suitable for real-time applications. In this paper, we add a layer of Real-Time Communication Control (RTCC) protocol on top of Ethernet. The RTCC pro

Size: px
Start display at page:

Download "suitable for real-time applications. In this paper, we add a layer of Real-Time Communication Control (RTCC) protocol on top of Ethernet. The RTCC pro"

Transcription

1 A Hard Real-Time Communication Control Protocol Based on the Ethernet WANG Zhi-Ping 1, XIONG Guang-Ze 1, LUO Jin 1, LAI Ming-Zhi 1,and Wanlei ZHOU 2 1 Computer Science and Engineering College, University of Electronic Science and Technology, Chengdu , The P.R. China 2 School of Computing and Mathematics, Deakin University, Clayton, VIC 3168, Australia wanlei@deakin.edu.au Abstract. In this paper, we present an Ethernet-based protocol called RTCC that provides a good basis for distributed hard real-time applications without requiring any modications to existing Ethernet hardware. Two novel mechanisms, the command / response multiplex transmission and a bus table, are introduced in RTCC in order to schedule the channels. Performance measurements from experiments on a 10 Mbps Ethernet indicate that RTCC has a satisfactory determinism. 1 Introduction A real-time system is one in which the correctness of the system depends not only on the logical results, but also on the time at which the results are produced. In hard real-time systems, results must be produced within an ordained timing constraint, otherwise, the results will lose their usability. For safety-critical systems, incorrect operations can lead to the loss of life or other catastrophes. With the increasing use of distributed hard real-time systems (such as command and control systems, image processing and transmission, and industrial process control, etc.), the ability of computer networks to handle hard real-time message trac is becoming more and more important. Two requirements, high bandwidth and determinism, are critical to any hard real-time applications [8]. Many existing networks, however, have either low bandwidth, or are non-deterministic, and therefore do not meet the requirements of the development of distributed hard real-time systems [1, 2, 6]. Ethernet is the most popularly used network nowadays. It is fast (10Mbps, 100Mbps or 1000Mbps Ethernet), simple and widely available. Ethernet meets the IEEE standard, in which thechannel access is random, since it is for a CSMA/CD LAN. This property leads to the unpredicable timing when sending and receiving data on the network. Therefore Ethernet is non-deterministic, which is often inappropriate for real-time work. However, the advantages of Ethernet (popularity, high-speed, and simplicity) justify the need to make it

2 suitable for real-time applications. In this paper, we add a layer of Real-Time Communication Control (RTCC) protocol on top of Ethernet. The RTCC protocol meets the requirements of hard real-time communication well.it also has a good real-time performance and meets the requirements of reliability for hard real-time systems. By using the RTCC protocol, an upper layer protocol can provide high-speed, reliable and hard real-time services to applications without any modication to the original Ethernet hardware. The rest of the paper is organized as follows. In Section 2, we introduce the architecture of our RTCC protocol. The detailed components of the RTCC protocol are described in Section 3. Section 4 presents the result of performance measurement and analysis. Section 5 concludes the paper. 2 RTCC Protocol Architecture For traditional networks, maximizing throughput or minimizing the average message delay are the most important performance criteria. In the hard real-time domain, however, the main focus is on satisfying the timing constraints of individual messages. In general, time constraints of messages are period, deadline, and so on. To meet the time constraints, hard real-time messages must be properly scheduled for transmission. For the purpose of understanding its real-time performance, it is convenient to consider an MAC protocol as consisting of two processes: an access arbitration process and a transmission control process [5]. The access arbitration process determines when a node can send a message over the channel. The transmission control process determines how long a node can continue to send messages over the channel. Ideally, any protocol for hard real-time communication should combine both an appropriate access arbitration process and an appropriate transmission control process. Many researchers, however, have tended to concentrate more on one process than the other. For example, the work on synchronous message transmission with the IEEE protocol has emphasized the access arbitration process. The work on synchronous bandwidth allocation for the Timed Token protocol [6], however, has emphasized the transmission control process. By comparing Ethernet and other network communication protocols, we have found that Ethernet nodes ask communication media positively, while it is the general case that real-time networks can only send data after the usage right of communication media is passively granted (e.g., a token or a command is received), so that conict of network access will never happen. Hence, neither Token-Ring [1] nor Timed Token protocol [6] enjoys ideal real-time performance. We propose an Ethernet-based communication protocol called Real-Time Communication Control (RTCC) protocol that provides a good basis for distributed hard real-time applications without the need to modify the existing Ethernet hardware. The RTCC protocol sits on top of the existing Ethernet MAC protocol, providing high speed and hard real-time communication network services to the upper application layer. The main advantage of the RTCC

3 protocol is that it transforms the popular Ethernet MAC protocol into a protocol that meets the requirements for hard real-time applications. Through the use of the RTCC protocol, applications can achieve hard real-time performance services without requiring any modication of existing Ethernet hardware. Figure 1 depicts this architecture. Fig. 1. The network model The RTCC protocol adopts the main-sub command / response multiple access transmission mode. Nodes are categorized into twotypes in RTCC protocol. One is Bus Controller (BC), the other is Remote Terminal (RT). There is only one BC, and the rest are all RTs. The startup of message transmission and management of Bus are tasks of BC. The length and the receiver of the data will be sent by the RT immediately. Obviously the access arbitration process and transmission control process are all accomplished by BCinRTCC. By integrating the two processes and ensuring they work in phases, not only the sending time of a node's data can be assured, but also the bus time that is used by a node will be controlled. Five components are dened in RTCC. They are frames, messages, bus table, error control and ow control, and network services for the upper layer. Their details are described in the next section. 3 The RTCC Protocol Components 3.1 Frames Three types of frames are dened in RTCC. They are command frames, data frames and response frames (Figure 2). Command frames can only be sentbythe BC to an RT, requesting the relevant RT to execute an operation. Command frames can be further categorized into data-send command frames and mode command frames. Both BC and RT can send data frames. Response frames can only be sent byanrt to the BC, as the response to a command frame from the BC, indicating current states of an RT.

4 Fig. 2. RTCC frame format 3.2 Messages RTCC refers messages as a sequence of transmission that includes command frame, response frame, data frame and state response intervals. A message is the basic unit in the transmission of the network. The transmission process of a message indicates a whole process of data transmission. There are seven classes of messages dened in RTCC. They are classied into two types: pointto-point messages and broadcast messages. Based on command frames, they can be categorized into data transmission messages and mode command messages as well. A message is called a mode command message when the command frame is a mode command frame, or data transmission message when the command frame is a data-send command frame. There are ve data transmission messages in all: data transmission: BC! RT, RT! BC, RT! RT, and data broadcast: BC! RTs, RT! RTs. There are two mode command messages, which are used for the management of the network. In the process of message transmission, if the message is point-topoint, once a data or command frame is received, an RT will send the response frame to BC at the rst time. However if the message is broadcast, RTs do not send state frames, but the BC will poll individual RTs using the mode command. The above mechanisms are used to guarantee good predictability and high reliability, critical to a hard real-time protocol. State messages sent back from RT enable the BC to nd errors or exceptions of RTs, so corresponding retrievals can be admitted and the reliability of the whole system is assured. Figure 3 shows the message formats of the RTCC protocol. There are periodic and aperiodic messages. In distributed hard real-time systems, periodic messages

5 are used for the transmission of periodic data streams or communication between periodic tasks of dierent nodes, while aperiodic messages transmit burst data or realize communication between aperiodic tasks. They are dened below: Denition 1. S i (T i d i D i W i ) is a periodic message in RTCC protocol. D i T i + d i T i d i 1 W i 1498 bytes. Denition 2. A i (d i D i W i ) is an aperiodic message in RTCC protocol. D i d i 1 W i 1498 bytes. In denition 1 and denition 2, T i represents the period of the message, namely the interval of the message stream's transmission. d i represents the time interval from the startup to the end of the message, i.e., the delay of the message transmission. D i represents the deadline of the message. W i is the length of data in the message, i.e., the data length the message is able to transmit. Excepting for the lack of certain periods, aperiodic messages are the same as period messages. Fig. 3. Message format We give the following formulas regarding to the performance of the protocol. Utilization of messages is represented by U. And the utilization of a periodic message S i is: U Si = d i =T i (1) If the average arrival rate of an asynchronous message A i is i, then the demand utilization of asynchronous messages is dened as U Ai = i =d i (2)

6 Besides U, another important performance criterion of messages is runtime overhead L. It is dened as L i =(d i ; W i 8=Ethernet Bandwidth)=d i 100 (3) Where W i 8 is the number of bits in a message. 3.3 Bus Table The transmission of messages on the bus is performed by the execution of bus table instructions on BC. The bus table is installed on BC only, which includes a group of optimized communication instruction blocks and relevant messages. The number of source and destination nodes, the port number of nodes, the maximum delay of instruction's execution and other relevant control messages are all dened in every instruction block. Repeated appearance of an instruction is permitted in the bus table. BC executes every instruction block in the bus table sequentially. According to every execution of an instruction, there is a transmission of a message. The instructions in the bus table are circularly executed by BC, then every message gets one chance of transmission at least, and the message's real-time transmission on the bus table is assured. Virtually the bus table is a scheduling table of the network, a key feature of real-time communication services provided by RTCC to the upper layer. The bus table can be realized in two modes: dynamic and static. A static bus table enjoys good time certainty, and can be easily realized. Its weak points are its rigid control, and modifying one one instruction can result in rearranging the whole bus table, and a new schedulability test is needed. As to dynamic mode, the bus table is arranged according to current system states. Although exible and ecient, its predictability is hard to ensure. Generally static bus tables are adopted in hard real-time communications. In the following we only discuss the static bus table. Denition 3. T (fs1 S2 S m g fa1 A2 A n g l) is the static bus table in RTCC protocol. It contains m periodic messages and n aperiodic messages, and the time length for scheduling all messages is l. The arrangement of a bus table is an NP-complete problem [11]. Dierent approaches could be adopted according to the application's requirements, such as polling or Earliest Deadline First [3] (EDF). Generally speaking, there are the following requirements for distributed hard real-time systems to network communication: 1. to assure the period and deadline of periodic messages 2. to assure the deadline of aperiodic messages and 3. to be able to process soft real-time or non-real-time messages. An algorithm for bus table arrangement is proposed here, which can ensure all the above requirements. The concrete steps of the algorithm are:

7 1. 8A i 2 T, if it is a hard real-time message, the Periodic Server [5] is used to assure its predictability, say, tochange it into periodic message S j T j D j ; d j 2. length of bus table l MAX(T i ) 3. 8S i 2 T, the interval in the bus table is the period of the message T i 4. assuring the transmission of hard real-time periodic messages rst, use EDF scheduling to transmit other messages in the idle time of bus table. We use the above algorithm to schedule the bus table: The following assertion concerns the utilization of the communication netwotk. Assertion. If the bus table T could be scheduled, then the utilization of network U should satisfy the following inequation: U = U S + U A 1 where U S = i=1 m d i U A = T j=1 n d: (4) i Parameters W and T of a message aect the arrangement a bit more. In general, the smaller W is, the easier the arrangement of the bus table becomes. By adopting the pinwheel scheduling of Sr's periodic transfer technology to transfer the period of all the messages into harmonic numbers [4], it will greatly enhance the schedulability. 3.4 Error Control and Flow Control Error control and re-transmission are realized by the response frame's receipt by the BC. By analyzing the executing process of instructions in the bus table, we have the following conclusion. Under the most complex situation, the BC should receive the response frame twice to assure the transmission of data is correct. So the maximum delay ofevery instruction set in the bus table (i.e., the time interval of every instruction's execution) is divided into two sections (t1 + t r )or three sections (t1 + t2 + t r ), here t1 and t2 are the time limit of waiting, and t r is the time left. The BC sends every frame and sets the clock at the same time. If the response frame is not received in t1 or t2, or incorrect response is received, or the response frame indicates that the receiver received the frame incorrectly, the BC transmits once more, or BC requests the RT to transmit once more, or returns a failure message to assure the correct execution of the next instruction. If the time of re-transmission is less than tr, the BC will startup re-transmission, otherwise the BC returns the error message. Re-transmission can reduce the code error ratio in the MAC layer [7]. RTCC presumes that the underlying network is reliable, so the time of re-transmission should not be too long, otherwise predictability is aected. Timely error information is also necessary in hard real-time systems. Flow control approaches in traditional networks, such as the stop-wait protocol and the sliding window protocol are not applicable in real-time networks, because they cannot assure the predictability of network data transmission. The

8 RTCC protocol adopts the non-feedback ow control approach [10] for real-time communication. Through precisely setting of sending and receiving speeds, this approach enables a receiver to take old data before new data is arrived all the time. 3.5 Network Services for Upper Layer The bus table builds real-time channels between nodes, from a sending port of one node to a receiving port of another node. One node can connect to more than one sending and receiving real-time channel. A real- time channel is equivalent to a message dened in RTCC. Each channel has its own time constraints. It is independent of other real-time channels, similar to an exclusive physical circuit. RTCC provides two basic functions for upper layer accessing real-time channels, rtccsend and rtccrecv. Upper layer software can call the two functions to transmit data directly or extend the network functions based on them, such as transmitting data of more than 1498 bytes, providing synchronous and asynchronous communication functions, etc. The two functions are dened as follows: { rtccsend(sendportnum, pbuffer, size, overwriteflag): Send data to a sending port sendportnum. Where pbuer is the address point of sending data size is equal or less than the length of data that the real-time channel can send at one time and overwriteflag stands for the written ag. If overwriteflag is TRUE, the new data can overwrite the data that has not been delivered. If it is FALSE, the new data can not overwrite the undelivered data, and the error return value indicates that the old data is not sent yet. { rtccrecv(recvportnum, pbuffer, size): Get the data from the receiving port. Where pbuer is the address point of receiving buer size is the length of received data. 4 Performance Measurement and Analysis The experimental setup of the RTCC protocol contains three Intel EV386EX embedded computers (clock rate is 25MHz, PC/104 bus). One is assigned as the BC, and the other two are assigned as RT. Each computer has a UM9008 type 10M Ethernet card that connects to a DE809-TC type HUB. The averages of message delays were measured through experiments. The delay ofpoint-to-point mode command messages is 103s. And the delay of broadcast mode command messages is 52s. All of the values measured have a deviation of 9s from the average values. The variation has no distinct relation with the dierence of data size of messages. The results show that the real-time channels have good real-time features. To the best of our knowledge, other implementations of realtime communication protocols on Ethernet are generally soft real-time (such as RETHER [9]). Therefore it is dicult to compare them with RTCC. Figure 4(a) shows the comparison of RTCC and the hard real-time communication protocol MIL-STD-1553B in terms of delays of messages as the data size of

9 messages increasing. Figure 4(b) displays the runtime overhead of messages of these two protocols. Table 1 lists some main performance criteria of several types of commonly used bus real-time networks. It can be found from table 1 that RT-Ethernet (an Ethernet using the RTCC protocol) has a good real-time performance, a higher bandwidth, and a larger data size a message is able to send at one time. So it should have a better potential to be widely adopted. Table 1. Features of Real-time Networks MIL-STD BITBUS ARCnet RT-Ethernet -1553B (RTCC) Speed (bps) 1M 62.5K-2.4M 2.5M 10M Determinism best Common Common Good Length (km) <0.09 <13.2 <6.7 <2.5 Max nodes Frame 1-32(16bits) (bits) 1-253(8bits) (8bits) Applictions Military, Industry Industry Monitor systems, aerospace, control control, Monitor systems, aviation Info systems Image processing, medical equipments Fig. 4. RTCC vs. 1553B: (a) Delay of Messages (b) Time Overhead 5 Conclusions The Ethernet-based RTCC protocol proposed in this paper uses command / response multiplex transmission and a bus table to schedule real-time messages. Through analysis and experiments we have shown that RTCC has a good realtime performance, is a simple protocol, and meets the requirements of real-time communications well. RTCC also meets the requirement of reliability for hard real-time systems. RTCC has been used in a national essential project of China in the aviation area and a monitoring system for patients in danger successfully.

10 Further work has been planned. That includes (1) Extending RTCC protocol to support multi-segment Ethernet (connected through bridges or routers), and (2) Studying the possibility of applying the RTCC in distributed soft real-time systems (such as distributed multimedia systems). References 1. ANSI/IEEE Standard 802.4: Token-Passing Bus Access Method and Physical Layer Specications ANSI Standard X3T9.5/88-139, Rev 4.0. FDDI Media Access Control (MAC) George, L. and Minet, P., "A solution preserving consistency of replicated objects with hard real-time constraints," Proceedings of the ISCA 12th International Conference on Parallel and Distributed Systems, Fort Lauderdale, FL, , Han, C. C. and Lin, K. J., "Scheduling distance-constrained real-time tasks," Proceedings IEEE Real-Time Systems Symposium, NewYork, , Malcolm, N. and Zhao, W., "Hard real-time communication in multipleaccess networks," Journal of Real-Time Systems, 8(1): 35 77, Malcolm, N. and Zhao, W., "The timed token protocol for real-time communication," IEEE Computers, 27(1): 35 41, Tanenbaum, A. S., Computer Networks. Prentice Hall, Tindell, K., Burns, A. and Wellings, A. J., "Analysis of hard real-time communication," Journal of Real-Time Systems, 9, , Venkatramani, C. and Chiueh, T., "Design, implementation, and evaluation of a software-driven real-time Ethernet protocol," Proceedings of the SIG- COMM'95 Conference, ACM, 27 37, Wang, Z. P., Xiong, G. Z., and Liu, J. D., "On the ow control problem of 1553B real-time network," Computer Science (in Chinese), 26(7): 80 82, Zhao, H., "Study of real-time connections and communications in eldbus networks," Journal of Computer Research & Development (in Chinese). 34(5): , 1997.

Additional Switched Ethernet Protocol for Industrial Hard Real-Time Traffic

Additional Switched Ethernet Protocol for Industrial Hard Real-Time Traffic Additional Switched Ethernet Protocol for Industrial Hard Real-Time Traffic ALIMUJIANG YIMING and TOSHIO EISAKA Dept of Computer Sciences Kitami Institute of Technology 165, Koen-cho, Kitami, Hokkaido

More information

Credit Determination of Fibre Channel in Avionics Environment

Credit Determination of Fibre Channel in Avionics Environment Chinese Journal of Aeronautics 20(2007) 247-252 Chinese Journal of Aeronautics www.elsevier.com/locate/cja Credit Determination of Fibre Channel in Avionics Environment LIN Qiang*, XIONG Hua-gang, ZHANG

More information

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz, Maryam Keyvani, Milan Nikolic, and Ljiljana Trajkovic * School of Engineering Science Simon Fraser University Vancouver, British Columbia, Canada

More information

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII

ECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing

More information

Real-Time (Paradigms) (47)

Real-Time (Paradigms) (47) Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Scheduling Algorithm for Hard Real-Time Communication in Demand Priority Network

Scheduling Algorithm for Hard Real-Time Communication in Demand Priority Network Scheduling Algorithm for Hard Real-Time Communication in Demand Priority Network Taewoong Kim, Heonshik Shin, and Naehyuck Chang Department of Computer Engineering Seoul National University, Seoul 151-742,

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS IAN RAMSAY PHILP. B.S., University of North Carolina at Chapel Hill, 1988

SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS IAN RAMSAY PHILP. B.S., University of North Carolina at Chapel Hill, 1988 SCHEDULING REAL-TIME MESSAGES IN PACKET-SWITCHED NETWORKS BY IAN RAMSAY PHILP B.S., University of North Carolina at Chapel Hill, 1988 M.S., University of Florida, 1990 THESIS Submitted in partial fulllment

More information

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1

Lecture 6. Data Link Layer (cont d) Data Link Layer 1-1 Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types

More information

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Media Access Control (MAC) Sub-layer and Ethernet

Media Access Control (MAC) Sub-layer and Ethernet Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF MAC Sub-layer The MAC sub-layer is a sub-layer

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

Contention Protocols and Networks

Contention Protocols and Networks 4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks

More information

Imi :... Data:... Nazwisko:... Stron:...

Imi :... Data:... Nazwisko:... Stron:... Imi :.................................................... Data:....................... Nazwisko:............................................... Stron:...................... 1. Which of the following protocols

More information

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc

Extensions to RTP to support Mobile Networking: Brown, Singh 2 within the cell. In our proposed architecture [3], we add a third level to this hierarc Extensions to RTP to support Mobile Networking Kevin Brown Suresh Singh Department of Computer Science Department of Computer Science University of South Carolina Department of South Carolina Columbia,

More information

1999, Scott F. Midkiff

1999, Scott F. Midkiff Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams

More information

NETWORKING COMPONENTS

NETWORKING COMPONENTS 1) OBJECTIVES NETWORKING COMPONENTS The objectives of this chapter are to familiarize with the following: - i) The LAN components ii) iii) iv) Repeater Hub Bridge v) Router vi) Gateway 2) INTRODUCTION

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network

FB(9,3) Figure 1(a). A 4-by-4 Benes network. Figure 1(b). An FB(4, 2) network. Figure 2. An FB(27, 3) network Congestion-free Routing of Streaming Multimedia Content in BMIN-based Parallel Systems Harish Sethu Department of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104, USA sethu@ece.drexel.edu

More information

2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS

2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS 2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS 2.1 Real-Time and Control Computer based digital controllers typically have the ability to monitor a number of discrete and analog inputs, perform complex

More information

Connection Admission Control for Hard Real-Time Communication in ATM Networks

Connection Admission Control for Hard Real-Time Communication in ATM Networks MITSUBISHI ELECTRIC RESEARCH LABORATORIES http://www.merl.com Connection Admission Control for Hard Real-Time Communication in ATM Networks Qin Zheng, Tetsuya Yokotani, Tatsuki Ichihashi, Yasunoni Nemoto

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

The Study of Intelligent Scheduling Algorithm in the Vehicle ECU based on CAN Bus

The Study of Intelligent Scheduling Algorithm in the Vehicle ECU based on CAN Bus Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1461-1465 1461 Open Access The Study of Intelligent Scheduling Algorithm in the Vehicle ECU based

More information

Lecture 9: Bridging & Switching"

Lecture 9: Bridging & Switching Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link

More information

Midterm Review EECS 122. University of California Berkeley

Midterm Review EECS 122. University of California Berkeley Midterm Review EECS 122 University of California Berkeley Topics Network Architecture Network hierarchy Layering Performance Link Layer Ethernet Wi-Fi 2 Review: Network WAN MAN 3 Review: Network WAN MAN

More information

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 3. Underlying Technology. TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Underlying Technology TCP/IP Protocol Suite 1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. OBJECTIVES: To briefly discuss the technology of dominant

More information

Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1

Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1 455 Throughput Analysis of Ethernet and Fiber Distributed Data Interface using OPNET IT Guru Academic Edition 9.1 Assistant Professor, Department of Computer Science and Engineering Punjabi University

More information

Fault-Tolerant Real-Time Communication in FDDI-Based Networks. Biao Chen, Sanjay Kamat and Wei Zhao. Texas A&M University

Fault-Tolerant Real-Time Communication in FDDI-Based Networks. Biao Chen, Sanjay Kamat and Wei Zhao. Texas A&M University Fault-Tolerant Real-Time Communication in FDDI-Based Networks Biao Chen, Sanjay Kamat and Wei Zhao Department of Computer Science Texas A&M University College Station, Texas 7783-32 Abstract FDDI-Based

More information

SIMULATION OF PACKET DATA NETWORKS USING OPNET

SIMULATION OF PACKET DATA NETWORKS USING OPNET Nazy Alborz Maryam Keyvani Milan Nikolic Ljiljana Trajkovic SIMULATION OF PACKET DATA NETWORKS USING OPNET TM Communication Networks Laboratory School of Engineering Science Simon Fraser University Road

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. Four data rates are

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application Ling Wang ling.wang2@wayne.edu Outline Introduction Parameterization Differentiation Evaluation

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21! CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2)

ENGI 4557 Digital Communications Practice Problems 2017 (Part 2) ENGI 4557 Digital Communications Practice Problems 207 (Part 2) H = n p i log 2 ( ) p i C = W log 2 ( + S N ) SNR = 6m + 0 log 0 ( 3σ2 x V ) 2 SNR = 6m 0 ( ) n n! = k k!(n k)! x = σ 2 = + + x p(x)dx (x

More information

Local Area Networks (LANs) SMU CSE 5344 /

Local Area Networks (LANs) SMU CSE 5344 / Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication

More information

FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC

FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC FDDI-M: A SCHEME TO DOUBLE FDDI S ABILITY OF SUPPORTING SYNCHRONOUS TRAFFIC Kang G. Shin Real-time Computing Laboratory EECS Department The University of Michigan Ann Arbor, Michigan 48109 &in Zheng Mitsubishi

More information

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker

(a) Client server model (b) MAN (c) Interfaces and services. [4+6+6] FirstRanker Code No: N0421/R07 Set No. 1 IV B.Tech I Semester Supplementary Examinations, March 2013 COMPUTER NETWORKS ( Common to Electronics & Communication Engineering, Electronics & Instrumentation Engineering,

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science

LAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science 1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

Multimedia-Systems. Operating Systems. Prof. Dr.-Ing. Ralf Steinmetz Prof. Dr. rer. nat. Max Mühlhäuser Prof. Dr.-Ing. Wolfgang Effelsberg

Multimedia-Systems. Operating Systems. Prof. Dr.-Ing. Ralf Steinmetz Prof. Dr. rer. nat. Max Mühlhäuser Prof. Dr.-Ing. Wolfgang Effelsberg Multimedia-Systems Operating Systems Prof. Dr.-Ing. Ralf Steinmetz Prof. Dr. rer. nat. Max Mühlhäuser Prof. Dr.-Ing. Wolfgang Effelsberg WE: University of Mannheim, Dept. of Computer Science Praktische

More information

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS

TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS TCOM 370 NOTES 99-1 NETWORKING AND COMMUNICATIONS Communication Networks Allow Exchange of Information between Users telephone network for voice communication interconnected computers and peripherals,

More information

Outline: Connecting Many Computers

Outline: Connecting Many Computers Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point

More information

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed

More information

Modes of Transfer. Interface. Data Register. Status Register. F= Flag Bit. Fig. (1) Data transfer from I/O to CPU

Modes of Transfer. Interface. Data Register. Status Register. F= Flag Bit. Fig. (1) Data transfer from I/O to CPU Modes of Transfer Data transfer to and from peripherals may be handled in one of three possible modes: A. Programmed I/O B. Interrupt-initiated I/O C. Direct memory access (DMA) A) Programmed I/O Programmed

More information

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay

CS 716: Introduction to communication networks. - 8 th class; 17 th Aug Instructor: Sridhar Iyer IIT Bombay CS 716: Introduction to communication networks - 8 th class; 17 th Aug 2011 Instructor: Sridhar Iyer IIT Bombay Key points to consider for MAC Types/Modes of communication: Although the medium is shared,

More information

A Boolean Expression. Reachability Analysis or Bisimulation. Equation Solver. Boolean. equations.

A Boolean Expression. Reachability Analysis or Bisimulation. Equation Solver. Boolean. equations. A Framework for Embedded Real-time System Design? Jin-Young Choi 1, Hee-Hwan Kwak 2, and Insup Lee 2 1 Department of Computer Science and Engineering, Korea Univerity choi@formal.korea.ac.kr 2 Department

More information

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product

Achieve Significant Throughput Gains in Wireless Networks with Large Delay-Bandwidth Product Available online at www.sciencedirect.com ScienceDirect IERI Procedia 10 (2014 ) 153 159 2014 International Conference on Future Information Engineering Achieve Significant Throughput Gains in Wireless

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

T H. Runable. Request. Priority Inversion. Exit. Runable. Request. Reply. For T L. For T. Reply. Exit. Request. Runable. Exit. Runable. Reply.

T H. Runable. Request. Priority Inversion. Exit. Runable. Request. Reply. For T L. For T. Reply. Exit. Request. Runable. Exit. Runable. Reply. Experience with Real-Time Mach for Writing Continuous Media Applications and Servers Tatsuo Nakajima Hiroshi Tezuka Japan Advanced Institute of Science and Technology Abstract This paper describes the

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

An Eective Selective Repeat ARQ Strategy for. High Speed Point-to-Multipoint Communications. Heliomar Medeiros de Lima BANCO DO BRASIL S. A.

An Eective Selective Repeat ARQ Strategy for. High Speed Point-to-Multipoint Communications. Heliomar Medeiros de Lima BANCO DO BRASIL S. A. An Eective Selective Repeat ARQ Strategy for High Speed Point-to-Multipoint Communications Heliomar Medeiros de Lima BANCO DO BRASIL S. A. CEDIP-RIO - Fax: +55 21 288.9245 Rio de Janeiro - RJ - Brasil

More information

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs

Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Journal of Modern Science and Technology Vol.2 No.1 March 2014. Pp.18-25 Reliable Multicast Scheme Based on Busy Signal in Wireless LANs Sunmyeng For unicast transmissions, the IEEE 802.11 WLAN MAC (Medium

More information

Dynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ

Dynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ Dynamic Voltage Scaling of Periodic and Aperiodic Tasks in Priority-Driven Systems Λ Dongkun Shin Jihong Kim School of CSE School of CSE Seoul National University Seoul National University Seoul, Korea

More information

Simulation of an ATM{FDDI Gateway. Milind M. Buddhikot Sanjay Kapoor Gurudatta M. Parulkar

Simulation of an ATM{FDDI Gateway. Milind M. Buddhikot Sanjay Kapoor Gurudatta M. Parulkar Simulation of an ATM{FDDI Gateway Milind M. Buddhikot Sanjay Kapoor Gurudatta M. Parulkar milind@dworkin.wustl.edu kapoor@dworkin.wustl.edu guru@flora.wustl.edu (314) 935-4203 (314) 935 4203 (314) 935-4621

More information

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING

2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1

More information

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.

1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing. /9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Abstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy

Abstract Studying network protocols and distributed applications in real networks can be dicult due to the need for complex topologies, hard to nd phy ONE: The Ohio Network Emulator Mark Allman, Adam Caldwell, Shawn Ostermann mallman@lerc.nasa.gov, adam@eni.net ostermann@cs.ohiou.edu School of Electrical Engineering and Computer Science Ohio University

More information

MULTIPLEXER / DEMULTIPLEXER IMPLEMENTATION USING A CCSDS FORMAT

MULTIPLEXER / DEMULTIPLEXER IMPLEMENTATION USING A CCSDS FORMAT MULTIPLEXER / DEMULTIPLEXER IMPLEMENTATION USING A CCSDS FORMAT Item Type text; Proceedings Authors Grebe, David L. Publisher International Foundation for Telemetering Journal International Telemetering

More information

Introduction to Open System Interconnection Reference Model

Introduction to Open System Interconnection Reference Model Chapter 5 Introduction to OSI Reference Model 1 Chapter 5 Introduction to Open System Interconnection Reference Model Introduction The Open Systems Interconnection (OSI) model is a reference tool for understanding

More information

Physical and Link Layers. CS144 Review Session 6 November 6 th, 2008 Roger Liao Based on slides by Ben Nham

Physical and Link Layers. CS144 Review Session 6 November 6 th, 2008 Roger Liao Based on slides by Ben Nham Physical and Link Layers CS144 Review Session 6 November 6 th, 2008 Roger Liao Based on slides by Ben Nham Outline Physical layer Encoding of signals Chips vs. bits Link layer Communication through shared

More information

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008

Computer Networks Medium Access Control. Mostafa Salehi Fall 2008 Computer Networks Medium Access Control Mostafa Salehi Fall 2008 2008 1 Outline Issues ALOHA Network Ethernet Token Ring Wireless 2 Main Issues Local Area Network (LAN) : Three or more machines are physically

More information

Distributed Video Systems Chapter 3 Storage Technologies

Distributed Video Systems Chapter 3 Storage Technologies Distributed Video Systems Chapter 3 Storage Technologies Jack Yiu-bun Lee Department of Information Engineering The Chinese University of Hong Kong Contents 3.1 Introduction 3.2 Magnetic Disks 3.3 Video

More information

An Efficient Scheduling Scheme for High Speed IEEE WLANs

An Efficient Scheduling Scheme for High Speed IEEE WLANs An Efficient Scheduling Scheme for High Speed IEEE 802.11 WLANs Juki Wirawan Tantra, Chuan Heng Foh, and Bu Sung Lee Centre of Muldia and Network Technology School of Computer Engineering Nanyang Technological

More information

Journal of Electronics and Communication Engineering & Technology (JECET)

Journal of Electronics and Communication Engineering & Technology (JECET) Journal of Electronics and Communication Engineering & Technology (JECET) JECET I A E M E Journal of Electronics and Communication Engineering & Technology (JECET)ISSN ISSN 2347-4181 (Print) ISSN 2347-419X

More information

A Scheme of Dynamic Bandwidth Allocation for Switching FC-AE-1553 Network

A Scheme of Dynamic Bandwidth Allocation for Switching FC-AE-1553 Network 4th Internatio Conference on Machinery, Materials and Computing Technology (ICMMCT 2016) A Scheme of Dynamic Bandwidth Allocation for Switching FC-AE-1553 Network Shaojun WU1,3*, Liqian WANG2,Yueying ZHAN1,

More information

ABSTRACT I. INTRODUCTION

ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2018 IJSRCSEIT Volume 3 Issue 3 ISS: 2456-3307 Hadoop Periodic Jobs Using Data Blocks to Achieve

More information

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for Computer Networks Computer Network Basics 1 QUESTION BANK 1. Segentation is done in (a) transport layer (c) data link layer 2. Network layer activities are: (d) physical layer (a) logical addressing (b)

More information

1: Review Of Semester Provide an overview of encapsulation.

1: Review Of Semester Provide an overview of encapsulation. 1: Review Of Semester 1 1.1.1.1. Provide an overview of encapsulation. Networking evolves to support current and future applications. By dividing and organizing the networking tasks into separate layers/functions,

More information

OVERHEADS ENHANCEMENT IN MUTIPLE PROCESSING SYSTEMS BY ANURAG REDDY GANKAT KARTHIK REDDY AKKATI

OVERHEADS ENHANCEMENT IN MUTIPLE PROCESSING SYSTEMS BY ANURAG REDDY GANKAT KARTHIK REDDY AKKATI CMPE 655- MULTIPLE PROCESSOR SYSTEMS OVERHEADS ENHANCEMENT IN MUTIPLE PROCESSING SYSTEMS BY ANURAG REDDY GANKAT KARTHIK REDDY AKKATI What is MULTI PROCESSING?? Multiprocessing is the coordinated processing

More information

A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE

A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE A NOVEL DECENTRALIZED ETHERNET-BASED PASSIVE OPTICAL NETWORK ARCHITECTURE A. Hadjiantonis, S. Sherif, A. Khalil, T. Rahman, G. Ellinas, M. F. Arend, and M. A. Ali, Department of Electrical Engineering,

More information

Node Application Logic. SCI Interface. Output FIFO. Input FIFO. Bypass FIFO M U X. Output Link. Input Link. Address Decoder

Node Application Logic. SCI Interface. Output FIFO. Input FIFO. Bypass FIFO M U X. Output Link. Input Link. Address Decoder Real-Time Message Transmission Over The Scalable Coherent Interface (SCI) Lei Jiang Sarit Mukherjee Dept. of Computer Science & Engg. University of Nebraska-Lincoln Lincoln, NE 68588-0115 Email: fljiang,

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

This formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go

This formula shows that partitioning the network decreases the total traffic if 1 N R (1 + p) < N R p < 1, i.e., if not all the packets have to go Chapter 3 Problem 2 In Figure 3.43 of the text every node transmits R bps, and we assume that both network partitions consist of 1 N nodes. So the total traffic generated by the nodes 2 of each Ethernet

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

requests or displaying activities, hence they usually have soft deadlines, or no deadlines at all. Aperiodic tasks with hard deadlines are called spor

requests or displaying activities, hence they usually have soft deadlines, or no deadlines at all. Aperiodic tasks with hard deadlines are called spor Scheduling Aperiodic Tasks in Dynamic Priority Systems Marco Spuri and Giorgio Buttazzo Scuola Superiore S.Anna, via Carducci 4, 561 Pisa, Italy Email: spuri@fastnet.it, giorgio@sssup.it Abstract In this

More information

Introduction to Real-Time Systems ECE 397-1

Introduction to Real-Time Systems ECE 397-1 Introduction to Real-Time Systems ECE 97-1 Northwestern University Department of Computer Science Department of Electrical and Computer Engineering Teachers: Robert Dick Peter Dinda Office: L477 Tech 8,

More information

\Classical" RSVP and IP over ATM. Steven Berson. April 10, Abstract

\Classical RSVP and IP over ATM. Steven Berson. April 10, Abstract \Classical" RSVP and IP over ATM Steven Berson USC Information Sciences Institute April 10, 1996 Abstract Integrated Services in the Internet is rapidly becoming a reality. Meanwhile, ATM technology is

More information

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable

Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Modeling a MAC Scheduler: Experiences with a DOCSIS Cable Network Simulation Model Jim Martin Department of Computer Science Clemson University jim.martin@cs.clemson.edu Phone: 864 656 4529 Fax: 864 656

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

Lecture 6 Datalink Framing, Switching. From Signals to Packets

Lecture 6 Datalink Framing, Switching. From Signals to Packets Lecture 6 Datalink Framing, Switching David Andersen Department of Computer Science Carnegie Mellon University 15-441 Networking, Spring 2005 http://www.cs.cmu.edu/~srini/15-441/s05/ 1 From Signals to

More information

Ecient Implementation of Sorting Algorithms on Asynchronous Distributed-Memory Machines

Ecient Implementation of Sorting Algorithms on Asynchronous Distributed-Memory Machines Ecient Implementation of Sorting Algorithms on Asynchronous Distributed-Memory Machines Zhou B. B., Brent R. P. and Tridgell A. y Computer Sciences Laboratory The Australian National University Canberra,

More information

Research on outlier intrusion detection technologybased on data mining

Research on outlier intrusion detection technologybased on data mining Acta Technica 62 (2017), No. 4A, 635640 c 2017 Institute of Thermomechanics CAS, v.v.i. Research on outlier intrusion detection technologybased on data mining Liang zhu 1, 2 Abstract. With the rapid development

More information

Chapter 2. Network Classifications (Cont.)

Chapter 2. Network Classifications (Cont.) Chapter 2 Network Classifications (Cont.) 2.3 Topological Network Classification Examining the Basics of a Network Layout To implement a network, you must first decide what topology will best meet your

More information

CIS 777 Telecommunications Networks

CIS 777 Telecommunications Networks CIS 777 Telecommunications Networks Columbus, OH 43210 Jain@cse.ohio-State.Edu These slides are available at: http://www.cse.ohio-state.edu/~jain/cis777-99/ 1 Overview How What When Why 2 Overview How

More information

Advantages and disadvantages

Advantages and disadvantages Advantages and disadvantages Advantages Disadvantages Asynchronous transmission Simple, doesn't require synchronization of both communication sides Cheap, timing is not as critical as for synchronous transmission,

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996.

The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. The Medium Access Control Scheme (MAC Layer) Reference: Andrew S. Tanenbaum, Computer Networks, 3rd Edition, Prentice Hall, 1996. 1 Table of Contents Introduction ALOHA Carrier Sense Multiple Sense (CSMA)

More information

Introduction to Real-time Systems. Advanced Operating Systems (M) Lecture 2

Introduction to Real-time Systems. Advanced Operating Systems (M) Lecture 2 Introduction to Real-time Systems Advanced Operating Systems (M) Lecture 2 Introduction to Real-time Systems Real-time systems deliver services while meeting some timing constraints Not necessarily fast,

More information

Dynamic Multi-Path Communication for Video Trac. Hao-hua Chu, Klara Nahrstedt. Department of Computer Science. University of Illinois

Dynamic Multi-Path Communication for Video Trac. Hao-hua Chu, Klara Nahrstedt. Department of Computer Science. University of Illinois Dynamic Multi-Path Communication for Video Trac Hao-hua Chu, Klara Nahrstedt Department of Computer Science University of Illinois h-chu3@cs.uiuc.edu, klara@cs.uiuc.edu Abstract Video-on-Demand applications

More information

Digital Communication Networks

Digital Communication Networks Digital Communication Networks MIT PROFESSIONAL INSTITUTE, 6.20s July 25-29, 2005 Professor Muriel Medard, MIT Professor, MIT Slide 1 Digital Communication Networks Introduction Slide 2 Course syllabus

More information