suitable for real-time applications. In this paper, we add a layer of Real-Time Communication Control (RTCC) protocol on top of Ethernet. The RTCC pro
|
|
- Elwin Willis
- 6 years ago
- Views:
Transcription
1 A Hard Real-Time Communication Control Protocol Based on the Ethernet WANG Zhi-Ping 1, XIONG Guang-Ze 1, LUO Jin 1, LAI Ming-Zhi 1,and Wanlei ZHOU 2 1 Computer Science and Engineering College, University of Electronic Science and Technology, Chengdu , The P.R. China 2 School of Computing and Mathematics, Deakin University, Clayton, VIC 3168, Australia wanlei@deakin.edu.au Abstract. In this paper, we present an Ethernet-based protocol called RTCC that provides a good basis for distributed hard real-time applications without requiring any modications to existing Ethernet hardware. Two novel mechanisms, the command / response multiplex transmission and a bus table, are introduced in RTCC in order to schedule the channels. Performance measurements from experiments on a 10 Mbps Ethernet indicate that RTCC has a satisfactory determinism. 1 Introduction A real-time system is one in which the correctness of the system depends not only on the logical results, but also on the time at which the results are produced. In hard real-time systems, results must be produced within an ordained timing constraint, otherwise, the results will lose their usability. For safety-critical systems, incorrect operations can lead to the loss of life or other catastrophes. With the increasing use of distributed hard real-time systems (such as command and control systems, image processing and transmission, and industrial process control, etc.), the ability of computer networks to handle hard real-time message trac is becoming more and more important. Two requirements, high bandwidth and determinism, are critical to any hard real-time applications [8]. Many existing networks, however, have either low bandwidth, or are non-deterministic, and therefore do not meet the requirements of the development of distributed hard real-time systems [1, 2, 6]. Ethernet is the most popularly used network nowadays. It is fast (10Mbps, 100Mbps or 1000Mbps Ethernet), simple and widely available. Ethernet meets the IEEE standard, in which thechannel access is random, since it is for a CSMA/CD LAN. This property leads to the unpredicable timing when sending and receiving data on the network. Therefore Ethernet is non-deterministic, which is often inappropriate for real-time work. However, the advantages of Ethernet (popularity, high-speed, and simplicity) justify the need to make it
2 suitable for real-time applications. In this paper, we add a layer of Real-Time Communication Control (RTCC) protocol on top of Ethernet. The RTCC protocol meets the requirements of hard real-time communication well.it also has a good real-time performance and meets the requirements of reliability for hard real-time systems. By using the RTCC protocol, an upper layer protocol can provide high-speed, reliable and hard real-time services to applications without any modication to the original Ethernet hardware. The rest of the paper is organized as follows. In Section 2, we introduce the architecture of our RTCC protocol. The detailed components of the RTCC protocol are described in Section 3. Section 4 presents the result of performance measurement and analysis. Section 5 concludes the paper. 2 RTCC Protocol Architecture For traditional networks, maximizing throughput or minimizing the average message delay are the most important performance criteria. In the hard real-time domain, however, the main focus is on satisfying the timing constraints of individual messages. In general, time constraints of messages are period, deadline, and so on. To meet the time constraints, hard real-time messages must be properly scheduled for transmission. For the purpose of understanding its real-time performance, it is convenient to consider an MAC protocol as consisting of two processes: an access arbitration process and a transmission control process [5]. The access arbitration process determines when a node can send a message over the channel. The transmission control process determines how long a node can continue to send messages over the channel. Ideally, any protocol for hard real-time communication should combine both an appropriate access arbitration process and an appropriate transmission control process. Many researchers, however, have tended to concentrate more on one process than the other. For example, the work on synchronous message transmission with the IEEE protocol has emphasized the access arbitration process. The work on synchronous bandwidth allocation for the Timed Token protocol [6], however, has emphasized the transmission control process. By comparing Ethernet and other network communication protocols, we have found that Ethernet nodes ask communication media positively, while it is the general case that real-time networks can only send data after the usage right of communication media is passively granted (e.g., a token or a command is received), so that conict of network access will never happen. Hence, neither Token-Ring [1] nor Timed Token protocol [6] enjoys ideal real-time performance. We propose an Ethernet-based communication protocol called Real-Time Communication Control (RTCC) protocol that provides a good basis for distributed hard real-time applications without the need to modify the existing Ethernet hardware. The RTCC protocol sits on top of the existing Ethernet MAC protocol, providing high speed and hard real-time communication network services to the upper application layer. The main advantage of the RTCC
3 protocol is that it transforms the popular Ethernet MAC protocol into a protocol that meets the requirements for hard real-time applications. Through the use of the RTCC protocol, applications can achieve hard real-time performance services without requiring any modication of existing Ethernet hardware. Figure 1 depicts this architecture. Fig. 1. The network model The RTCC protocol adopts the main-sub command / response multiple access transmission mode. Nodes are categorized into twotypes in RTCC protocol. One is Bus Controller (BC), the other is Remote Terminal (RT). There is only one BC, and the rest are all RTs. The startup of message transmission and management of Bus are tasks of BC. The length and the receiver of the data will be sent by the RT immediately. Obviously the access arbitration process and transmission control process are all accomplished by BCinRTCC. By integrating the two processes and ensuring they work in phases, not only the sending time of a node's data can be assured, but also the bus time that is used by a node will be controlled. Five components are dened in RTCC. They are frames, messages, bus table, error control and ow control, and network services for the upper layer. Their details are described in the next section. 3 The RTCC Protocol Components 3.1 Frames Three types of frames are dened in RTCC. They are command frames, data frames and response frames (Figure 2). Command frames can only be sentbythe BC to an RT, requesting the relevant RT to execute an operation. Command frames can be further categorized into data-send command frames and mode command frames. Both BC and RT can send data frames. Response frames can only be sent byanrt to the BC, as the response to a command frame from the BC, indicating current states of an RT.
4 Fig. 2. RTCC frame format 3.2 Messages RTCC refers messages as a sequence of transmission that includes command frame, response frame, data frame and state response intervals. A message is the basic unit in the transmission of the network. The transmission process of a message indicates a whole process of data transmission. There are seven classes of messages dened in RTCC. They are classied into two types: pointto-point messages and broadcast messages. Based on command frames, they can be categorized into data transmission messages and mode command messages as well. A message is called a mode command message when the command frame is a mode command frame, or data transmission message when the command frame is a data-send command frame. There are ve data transmission messages in all: data transmission: BC! RT, RT! BC, RT! RT, and data broadcast: BC! RTs, RT! RTs. There are two mode command messages, which are used for the management of the network. In the process of message transmission, if the message is point-topoint, once a data or command frame is received, an RT will send the response frame to BC at the rst time. However if the message is broadcast, RTs do not send state frames, but the BC will poll individual RTs using the mode command. The above mechanisms are used to guarantee good predictability and high reliability, critical to a hard real-time protocol. State messages sent back from RT enable the BC to nd errors or exceptions of RTs, so corresponding retrievals can be admitted and the reliability of the whole system is assured. Figure 3 shows the message formats of the RTCC protocol. There are periodic and aperiodic messages. In distributed hard real-time systems, periodic messages
5 are used for the transmission of periodic data streams or communication between periodic tasks of dierent nodes, while aperiodic messages transmit burst data or realize communication between aperiodic tasks. They are dened below: Denition 1. S i (T i d i D i W i ) is a periodic message in RTCC protocol. D i T i + d i T i d i 1 W i 1498 bytes. Denition 2. A i (d i D i W i ) is an aperiodic message in RTCC protocol. D i d i 1 W i 1498 bytes. In denition 1 and denition 2, T i represents the period of the message, namely the interval of the message stream's transmission. d i represents the time interval from the startup to the end of the message, i.e., the delay of the message transmission. D i represents the deadline of the message. W i is the length of data in the message, i.e., the data length the message is able to transmit. Excepting for the lack of certain periods, aperiodic messages are the same as period messages. Fig. 3. Message format We give the following formulas regarding to the performance of the protocol. Utilization of messages is represented by U. And the utilization of a periodic message S i is: U Si = d i =T i (1) If the average arrival rate of an asynchronous message A i is i, then the demand utilization of asynchronous messages is dened as U Ai = i =d i (2)
6 Besides U, another important performance criterion of messages is runtime overhead L. It is dened as L i =(d i ; W i 8=Ethernet Bandwidth)=d i 100 (3) Where W i 8 is the number of bits in a message. 3.3 Bus Table The transmission of messages on the bus is performed by the execution of bus table instructions on BC. The bus table is installed on BC only, which includes a group of optimized communication instruction blocks and relevant messages. The number of source and destination nodes, the port number of nodes, the maximum delay of instruction's execution and other relevant control messages are all dened in every instruction block. Repeated appearance of an instruction is permitted in the bus table. BC executes every instruction block in the bus table sequentially. According to every execution of an instruction, there is a transmission of a message. The instructions in the bus table are circularly executed by BC, then every message gets one chance of transmission at least, and the message's real-time transmission on the bus table is assured. Virtually the bus table is a scheduling table of the network, a key feature of real-time communication services provided by RTCC to the upper layer. The bus table can be realized in two modes: dynamic and static. A static bus table enjoys good time certainty, and can be easily realized. Its weak points are its rigid control, and modifying one one instruction can result in rearranging the whole bus table, and a new schedulability test is needed. As to dynamic mode, the bus table is arranged according to current system states. Although exible and ecient, its predictability is hard to ensure. Generally static bus tables are adopted in hard real-time communications. In the following we only discuss the static bus table. Denition 3. T (fs1 S2 S m g fa1 A2 A n g l) is the static bus table in RTCC protocol. It contains m periodic messages and n aperiodic messages, and the time length for scheduling all messages is l. The arrangement of a bus table is an NP-complete problem [11]. Dierent approaches could be adopted according to the application's requirements, such as polling or Earliest Deadline First [3] (EDF). Generally speaking, there are the following requirements for distributed hard real-time systems to network communication: 1. to assure the period and deadline of periodic messages 2. to assure the deadline of aperiodic messages and 3. to be able to process soft real-time or non-real-time messages. An algorithm for bus table arrangement is proposed here, which can ensure all the above requirements. The concrete steps of the algorithm are:
7 1. 8A i 2 T, if it is a hard real-time message, the Periodic Server [5] is used to assure its predictability, say, tochange it into periodic message S j T j D j ; d j 2. length of bus table l MAX(T i ) 3. 8S i 2 T, the interval in the bus table is the period of the message T i 4. assuring the transmission of hard real-time periodic messages rst, use EDF scheduling to transmit other messages in the idle time of bus table. We use the above algorithm to schedule the bus table: The following assertion concerns the utilization of the communication netwotk. Assertion. If the bus table T could be scheduled, then the utilization of network U should satisfy the following inequation: U = U S + U A 1 where U S = i=1 m d i U A = T j=1 n d: (4) i Parameters W and T of a message aect the arrangement a bit more. In general, the smaller W is, the easier the arrangement of the bus table becomes. By adopting the pinwheel scheduling of Sr's periodic transfer technology to transfer the period of all the messages into harmonic numbers [4], it will greatly enhance the schedulability. 3.4 Error Control and Flow Control Error control and re-transmission are realized by the response frame's receipt by the BC. By analyzing the executing process of instructions in the bus table, we have the following conclusion. Under the most complex situation, the BC should receive the response frame twice to assure the transmission of data is correct. So the maximum delay ofevery instruction set in the bus table (i.e., the time interval of every instruction's execution) is divided into two sections (t1 + t r )or three sections (t1 + t2 + t r ), here t1 and t2 are the time limit of waiting, and t r is the time left. The BC sends every frame and sets the clock at the same time. If the response frame is not received in t1 or t2, or incorrect response is received, or the response frame indicates that the receiver received the frame incorrectly, the BC transmits once more, or BC requests the RT to transmit once more, or returns a failure message to assure the correct execution of the next instruction. If the time of re-transmission is less than tr, the BC will startup re-transmission, otherwise the BC returns the error message. Re-transmission can reduce the code error ratio in the MAC layer [7]. RTCC presumes that the underlying network is reliable, so the time of re-transmission should not be too long, otherwise predictability is aected. Timely error information is also necessary in hard real-time systems. Flow control approaches in traditional networks, such as the stop-wait protocol and the sliding window protocol are not applicable in real-time networks, because they cannot assure the predictability of network data transmission. The
8 RTCC protocol adopts the non-feedback ow control approach [10] for real-time communication. Through precisely setting of sending and receiving speeds, this approach enables a receiver to take old data before new data is arrived all the time. 3.5 Network Services for Upper Layer The bus table builds real-time channels between nodes, from a sending port of one node to a receiving port of another node. One node can connect to more than one sending and receiving real-time channel. A real- time channel is equivalent to a message dened in RTCC. Each channel has its own time constraints. It is independent of other real-time channels, similar to an exclusive physical circuit. RTCC provides two basic functions for upper layer accessing real-time channels, rtccsend and rtccrecv. Upper layer software can call the two functions to transmit data directly or extend the network functions based on them, such as transmitting data of more than 1498 bytes, providing synchronous and asynchronous communication functions, etc. The two functions are dened as follows: { rtccsend(sendportnum, pbuffer, size, overwriteflag): Send data to a sending port sendportnum. Where pbuer is the address point of sending data size is equal or less than the length of data that the real-time channel can send at one time and overwriteflag stands for the written ag. If overwriteflag is TRUE, the new data can overwrite the data that has not been delivered. If it is FALSE, the new data can not overwrite the undelivered data, and the error return value indicates that the old data is not sent yet. { rtccrecv(recvportnum, pbuffer, size): Get the data from the receiving port. Where pbuer is the address point of receiving buer size is the length of received data. 4 Performance Measurement and Analysis The experimental setup of the RTCC protocol contains three Intel EV386EX embedded computers (clock rate is 25MHz, PC/104 bus). One is assigned as the BC, and the other two are assigned as RT. Each computer has a UM9008 type 10M Ethernet card that connects to a DE809-TC type HUB. The averages of message delays were measured through experiments. The delay ofpoint-to-point mode command messages is 103s. And the delay of broadcast mode command messages is 52s. All of the values measured have a deviation of 9s from the average values. The variation has no distinct relation with the dierence of data size of messages. The results show that the real-time channels have good real-time features. To the best of our knowledge, other implementations of realtime communication protocols on Ethernet are generally soft real-time (such as RETHER [9]). Therefore it is dicult to compare them with RTCC. Figure 4(a) shows the comparison of RTCC and the hard real-time communication protocol MIL-STD-1553B in terms of delays of messages as the data size of
9 messages increasing. Figure 4(b) displays the runtime overhead of messages of these two protocols. Table 1 lists some main performance criteria of several types of commonly used bus real-time networks. It can be found from table 1 that RT-Ethernet (an Ethernet using the RTCC protocol) has a good real-time performance, a higher bandwidth, and a larger data size a message is able to send at one time. So it should have a better potential to be widely adopted. Table 1. Features of Real-time Networks MIL-STD BITBUS ARCnet RT-Ethernet -1553B (RTCC) Speed (bps) 1M 62.5K-2.4M 2.5M 10M Determinism best Common Common Good Length (km) <0.09 <13.2 <6.7 <2.5 Max nodes Frame 1-32(16bits) (bits) 1-253(8bits) (8bits) Applictions Military, Industry Industry Monitor systems, aerospace, control control, Monitor systems, aviation Info systems Image processing, medical equipments Fig. 4. RTCC vs. 1553B: (a) Delay of Messages (b) Time Overhead 5 Conclusions The Ethernet-based RTCC protocol proposed in this paper uses command / response multiplex transmission and a bus table to schedule real-time messages. Through analysis and experiments we have shown that RTCC has a good realtime performance, is a simple protocol, and meets the requirements of real-time communications well. RTCC also meets the requirement of reliability for hard real-time systems. RTCC has been used in a national essential project of China in the aviation area and a monitoring system for patients in danger successfully.
10 Further work has been planned. That includes (1) Extending RTCC protocol to support multi-segment Ethernet (connected through bridges or routers), and (2) Studying the possibility of applying the RTCC in distributed soft real-time systems (such as distributed multimedia systems). References 1. ANSI/IEEE Standard 802.4: Token-Passing Bus Access Method and Physical Layer Specications ANSI Standard X3T9.5/88-139, Rev 4.0. FDDI Media Access Control (MAC) George, L. and Minet, P., "A solution preserving consistency of replicated objects with hard real-time constraints," Proceedings of the ISCA 12th International Conference on Parallel and Distributed Systems, Fort Lauderdale, FL, , Han, C. C. and Lin, K. J., "Scheduling distance-constrained real-time tasks," Proceedings IEEE Real-Time Systems Symposium, NewYork, , Malcolm, N. and Zhao, W., "Hard real-time communication in multipleaccess networks," Journal of Real-Time Systems, 8(1): 35 77, Malcolm, N. and Zhao, W., "The timed token protocol for real-time communication," IEEE Computers, 27(1): 35 41, Tanenbaum, A. S., Computer Networks. Prentice Hall, Tindell, K., Burns, A. and Wellings, A. J., "Analysis of hard real-time communication," Journal of Real-Time Systems, 9, , Venkatramani, C. and Chiueh, T., "Design, implementation, and evaluation of a software-driven real-time Ethernet protocol," Proceedings of the SIG- COMM'95 Conference, ACM, 27 37, Wang, Z. P., Xiong, G. Z., and Liu, J. D., "On the ow control problem of 1553B real-time network," Computer Science (in Chinese), 26(7): 80 82, Zhao, H., "Study of real-time connections and communications in eldbus networks," Journal of Computer Research & Development (in Chinese). 34(5): , 1997.
Additional Switched Ethernet Protocol for Industrial Hard Real-Time Traffic
Additional Switched Ethernet Protocol for Industrial Hard Real-Time Traffic ALIMUJIANG YIMING and TOSHIO EISAKA Dept of Computer Sciences Kitami Institute of Technology 165, Koen-cho, Kitami, Hokkaido
More informationCredit Determination of Fibre Channel in Avionics Environment
Chinese Journal of Aeronautics 20(2007) 247-252 Chinese Journal of Aeronautics www.elsevier.com/locate/cja Credit Determination of Fibre Channel in Avionics Environment LIN Qiang*, XIONG Hua-gang, ZHANG
More informationContent. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control
Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media
More informationSIMULATION OF PACKET DATA NETWORKS USING OPNET
SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada
More informationECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII
ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing
More informationReal-Time (Paradigms) (47)
Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationScheduling Algorithm for Hard Real-Time Communication in Demand Priority Network
Scheduling Algorithm for Hard Real-Time Communication in Demand Priority Network Taewoong Kim, Heonshik Shin, and Naehyuck Chang Department of Computer Engineering Seoul National University, Seoul 151-742,
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationSCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS IAN RAMSAY PHILP. B.S., University of North Carolina at Chapel Hill, 1988
SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS BY IAN RAMSAY PHILP B.S., University of North Carolina at Chapel Hill, 1988 M.S., University of Florida, 1990 THESIS Submitted in partial fulllment
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationTest Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair
Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationMedia Access Control (MAC) Sub-layer and Ethernet
Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF MAC Sub-layer The MAC sub-layer is a sub-layer
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationContention Protocols and Networks
4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks
More informationImi :... Data:... Nazwisko:... Stron:...
Imi :.................................................... Data:....................... Nazwisko:............................................... Stron:...................... 1. Which of the following protocols
More informationExtensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc
Extensions to RTP to support Mobile Networking Kevin Brown Suresh Singh Department of Computer Science Department of Computer Science University of South Carolina Department of South Carolina Columbia,
More information1999, Scott F. Midkiff
Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams
More informationNETWORKING COMPONENTS
1) OBJECTIVES NETWORKING COMPONENTS The objectives of this chapter are to familiarize with the following: - i) The LAN components ii) iii) iv) Repeater Hub Bridge v) Router vi) Gateway 2) INTRODUCTION
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationFB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network
Congestion-free Routing of Streaming Multimedia Content in BMIN-based Parallel Systems Harish Sethu Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104, USA sethu@ece.drexel.edu
More information2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS
2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS 2.1 Real-Time and Control Computer based digital controllers typically have the ability to monitor a number of discrete and analog inputs, perform complex
More informationConnection Admission Control for Hard Real-Time Communication in ATM Networks
MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Connection Admission Control for Hard Real-Time Communication in ATM Networks Qin Zheng, Tetsuya Yokotani, Tatsuki Ichihashi, Yasunoni Nemoto
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationECE 4450:427/527 - Computer Networks Spring 2017
ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527
More informationThe Study of Intelligent Scheduling Algorithm in the Vehicle ECU based on CAN Bus
Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1461-1465 1461 Open Access The Study of Intelligent Scheduling Algorithm in the Vehicle ECU based
More informationLecture 9: Bridging & Switching"
Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link
More informationMidterm Review EECS 122. University of California Berkeley
Midterm Review EECS 122 University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi 2 Review: Network WAN MAN 3 Review: Network WAN MAN
More informationChapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 3 Underlying Technology TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To briefly discuss the technology of dominant
More informationThroughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1
455 Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1 Assistant Professor, Department of Computer Science and Engineering Punjabi University
More informationFault-Tolerant Real-Time Communication in FDDI-Based Networks. Biao Chen, Sanjay Kamat and Wei Zhao. Texas A&M University
Fault-Tolerant Real-Time Communication in FDDI-Based Networks Biao Chen, Sanjay Kamat and Wei Zhao Department of Computer Science Texas A&M University College Station, Texas 7783-32 Abstract FDDI-Based
More informationSIMULATION OF PACKET DATA NETWORKS USING OPNET
Nazy Alborz Maryam Keyvani Milan Nikolic Ljiljana Trajkovic SIMULATION OF PACKET DATA NETWORKS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationZarządzanie sieciami telekomunikacyjnymi
Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. Four data rates are
More informationHigh Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols
High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:
More informationNetworked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang
Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application Ling Wang ling.wang2@wayne.edu Outline Introduction Parameterization Differentiation Evaluation
More informationCSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!
CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also
More informationChapter 4 NETWORK HARDWARE
Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.
More informationENGI 4557 Digital Communications Practice Problems 2017 (Part 2)
ENGI 4557 Digital Communications Practice Problems 207 (Part 2) H = n p i log 2 ( ) p i C = W log 2 ( + S N ) SNR = 6m + 0 log 0 ( 3σ2 x V ) 2 SNR = 6m 0 ( ) n n! = k k!(n k)! x = σ 2 = + + x p(x)dx (x
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationFDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC
FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC Kang G. Shin Real-time Computing Laboratory EECS Department The University of Michigan Ann Arbor, Michigan 48109 &in Zheng Mitsubishi
More information(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker
Code No: N0421/R07 Set No. 1 IV B.Tech I Semester Supplementary Examinations, March 2013 COMPUTER NETWORKS ( Common to Electronics & Communication Engineering, Electronics & Instrumentation Engineering,
More informationEE 122: Ethernet and
EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts
More informationLAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science
1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationIntroduction to LAN Protocols
CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various
More informationMultimedia-Systems. Operating Systems. Prof. Dr.-Ing. Ralf Steinmetz Prof. Dr. rer. nat. Max Mühlhäuser Prof. Dr.-Ing. Wolfgang Effelsberg
Multimedia-Systems Operating Systems Prof. Dr.-Ing. Ralf Steinmetz Prof. Dr. rer. nat. Max Mühlhäuser Prof. Dr.-Ing. Wolfgang Effelsberg WE: University of Mannheim, Dept. of Computer Science Praktische
More informationTCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS
TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,
More informationOutline: Connecting Many Computers
Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point
More informationDesign and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan
Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed
More informationModes of Transfer. Interface. Data Register. Status Register. F= Flag Bit. Fig. (1) Data transfer from I/O to CPU
Modes of Transfer Data transfer to and from peripherals may be handled in one of three possible modes: A. Programmed I/O B. Interrupt-initiated I/O C. Direct memory access (DMA) A) Programmed I/O Programmed
More informationCS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay
CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Key points to consider for MAC Types/Modes of communication: Although the medium is shared,
More informationA Boolean Expression. Reachability Analysis or Bisimulation. Equation Solver. Boolean. equations.
A Framework for Embedded Real-time System Design? Jin-Young Choi 1, Hee-Hwan Kwak 2, and Insup Lee 2 1 Department of Computer Science and Engineering, Korea Univerity choi@formal.korea.ac.kr 2 Department
More informationAchieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product
Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless
More informationLecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren
Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits
More informationT H. Runable. Request. Priority Inversion. Exit. Runable. Request. Reply. For T L. For T. Reply. Exit. Request. Runable. Exit. Runable. Reply.
Experience with Real-Time Mach for Writing Continuous Media Applications and Servers Tatsuo Nakajima Hiroshi Tezuka Japan Advanced Institute of Science and Technology Abstract This paper describes the
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationAn Eective Selective Repeat ARQ Strategy for. High Speed Point-to-Multipoint Communications. Heliomar Medeiros de Lima BANCO DO BRASIL S. A.
An Eective Selective Repeat ARQ Strategy for High Speed Point-to-Multipoint Communications Heliomar Medeiros de Lima BANCO DO BRASIL S. A. CEDIP-RIO - Fax: +55 21 288.9245 Rio de Janeiro - RJ - Brasil
More informationReliable Multicast Scheme Based on Busy Signal in Wireless LANs
Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium
More informationDynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ
Dynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ Dongkun Shin Jihong Kim School of CSE School of CSE Seoul National University Seoul National University Seoul, Korea
More informationSimulation of an ATM{FDDI Gateway. Milind M. Buddhikot Sanjay Kapoor Gurudatta M. Parulkar
Simulation of an ATM{FDDI Gateway Milind M. Buddhikot Sanjay Kapoor Gurudatta M. Parulkar milind@dworkin.wustl.edu kapoor@dworkin.wustl.edu guru@flora.wustl.edu (314) 935-4203 (314) 935 4203 (314) 935-4621
More information2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING
UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1
More information1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.
/9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationAbstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy
ONE: The Ohio Network Emulator Mark Allman, Adam Caldwell, Shawn Ostermann mallman@lerc.nasa.gov, adam@eni.net ostermann@cs.ohiou.edu School of Electrical Engineering and Computer Science Ohio University
More informationMULTIPLEXER / DEMULTIPLEXER IMPLEMENTATION USING A CCSDS FORMAT
MULTIPLEXER / DEMULTIPLEXER IMPLEMENTATION USING A CCSDS FORMAT Item Type text; Proceedings Authors Grebe, David L. Publisher International Foundation for Telemetering Journal International Telemetering
More informationIntroduction to Open System Interconnection Reference Model
Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding
More informationPhysical and Link Layers. CS144 Review Session 6 November 6 th, 2008 Roger Liao Based on slides by Ben Nham
Physical and Link Layers CS144 Review Session 6 November 6 th, 2008 Roger Liao Based on slides by Ben Nham Outline Physical layer Encoding of signals Chips vs. bits Link layer Communication through shared
More informationComputer Networks Medium Access Control. Mostafa Salehi Fall 2008
Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically
More informationDistributed Video Systems Chapter 3 Storage Technologies
Distributed Video Systems Chapter 3 Storage Technologies Jack Yiu-bun Lee Department of Information Engineering The Chinese University of Hong Kong Contents 3.1 Introduction 3.2 Magnetic Disks 3.3 Video
More informationAn Efficient Scheduling Scheme for High Speed IEEE WLANs
An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological
More informationJournal of Electronics and Communication Engineering & Technology (JECET)
Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X
More informationA Scheme of Dynamic Bandwidth Allocation for Switching FC-AE-1553 Network
4th Internatio Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Dynamic Bandwidth Allocation for Switching FC-AE-1553 Network Shaojun WU1,3*, Liqian WANG2,Yueying ZHAN1,
More informationABSTRACT I. INTRODUCTION
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 3 ISS: 2456-3307 Hadoop Periodic Jobs Using Data Blocks to Achieve
More informationQUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for
Computer Networks Computer Network Basics 1 QUESTION BANK 1. Segentation is done in (a) transport layer (c) data link layer 2. Network layer activities are: (d) physical layer (a) logical addressing (b)
More information1: Review Of Semester Provide an overview of encapsulation.
1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,
More informationOVERHEADS ENHANCEMENT IN MUTIPLE PROCESSING SYSTEMS BY ANURAG REDDY GANKAT KARTHIK REDDY AKKATI
CMPE 655- MULTIPLE PROCESSOR SYSTEMS OVERHEADS ENHANCEMENT IN MUTIPLE PROCESSING SYSTEMS BY ANURAG REDDY GANKAT KARTHIK REDDY AKKATI What is MULTI PROCESSING?? Multiprocessing is the coordinated processing
More informationA NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE
A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE A. Hadjiantonis, S. Sherif, A. Khalil, T. Rahman, G. Ellinas, M. F. Arend, and M. A. Ali, Department of Electrical Engineering,
More informationNode Application Logic. SCI Interface. Output FIFO. Input FIFO. Bypass FIFO M U X. Output Link. Input Link. Address Decoder
Real-Time Message Transmission Over The Scalable Coherent Interface (SCI) Lei Jiang Sarit Mukherjee Dept. of Computer Science & Engg. University of Nebraska-Lincoln Lincoln, NE 68588-0115 Email: fljiang,
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationThis formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go
Chapter 3 Problem 2 In Figure 3.43 of the text every node transmits R bps, and we assume that both network partitions consist of 1 N nodes. So the total traffic generated by the nodes 2 of each Ethernet
More informationChapter 6: Network Communications and Protocols
Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols
More informationrequests or displaying activities, hence they usually have soft deadlines, or no deadlines at all. Aperiodic tasks with hard deadlines are called spor
Scheduling Aperiodic Tasks in Dynamic Priority Systems Marco Spuri and Giorgio Buttazzo Scuola Superiore S.Anna, via Carducci 4, 561 Pisa, Italy Email: spuri@fastnet.it, giorgio@sssup.it Abstract In this
More informationIntroduction to Real-Time Systems ECE 397-1
Introduction to Real-Time Systems ECE 97-1 Northwestern University Department of Computer Science Department of Electrical and Computer Engineering Teachers: Robert Dick Peter Dinda Office: L477 Tech 8,
More information\Classical" RSVP and IP over ATM. Steven Berson. April 10, Abstract
\Classical" RSVP and IP over ATM Steven Berson USC Information Sciences Institute April 10, 1996 Abstract Integrated Services in the Internet is rapidly becoming a reality. Meanwhile, ATM technology is
More informationModeling a MAC Scheduler: Experiences with a DOCSIS Cable
Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Network Simulation Model Jim Martin Department of Computer Science Clemson University jim.martin@cs.clemson.edu Phone: 864 656 4529 Fax: 864 656
More informationData Link Layer Technologies
Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave
More informationLecture 6 Datalink Framing, Switching. From Signals to Packets
Lecture 6 Datalink Framing, Switching David Andersen Department of Computer Science Carnegie Mellon University 15-441 Networking, Spring 2005 http://www.cs.cmu.edu/~srini/15-441/s05/ 1 From Signals to
More informationEcient Implementation of Sorting Algorithms on Asynchronous Distributed-Memory Machines
Ecient Implementation of Sorting Algorithms on Asynchronous Distributed-Memory Machines Zhou B. B., Brent R. P. and Tridgell A. y Computer Sciences Laboratory The Australian National University Canberra,
More informationResearch on outlier intrusion detection technologybased on data mining
Acta Technica 62 (2017), No. 4A, 635640 c 2017 Institute of Thermomechanics CAS, v.v.i. Research on outlier intrusion detection technologybased on data mining Liang zhu 1, 2 Abstract. With the rapid development
More informationChapter 2. Network Classifications (Cont.)
Chapter 2 Network Classifications (Cont.) 2.3 Topological Network Classification Examining the Basics of a Network Layout To implement a network, you must first decide what topology will best meet your
More informationCIS 777 Telecommunications Networks
CIS 777 Telecommunications Networks Columbus, OH 43210 Jain@cse.ohio-State.Edu These slides are available at: http://www.cse.ohio-state.edu/~jain/cis777-99/ 1 Overview How What When Why 2 Overview How
More informationAdvantages and disadvantages
Advantages and disadvantages Advantages Disadvantages Asynchronous transmission Simple, doesn't require synchronization of both communication sides Cheap, timing is not as critical as for synchronous transmission,
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationThe Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.
The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)
More informationIntroduction to Real-time Systems. Advanced Operating Systems (M) Lecture 2
Introduction to Real-time Systems Advanced Operating Systems (M) Lecture 2 Introduction to Real-time Systems Real-time systems deliver services while meeting some timing constraints Not necessarily fast,
More informationDynamic Multi-Path Communication for Video Trac. Hao-hua Chu, Klara Nahrstedt. Department of Computer Science. University of Illinois
Dynamic Multi-Path Communication for Video Trac Hao-hua Chu, Klara Nahrstedt Department of Computer Science University of Illinois h-chu3@cs.uiuc.edu, klara@cs.uiuc.edu Abstract Video-on-Demand applications
More informationDigital Communication Networks
Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus
More information