time since receiving the last token exceeds the operational target token rotation time (T_Opr), the expected token rotation time; a value negotiated during ring initialization. Eight asynchronous priority levels are provided within each node. A single FDDI ring is modeled based on the ANSI Standard for FDDI[IO]. Queues in each station distinguish between traffic received from the ring and that generated by the station itself, and separate synchronous and asynchronous data. The user assigns the address, synchronous bandwidth, T_Opr, and eight asynchronous priority thresholds(t _Pri) for each node. Initially, it is assumed that an arbitrarily chosen node possesses the token. The token is a fixed-length frame generated by the MAC layer of the station sending the token, uniquely identified by its control field bits. During the first token rotation, all node late count registers are set to I; only synchronous data may be transmitted. Thereafter, normal ring operation ensues. MAC protocol Several important parameters used in the timed token rotation protocol are defined below: a. TTRT: Target-token rotation time; a station-dependent value; the expected time between successive receptions of the token. b. T_Opr: Operating target token rotation time; the lowest of all station TTRT values is selected as T_Opr of the system. c. lrt: Token rotation timer; each station has a lrt, reset by T_Opr. d. ST: Synchronous bandwidth timer; preallocated bandwidth for synchronous frames. Initially, ST is assigned as a percentage oft_opr. The total synchronous bandwidth of all stations should not exceed T_Opr. e. LCT: Late count register; within each station the register is incremented each time TRT expires, and cleared when the token is received. f. THT: Token holding timer; if LCT is zero when the token arrives, the current value oftrt is placed into THT. Asynchronous frames may be transmitted only under this condition after synchronous frames are served. Upon receiving the token, the station carries out several processes: 1. Check LCT. If LCT is zero, the current TRT value is placed into THT, and lrt is reset by T_Opr. IfLCT is greater than zero, TRT is not reset. 2. Transmit synchronous frames until ST expires or no synchronous frames are available. 3. Transmit single priority asynchronous frames (if TRT was reset earlier) until THT expires or no asynchronous frames are available. For multi-priority asynchronous frames, serve the ones of higher priority first. THT is required to be greater than a threshold value T_Pri(n) before a frame of priority level n may be transmitted. If either THT or TRT expires while a station is transmitting, 867
4 the station completes the transmission of the current frame before forwarding the token. It is important to note that 1RT is enabled during the transmission of both synchronous and asynchronous frames. However, THT is enabled only during the transmission of asynchronous frames. The FDDI MAC protocol is modeled as shown in the flow chart in Figure 2[11 ]. data packet to the neigh boring node, without resetting the eottimer. When a station receives a SOT event, the event is passed to the downstream station. Upon receiving a data packet, the station examines the destination address, stripping the packet and placing it in the appropriate queue if a match is found, or forwarding the packet otherwise. LCT=O l LCT>O Ring states Under light traffic loading conditions, stations may not have packets available for transmission when the token arrives. As a result, upon arrival, the -token is forwarded immediately; the token traverses the ring continuously. To decrease event-processing time and improve simulation efficiency while maintaining ring functionality, two ring states are defined and implemented: normal and deterministic. In the normal state, the token is circulated sequentially by the stations, as defined in the FDDI protocol. Since we may determine the time between successive arrivals of the token at any node, and hence, the time at which a node will receive the token, the token passing process may be eliminated when there are no packet transmissions on the ring for one token rotation time. During this period the ring is said to be in the deterministic state. The token-passing process resumes, and the ring returns to the normal state when any station receives a self-generated packet for transmission. m;nrrab!ld t.ll)'llimc STapiul Cl'IDl)IL hmc 4. Distributed EMS 4.1 System Configuration In this study, we investigate the FDDI LAN technol-. ogy in terms of its ability to satisfy EMS performance requirements. Our base configuration, shown in Figure 3, Figure 2 FDDI MAC Protocol Model ~- ~ \I FF.P Packet transmission Packet transmission is modeled as occurring in two phases; the transmission of a SOT event, followed later by the data packet. We assume that the transmitting station possesses the token, a data packet from the appropriate queue is available, and if the data is asynchronous, the threshold criterion is satisfied. The station transmits a SOT event onto the ring; the end-of-transmission timer (eottimer) is set to the transmission time of the packet. Expiration of the eottimer signals that transmission has been completed and triggers the station to transmit the Console Conaole Console Figure 3 Base Configuration is basically the same as that used in [5], except 5 dis- 868
5 patcher consoles are assumed here. The front-end processor(fep) collects data from the remote terminal units(rtus). AGC and ED functions run in.the GEN processor. Security analysis functions, including state estimation, are performed in the NET processor. The DB processor contains the shared database management system. The Consoles are MMI processors. The configurations studied are generic models for a distributed EMS, and are not intended to represent any specific supplier's configuration. Other configurations, such as those using additional LANs and alternate highspeed interconnects, are also possible, but have not been included to keep the analysis generic. In addition to system configuration, certain user-settable parameters are also significant factors affecting FDDI-based EMS performance. The variables may be assigned by the system manager based on the traffic distribution and application requirements, and include T _ Opr, asynchronous priorities and thresholds. In this study we vary these values to evaluate their impact on system performance. An EMS has several stringent real-time requirements. For example, digital status data should be processed within 10 ms. These real-time requirements must be met even under the worst-case loading conditions, since the EMS still must be capable of performing its basic function, controlling the power system.. Our simulations focus on the worst-case, short-term behavior of the system under peak loading conditions, rather than the average performance over a longer observation period[6]. While a network may have acceptable average performance, it may fail to meet stringent real-time requirements. 4.2 Traffic Our study is based on EMS requirements typical of a medium-sized utility, with 50 dispatchable generator units, 500 buses in the internal network model, and 500 buses in the external network model. We assume that during peak conditions, study functions are suspended. The front-end processor polls the RTUs every 2 seconds, acquiring analog and digital status data which is sent to the SCADAdatabase processor(db). The state estimation(se) results from the n~twork processor(net) are sent to DB; this process is assumeg to occur every minute in the base case. The output from AGC and ED in the generation processor(gen) is also sent to DB. Alarm data is sent from DB to Consoles; this occurrence is assumed random, with a uniform distribution. The Consoles send alarm acknowledgments to DB. There is also data from DB to Consoles for updating the local database. Here, we assume that the picture data is stored in the local database of the Consoles, consistent with the client-server architecture of present-day fullgraphics MMI. Supervisory control requires data to be sent from the Consoles to FEP; this traffic is assumed random with a Poisson distribution. Other background traffic includes that from DB to GEN and DB to NEf. For the configuration where a dedicated workstation is used for state estimation, we assume that 150 kbytes are transmitted from SE to NET after each execution of SE. The packet rate and length of each type of traffic are given in Table 1. For traffic modeled as random, the packet rate is to be interpreted as its expected value. In this paper, we study EMS performance with both synchronous and asynchronous traffic; however, we focus primarily on the delay of real-time data, such as digital status data from FFP to DB. FEP 4000/scc (digital) (8) FEP SOO/sec ( andog) (12) NET GEN (AGC) DB Console NET GEN FEP l/min (!SOit) If]. ICC (lk) GEN l/s sec (ED) (800) DB Console 10-IS/scc l/8scc S/scc (100) (SOk) (100) S/sec l/soscc l/2ssec (100) (200) (100) Table 1 Traffic in Distributed EMS Study { Packet rate in packets per time interval ( packet length in bytes ) } S. Simulation Results A 30-second period is used to ensure that only one peak traffic load occurs when SE data are sent from NET to DB. Our observ~tion period is defined as a one-second period which contains the peak traffic load. The average and maximum delay values obtained ' during our observation period for the base case are shown in Table 2. Average Maximum SCADA data (FEP to DB) SE (NET to DB) ms 6.4 ms ms 13.6ms T_Opr = 8ms Table 2 for the Base Case 869
6 We define the frame delay as the duration of time since the frame was generated until it is received by the destination. The average and maximum delays are well within real-time requirements (10 ms for digital data and 100 ms for analog data). The digital delay distribution over the observation period for the base case is shown in Figure 4. ~lay (ms) 8.0 Figures 6 and 7 show the maximum delay of traffic from NEf to DB for different values of T_Opr and T_Pri, respectively. A comparison of these two graphs reveal that both T_Opr and T_Pri may be used to control the maximum response time of the system. It should be noted that T_Opr is a system-dependent variable while T_Pri varies from station to station and may be assigned to optimize EMS perfonnance. ~ NET >DB 4.0 Dd17 ( ) I.SO Tone(scc)... II 1J u T_OprV e ( ) Figure 6 Effect of T_Opr on Packet " Figure 4 Packet of Digital Data The peak delay is a result of the transmission of a large amount of data from NEf to DB. However, the maximum delay is always bounded above by T_Opr. This demonstrates FDDI's ability to guarantee response time by its bandwidth allocation scheme. We also examine the maximum delay of two types of traffic: one consisting of small packets with fixed interarrival times(fep to DB), and another, a large amount of data generated over a short period of time(nef to DB). For a fixed asynchronous threshold value, the delays are unaffected by increasing the traffic load from NEf to DB, and are in fact bounded by T_Pri. The results are shown in Figure 5. ( ).. 25JD IUD IOJll S.IO... u u u " T_PrlValH (ms) -- ~ NET >DB FF.l' >DB T_Opr:8111 Figure 7 Effect of T_Pri on Packet ll Del17 ~ (111)» If 151 4!1 "' -- NET >DB FEP >DB Packet Size ( kbjte) Figure 5 Maximum vs. Load We run the SE and AGC functions in a single processor and assign different priority levels to the corresponding traffic loads. The results are listed in Table 3. From this example we observe that the use of priorities can improve the perfonnance of time-stringent applications such as AGC. 870
7 -... Digital data AGC SE (FEP to DB) (GEN-> DB) (NET-> DB) Average ms 6.202ms ms Maximum ms ms ms T_Opr = 8 ms Table 3 SE and AGC in One Processor Next we investigate the effects of assigning different asynchronous thresholds to EMS applications running distributedly. We assume that SE and AGC, two applications running in separate processors, transmit large amounts of data to DB simultaneously. In the first case, the asynchronous priority thresholds of the generated traffic for both applications are set equal to zero ms. In the second case, we reduce the available asynchronous bandwidth for SE by setting its T_Pri to 7.5 ms; T_Pri for AGC is set to 4 ms. As shown in the results listed in Table 4, appropriate settings oft _Pri can significantly improve the perfonnance of time-stringent applications such as AGC. Average Maximum Case I Case II SE AGC SE AGC 8.1 ms 16.1 ms 40.8 ms 14.1 ms 21.9 ms 30.0 ms 52.8 ms 24.9 ms Case I: T_Opr = 8ms, T_Pri (SE)= 0 ms, T_pri(AGC) = 0 ms Case II; T_Opr = 8ms, T_Pri(SE) = 7.5ms, T_Pri(AGC) = 4 ms Table 4 with Different T_pri Values 6. Conclusion We have developed a LAN perfonnance simulation tool to evaluate the instantaneous network perfonnance of a FDDI-based distributed EMS under peak loading conditions. The FDDI network provides exceptional realtime performance for a distributed EMS under nonnal operating conditions and is capable of supporting traffic loads of much higher magnitude without performance degradation. We have shown the effects of varying several FDDI protocol parameters on system perfonnance. Future work includes enhancing the existing LAN models to simulate the behavior of distributed EMSs under various failure conditions, the development of additional LAN models, the further analysis of the relationship between MAC protocol parameters and ring perfonnance, and the tuning offddi network parameters to optimize FDDI-based EMS performance. Acknowledgment We thank Dr. Amitava Sen and Mr. Bob Bum of ABB Systems Control for providing the traffic data and performance requirements used in this paper. References [l] L.Murphy and F.F. Wu,' An Open Design Approach for Distributed Energy Management Systems', paper 92SM447-3 presented at IEEE/PES Summer Meeting, Seattle, WA, July 12-16, [2] G. Ockwell and R. Kreger, 'The Impact of Hardware on Open Architecture Design', paper 92WM159-4, presented at IEEE /PES Winter Meeting, New York, Jan , [3] R. Podmore, 'Criteria for Evaluating Open Energy Management Systems', paper 92WM157-8, presented at IEEE/PES Winter Meeting, New York, Jan , 1992.,~ [4] M. Kunugi, M. Yohda,etal, 'Performance Val~dation of a Functionally Distributed Energy Management Architecture', IEEE Trans. on Power Systems, Vol. 7, No. 2, pp , May [5] K. Kato and H.R. Fudeh, 'Performance Simulation of Distributed Energy Management Systems', IEEE Trans. on Power Systems, Vol. 7, No. 2, pp , May [6] S.M. Lun, F.F. Wu et al, 'Netplan: An Integrated Network Planning Environment', Int. Workshop on Modeling, Analysis, and Simulation of Computer and Telecomm. Systems, Jan [7] S.M. Lun, T. Lo, F. F. Wu et al. 'LANSIM and Its Applications to Distributed EMS', 1993 IEEE PICA Conference. [8] J. Buck, S. Ha, E.A. Lee, and D.G. Messerschmitt, 'Ptolemy: A Platform for Heterogeneous Simulation and Prototyping,' Proc. European Simulation Conf., Copenhagen, June [9] J. Walrand, Communication Networks: A First Course, Aksen Associates, [10] American National Standards Institute, 'FDDI Token Ring Media Access Control,' American National Standard, ASC X3T9.5, [11] R. Sankar and Y.Y. Yang, 'Performance Analysis of FDDI,' 14th Conf. of Local Computer Networks, pp , June
ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII
ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More information1999, Scott F. Midkiff
Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams
More informationFDDI by default supports Early Token Release. Below is the operation of FDDI ring.
Lecture 9 Fault Tolerance FDDI is also built for fault tolerance. It is actually two networks, one going counter-clockwise and the other clockwise (as usually drawn). Normally only the primary links, i.e.
More informationModelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks
Modelling a Video-on-Demand Service over an Interconnected LAN and ATM Networks Kok Soon Thia and Chen Khong Tham Dept of Electrical Engineering National University of Singapore Tel: (65) 874-5095 Fax:
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed
More informationFDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC
FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC Kang G. Shin Real-time Computing Laboratory EECS Department The University of Michigan Ann Arbor, Michigan 48109 &in Zheng Mitsubishi
More informationPerformance Analysis of FDDI. By Raj Jain
Performance Analysis of FDDI By Raj Jain This paper is a modified version of "Performance Analysis of FDDI Token Ring Networks: Effect of Parameters and Guidelines for Setting TTRT," by Raj Jain, published
More informationThis formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go
Chapter 3 Problem 2 In Figure 3.43 of the text every node transmits R bps, and we assume that both network partitions consist of 1 N nodes. So the total traffic generated by the nodes 2 of each Ethernet
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationIntegrating Information Systems: Technology, Strategy, and Organizational Factors
MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications
More informationCH : 15 LOCAL AREA NETWORK OVERVIEW
CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating
More informationLecture 9: Bridging & Switching"
Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link
More informationSIMULATION OF PACKET DATA NETWORKS USING OPNET
SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada
More informationFDDI. L26 - Fibre Distributed Data Interface (FDDI) L26 - Fibre Distributed Data Interface (FDDI) FDDI - Fiber Distributed Data Interface
FDDI - Fiber Distributed Data Interface FDDI Fiber Distributed Data Interface Principles, Framing and Procedures set of standards defining a shared media 100 Mbps LAN (MAN) main topology: dual ring of
More informationToken Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1
Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationContent. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control
Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media
More informationLocal Area Network Overview
Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and
More informationLecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren
Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits
More informationChapter 15 Local Area Network Overview
Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationIntroduction to LAN Protocols
CHAPTER 2 Introduction to LAN Protocols This chapter introduces the various media-access methods, transmission methods, topologies, and devices used in a local area network (LAN). Topics addressed focus
More informationTest Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair
Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/
More informationThroughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1
455 Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1 Assistant Professor, Department of Computer Science and Engineering Punjabi University
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationIntroduction to LAN Protocols
CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various
More informationLAN Overview (part 2) Interconnecting LANs - Hubs
LAN Overview (part 2) CSE 3213 Fall 2011 1 November 2011 Interconnecting LANs - Hubs active central element of star layout each station connected to hub by two UTP lines hub acts as a repeater limited
More informationLocal Area Networks CONSYL Introduction to Computer Communications and Networks
Local rea Networks 4/11/40 page 1 Faculty of Engineering, Kasetsart University Local rea Networks 1-1 LN characteristics confined within geographical area relatively high data rate under single management
More informationCSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!
CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also
More informationBridging and Switching Basics
CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device
More informationLocal Area Network(LAN)
Local Area Network(LAN) A local area network (LAN) is a computer network that interconnects computers within a limited area. Example: a residence, school, laboratory, university campus,office building
More informationA comparison of DQDB and FDDI for the interconnection of LANs
Distributed Systems Engineering A comparison of DQDB and FDDI for the interconnection of LANs To cite this article: R Ahmad and F Halsall 1994 Distrib. Syst. Engng. 1 127 View the article online for updates
More informationChapter 8 LAN Topologies
Chapter 8 LAN Topologies Point-to-Point Networks In a Point-to-Point network, each wire connects exactly two computers Point To Point Link Machine A Machine B Figure 1: Each line connects two machines
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationDesign and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan
Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan
More informationPerformance of Multihop Communications Using Logical Topologies on Optical Torus Networks
Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks X. Yuan, R. Melhem and R. Gupta Department of Computer Science University of Pittsburgh Pittsburgh, PA 156 fxyuan,
More information2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING
UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1
More informationChapter 11 in Stallings 10 th Edition
Local Area Network Overview Chapter 11 in Stallings 10 th Edition CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large
More informationLatency on a Switched Ethernet Network
Page 1 of 6 1 Introduction This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency as well as provide some real world examples.
More informationTCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS
TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,
More informationCSE/EE 461 Section 2
CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan
More informationCCNA Exploration1 Chapter 7: OSI Data Link Layer
CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationComparison Of Network Topologies For Optical Fiber Communication
Comparison Of Network Topologies For Optical Fiber Communication Mr. Bhupesh Bhatia Department of Electronics and Communication, Ms. Ashima Bhatnagar Bhatia Department of Computer Science, Guru Prem Sukh
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationChapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet
Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties
More informationChapter 6 Connecting Device
Computer Networks Al-Mustansiryah University Elec. Eng. Department College of Engineering Fourth Year Class Chapter 6 Connecting Device 6.1 Functions of network devices Separating (connecting) networks
More informationISO IEC. INTERNATIONAL ISO/IEC STANDARD Information technology Fibre Distributed Data Interface (FDDI) Part 5: Hybrid Ring Control (HRC)
INTERNATIONAL ISO/IEC STANDARD 9314-5 First edition 1995-02-01 Information technology Fibre Distributed Data Interface (FDDI) Part 5: Hybrid Ring Control (HRC) Technologies de l'information Interface de
More informationAn optically transparent ultra high speed LAN-ring employing OTDM
An optically transparent ultra high speed LAN-ring employing OTDM K. Bengi, G. Remsak, H.R. van As Vienna University of Technology, Institute of Communication Networks Gusshausstrasse 25/388, A-1040 Vienna,
More informationDESIGN AND IMPLEMENTATION OF AN AVIONICS FULL DUPLEX ETHERNET (A664) DATA ACQUISITION SYSTEM
DESIGN AND IMPLEMENTATION OF AN AVIONICS FULL DUPLEX ETHERNET (A664) DATA ACQUISITION SYSTEM Alberto Perez, Technical Manager, Test & Integration John Hildin, Director of Network s John Roach, Vice President
More informationNetwork protocols and. network systems INTRODUCTION CHAPTER
CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more
More informationM242 COMPUTER NETWORS AND SECURITY
M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationCabletron Systems FDDI TECHNOLOGY GUIDE
Cabletron Systems FDDI TECHNOLOGY GUIDE NOTICE Cabletron Systems reserves the right to make changes in specifications and other information contained in this document without prior notice. The reader should
More informationThe random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure
Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of
More informationI uc I I CS-MUX I. Real-Time Traffic in FDDI-I1 Packet Switching vs. Circuit Switching. 12B.l.l. Thomas Meuser. Peter Martini
Real-Time Traffic in FDDI-I1 Packet Switching vs. Circuit Switching Peter Martini University of Paderbom Dept. of Math. and Comp. Science P.O. Box 1621; 4790 Paderbom; Germany e-mail: martini@uni-paderbom.de
More informationOSI Data Link Layer. Network Fundamentals Chapter 7. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1
OSI Data Link Layer Network Fundamentals Chapter 7 Version 4.0 1 Objectives Explain the role of Data Link layer protocols in data transmission. Describe how the Data Link layer prepares data for transmission
More informationGood day. In the last lecture, we talked about various multiple access schemes and one of this set of schemes is token bus DQD etc.
Computer Networks Prof. Sujoy Ghosh Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 14 Token-Based MAC Good day. In the last lecture, we talked about various
More informationLatency on a Switched Ethernet Network
FAQ 07/2014 Latency on a Switched Ethernet Network RUGGEDCOM Ethernet Switches & Routers http://support.automation.siemens.com/ww/view/en/94772587 This entry is from the Siemens Industry Online Support.
More informationA Token Based Distributed Algorithm for Medium Access in an Optical Ring Network
A Token Based Distributed Algorithm for Medium Access in an Optical Ring Network A. K. Turuk, R. Kumar, and R. Badrinath Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
More informationCommunicating over the Network
Communicating over the Network Network Fundamentals Chapter 2 Version 4.0 1 Network Structure The elements of communication 3 common elements of communication Message source people/electronic devices need
More informationChapter 4 NETWORK HARDWARE
Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationDP83261 BMAC TM Device (FDDI Media Access Controller)
DP83261 BMAC TM Device (FDDI Media Access Controller) General Description The DP83261 BMAC device implements the Media Access Control (MAC) protocol for operation in an FDDI token ring The BMAC device
More informationAn Empirical Performance Study of Connection Oriented Time Warp Parallel Simulation
230 The International Arab Journal of Information Technology, Vol. 6, No. 3, July 2009 An Empirical Performance Study of Connection Oriented Time Warp Parallel Simulation Ali Al-Humaimidi and Hussam Ramadan
More informationMcGill University - Faculty of Engineering Department of Electrical and Computer Engineering
McGill University - Faculty of Engineering Department of Electrical and Computer Engineering ECSE 494 Telecommunication Networks Lab Prof. M. Coates Winter 2003 Experiment 5: LAN Operation, Multiple Access
More informationChapter 1. Computer Networks and the Internet
Chapter 1 Computer Networks and the Internet Internet traffic What s the Internet? (hardware) PC server wireless laptop cellular handheld wired links millions of connected computing devices: hosts = end
More informationPON Functional Requirements: Services and Performance
PON Functional Requirements: Services and Performance Dolors Sala Ajay Gummalla {dolors,ajay}@broadcom.com July 10-12, 2001 Ethernet in the First Mile Study Group 1 July 2001 Objective Outline the PON-specific
More informationChapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of
More informationP D1.1 RPR OPNET Model User Guide
P802.17 D1.1 RPR OPNET Model User Guide Revision Nov7 Yan F. Robichaud Mark Joseph Francisco Changcheng Huang Optical Networks Laboratory Carleton University 7 November 2002 Table Of Contents 0 Overview...1
More informationx25 remote-red x25 remote-red This command is no longer supported. Cisco IOS Wide-Area Networking Command Reference WR
x25 remote-red x25 remote-red This command is no longer supported. WR-553 x25 retry x25 retry To activate a secondary route while also retrying a failed primary route, use the x25 retry interface configuration
More informationInternetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on
CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network
More informationData always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send
Token Ring Developed by IBM, adopted by IEEE as 802.5 standard Token rings latter extended to FDDI (Fiber Distributed Data Interface) and 802.17 (Resilient Packet Ring) standards Nodes connected in a ring
More informationSource-Route Bridging
25 CHAPTER Chapter Goals Describe when to use source-route bridging. Understand the difference between SRB and transparent bridging. Know the mechanism that end stations use to specify a source-route.
More informationOutline: Connecting Many Computers
Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point
More informationData Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs
Data Communication Prof. A. Pal Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture # 29 High Speed LANs Hello and welcome to today s lecture on high speed
More informationChapter 6. What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control
Chapter 6 What happens at the Transport Layer? Services provided Transport protocols UDP TCP Flow control Congestion control OSI Model Hybrid Model Software outside the operating system Software inside
More informationSystems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded
Communication Roland Institute of Computer Engineering Vienna University of Technology 10. November 2010 Overview 1. Definition of a protocol 2. Protocol properties 3. Basic Principles 4. system communication
More informationReal-Time (Paradigms) (47)
Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed
More informationTSIN01 Information Networks Lecture 3
TSIN01 Information Networks Lecture 3 Danyo Danev Division of Communication Systems Department of Electrical Engineering Linköping University, Sweden September 10 th, 2018 Danyo Danev TSIN01 Information
More informationBasic Low Level Concepts
Course Outline Basic Low Level Concepts Case Studies Operation through multiple switches: Topologies & Routing v Direct, indirect, regular, irregular Formal models and analysis for deadlock and livelock
More informationAn Introduction to Network Simulation Using Ptolemy Software Tool
An Introduction to Network Simulation Using Ptolemy Software Tool Nazy Alborz nalborz@sfu.ca Communication Networks Laboratory Simon Fraser University 1 Road Map: History Introduction to Ptolemy, its architecture
More informationACLASS of users that has drawn much attention over the
296 IEEE TRANSACTIONS ON BROADCASTING, VOL. 56, NO. 3, SEPTEMBER 2010 Statistical Multiplexing of Upstream Transmissions in DOCSIS Cable Networks César Heyaime-Duvergé and Vasant K. Prabhu, Life Fellow,
More informationCCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115
CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal
More information2. LAN Topologies Gilbert Ndjatou Page 1
2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers
More informationSwitched LANs A Set of Local Area Networks Interconnected by Switches
Switched LANs A Set of Local Area Networks Interconnected by Switches Objective This lab is designed to demonstrate the implementation of switched local area networks. The simulation in this lab will help
More informationMore on LANS. LAN Wiring, Interface
More on LANS Chapters 10-11 LAN Wiring, Interface Mostly covered this material already NIC = Network Interface Card Separate processor, buffers incoming/outgoing data CPU might not be able to keep up network
More informationLocal Area Networks. Lecture 17 Fall Token Ring and FDDI
Local Area Networks Lecture 17 Fall 2010 Token Ring and FDDI IEEE 802.5 Ring LAN Unidirectional ring network 4 Mbps and 16 Mbps on twisted pair Differential Manchester line coding Token passing protocol
More informationLayer 2 functionality bridging and switching
Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How
More informationFAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM
FAIR DELAY OPTIMIZATION-BASED RESOURCE ALLOCATION ALGORITHM FOR VIDEO TRAFFIC OVER WIRELESS MULTIMEDIA SYSTEM 1 M. R. M. Rizk, Senior Member, IEEE, 2 M. I. Dessouky, 3 Sami A. El-Dolil, and 4 Mohammed
More informationDynamic Scheduling Implementation to Synchronous Data Flow Graph in DSP Networks
Dynamic Scheduling Implementation to Synchronous Data Flow Graph in DSP Networks ENSC 833 Project Final Report Zhenhua Xiao (Max) zxiao@sfu.ca April 22, 2001 Department of Engineering Science, Simon Fraser
More informationDifferent network topologies
Network Topology Network topology is the arrangement of the various elements of a communication network. It is the topological structure of a network and may be depicted physically or logically. Physical
More informationToken Ring/IEEE 802.5
CHAPTER 9 Token /IEEE 802.5 Background The Token network was originally developed by IBM in the 1970s. It is still IBM s primary local area network (LAN) technology and is second only to Ethernet/IEEE
More informationCSE/EE 461 Wireless and Contention-Free Protocols
CSE/EE 461 Wireless and Contention-Free Protocols Last Time The multi-access problem Medium Access Control (MAC) sublayer Random access protocols: Aloha CSMA variants Classic Ethernet (CSMA/CD) Application
More informationLANs Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed
Local Area Networks LANs provide an efficient network solution : To support a large number of stations Over moderately high speed With relatively small bit errors Multiaccess Protocols Communication among
More information