Token Bus. Message Exchange in Token Bus. Example. Problems with Token Bus
|
|
- Hilda Jennings
- 5 years ago
- Views:
Transcription
1 Token us Token -procedure: Only someone who possesses a certain ken (= bit sequence), may send. One example for a ken network: IEEE 80. Token us All s should be treated equally, i.e. they have pass on the ken cyclically or this: logical ordering of all s a ring In a bus pology, ordering is made regarding addresses: 9 Usage e.g. as a field bus (eldbus in German) in industrial environments with a high degree of noise. Purpose: e.g. roboter control; a few masters, many slaves (they only listen). Data rate is not that important, but guarantees in response times are necessary (not possible with Ethernet) Page Message Exchange in Token us Two types of messages are used: Token messages T ID, nextid ID Data messages M ID ID Data Token messages are used for passing on the sending permission ID nextid Data messages contain the data be sent Having the ken, a is allowed send a message. After this (or if nothing is be sent) the ken is passed on. Traffic on the bus e.g.: T 5,7 M 7 T 7, M T, T, T,6 M 6 T 6,9 T 9,5 M 5 T 5,7 High overhead for ken exchange: 5 it times for each ken message (a full small size Ethernet frame)! In contrast that, in Token Ring networks only one bit is be switched 0, i.e. only one bit time for a ken message. Thus, the number of participating s should be low, or the number of masters should be low, you can lerate very many slaves nextid Page Problems with Token us irst problem: a leaves the logical ring Easy solution: the leaving sends a message its predecessor indicating the new successor Second problem: a comes in the logical ring To allow new s join, in periodically intervals, a window is opened between neighbors, e.g. between 5 and 7. New s with IDs 6 6 now can apply. Problem: conflict risk! Several s could apply join in this window Conflict resolution: survival of the fittest. Consider last bits of the IDs: send a request join with a duration specified by the last bits of your ID: 00 send short 0 send longer 0 send even longer send longest If you hear anybody else sending longer than you, give up. If you survive without conflict, join. If there is no resolution (two or more s are sending for the same time, no one is sending longer), repeat with the second-last bit pair, etc. Page Example Assume a global window. Competirs: Winner! In case of some configuration error, two identical IDs are present: after checking all pairs of the IDs, continue by adding random bit pairs. Page
2 ut Industrial Ethernet Token Ring The Token-us approach is more and more displaced by Ethernet variants, e.g.: EtherCAT (since 00, ast Ethernet based on a bus, star or tree pology (very flexible) Uses TP or optical fiber as medium Synchronization necessary between all s A master polls the other s with a single Ethernet frame each has its one time slot read out /write in data Ethernet Powerlink ( Introduction of time slots and a cyclic timing schedule Whole time axis is divided in isochronous and asynchronous phase Isochronous: for time-critical data transfer Asynchronous: for non-time-critical data transfer A managing node assigns time slots (in both phases!): in the isochronous phase all s, in the asynchronous phase one particular Page 5 Token -procedure: Only someone who possesses a certain ken (= bit sequence), may send. based on standard IEEE 80.5 Token Ring the s share a ring of point--point connections the ken is cyclically passed on particularly suitable for rings Token Ring (/6/00 Mbit/s) Characteristics: guaranteed access, no collisions very good utilization of the network capacity, high efficiency fair, guaranteed response times possible: multiple kens however: complex and expensive Passing on the ken Page 6 Token Ring Sending and Receiving Characteristics Medium: twisted pair, coaxial cable or optical fiber Capacity of resp. 6 Mit/s (00Mb/s with optical fiber) Differential Manchester Code on layer The s are actively attached, i.e. received signals are regenerated (same principle as for repeaters, therefore no restriction of the ring s expansion) Station Point--Point Connection Active connecr Initial state Data are received the ring serially Data addressed a connecr s are copied Data are serially passed on along the ring the ring the ring Transmission state The ring is divided Own data are sent serially Data coming in the ring are evaluated by the the ring Page 7 Page 8
3 Access within a Token Ring Access within a Multiple Token Ring Example: Station sends. Station waits for free ken (transmission authorization, -yte- Token).. Station changes free ken in an occupied one (occupied ken = frame header). Afterwards, sends the frame. (Station may send further frames, if the ken holding timer (default 0 ms) is not exceeded). Station terminates the frame and waits until the frame passed the whole ring and arrives again.. Station copies the frame. Station removes it the ring and produces a new, free ken. remove entfernen kopieren copy Same example: Station sends. Station waits for free ken (transmission authorization).. Station changes free ken in an occupied one (occupied ken = frame header). Afterwards, sends the frame. (Station may send further frames, if the ken holding timer (default 0 ms) is not exceeded). Station terminates the frame and produces a new, free ken immediately.. Station copies the frame. Station removes it the ring. remove entfernen kopieren copy Page 9 Page 0 rame ormat for Token Ring rame ormat for Token Ring If the ring is inactive, only the -yte-token (SD, AC, ED) circulates. If a wants send, it sets a certain bit in this ken 0. ree ken, if a certain bit within AC is set. /6 /6 any DA SA Data CS rame End Delimiter Control (ED) (C) Access Control (AC) Start Delimiter (SD) End Delimiter (ED) rame Status SD and ED serve for marking the frame. They contain invalid sequences of the Differential Manchester code. Access control contains the ken bit, further a monir bit, priority bits and reservation bits. rame control marks the kind of the frame: Data, control, yte rame status contains confirmation bits A and C. If a frame arrives at the with the destination address, bit A is set. If the processes the frame, also bit C is set. When the sending gets the frame back, it can see whether the receiving is not working (A = 0, C = 0), if the frame was not accepted (A =, C = 0), or whether the frame was received correctly (A =, C = ). To protect against bit errors, both bits are doubly present. The addresses and the checksum are identical Ethernet. its of access control: Themonir bit serves for recognition of a second frame circulation Thepriority bits make possible several priorities. They indicate the priority of the ken. If a wants send with priority n, it must wait for a ken of priority n or higher. Thereservation bits permit a reserve the next frame for itself. If a wants do this, it registers its priority in the reservation bits. This is only possible, if not already a higher priority is registered. During the next ken generation, the priority is copied in the priority bits. Page Page
4 Ring Maintenance To check the correct function of the ring, a monir is introduced. If this crashes, another is raised as monir : if a recognizes that the monir is inactive, this sends a certain ken (CLAIM_TOKEN). This can be done by several s simultaneously. If such a message arrives with a smaller ID then suppress it. If a message arrives with larger ID then pass it on. If a CLAIM_TOKEN message arrives with own ID: this is the new monir. iber Distributed Data Interface (DDI) DDI is a high performance ken ring LAN based on optical fibers ANSI standard XT9.5 Data rates of 00 Mit/s Range of up 00 km (MAN?) Support of up 000 s, with distances of maximally km Often used as ackbone for small LANs Host ridge 80. LAN Tasks of the monir : New generation of the ken after a ken loss Reaction ring collapse Removal of frame fragments Deletion of old, circulating frames or each problem an own ken is defined. Additionally if necessary also timers are used. Page 80.5 LAN ridge DDI ring Successor: DDI-II, supports besides normal data also synchronous circuit switched PCM data (speech) and ISDN traffic Variant: CDDI (Copper Distributed Data Interface), with 00 Mit/s over Twisted Pair Page Structure of DDI DDI Configurations Wiring within DDI: optical fiber rings with opposite transmission direction During normal operation, only the primary ring is used, the secondary ring remains in readiness Normaler asic double Doppel-Ring ring Double ring Doppelter with connected Ring mit Einzelring-Erweiterung single Einfacher Simple DDI DDI-Ring ring NAC If the ring breaks, the other one (also called protection ring) can be used. If both rings break or if a precipitates, the rings can be combined in only one, which has double length: DAC SAC SAC = Dual Attachment Station = Single Attachment Station Two classes of s exist: (Dual Attachment Station) can be attached both rings, the cheaper (Single Attachment Station) are only attached one ring. DAC = Dual Attachment Concentrar NAC =Null Attachment Concentrar SAC = Single Attachment Concentrar y means of the concentrars several rings can be linked. Page 5 Page 6
5 Transmission within DDI Synchronous Transmission of Data Coding /5 code, thus coding of bits of data in 5 bits which are transferred Synchronization Transmission of a long preamble in order synchronize the receiver the sender clock pulse. The clocks of all s must run stable on at least 0.005%. With such a stability, frames with up 500 byte of data can be transferred without the receiver losing the clock pulse. Procols The fundamental procols of DDI are similar IEEE 80.5 (ken ring): in order transmit data, a must acquire the ken. Then it transfers its frame and takes it the ring when it returns it. Due the expansion of DDI, a single ken is unpractical. Therefore, DDI transfers in the multiple ken mode. Original transmission principle within DDI: Use of asynchronous frames, i.e. sending can be started any time. Additionally, with DDI-II also the use of synchronous frames for circuit switched PCM or ISDN data (telephony) is possible: every 5 µs a master produces synchronous frames for reaching the 8000 samples / second necessary for PCM. every frame consists of 6 byte for non-circuit-switched data and up 96 byte for circuit switched data (up 96 PCM channels per frame). if a once uses fixed slots in a frame, these are considered for it as reserved until the releases them expressly (implicit reservation). unused synchronous slots of the frame are assigned on request any. Ring and management also are similar IEEE 80.5, additionally a function for deviating traffic the protection ring is included. Page 7 Page 8 Data frames with DDI The data frames are similar those used in the ken ring format: Conclusion: Local Area Networks 8 /6 /6 Up 80 Preamble DA SA Data CS rame Control (C) Start Delimiter (SD) End Delimiter (ED) rame Status Thepreamble is used for the synchronization as well as for the preparation of the s a following transmission Start and end delimiter are being used for marking the frame rame control specifies the type of the frame: data, control, synchronously/asynchronously, Here, also several kens are differentiated for the possible traffic types. rame status contains confirmation bits as in IEEE 80.5 Addresses and the CS are as in IEEE 80.5 yte Token Preamble S D C E D Page 9 Three main approaches: Ethernet for networks sporadic, bursty traffic Token us for networks with a few sending s having timing guarantees Token Ring for networks with many s having timing guarantees. Also suited for MANs Today s trend: Ring networks (DDI) still in use in older MANs, no longer used in the LAN area ield busses still in use as field busses, but Ethernet variants take over the market Everything tends Ethernet Page 0
Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control
Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media
More informationIntroduction to Networks and the Internet
Introduction to Networks and the Internet HTML tutorial today. Announcements CMPE 80N Spring 2003 Week 5 1 2 MAC Protocols MAC Protocols Round-robin. Scheduled-access. Contention-based. Contention-based
More informationFDDI. L26 - Fibre Distributed Data Interface (FDDI) L26 - Fibre Distributed Data Interface (FDDI) FDDI - Fiber Distributed Data Interface
FDDI - Fiber Distributed Data Interface FDDI Fiber Distributed Data Interface Principles, Framing and Procedures set of standards defining a shared media 100 Mbps LAN (MAN) main topology: dual ring of
More informationToken Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1
Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations
More informationModule 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur
Module 5 Broadcast Communication Networks Lesson 5 High Speed LANs Token Ring Based Specific Instructional Objectives On completion, the student will be able to: Explain different categories of High Speed
More informationGoals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions
Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the
More informationCARRIER SENSE MULTIPLE ACCESS (CSMA):
Lecture Handout Computer Networks Lecture No. 8 CARRIER SENSE MULTIPLE ACCESS (CSMA): There is no central control management when computers transmit on Ethernet. For this purpose the Ethernet employs CSMA
More informationContention Protocols and Networks
4/13/2005 314 Lecture Contention Protocols and Networks 1 Contention Protocols and Networks Contention Protocols CSMA/CD Network Topologies Ethernet 4/13/2005 314 Lecture Contention Protocols and Networks
More informationMultiple Access Protocols
Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just
More informationLAN. CS 4/55231 Internet Engineering. Kent State University Dept. of Computer Science
1 CS 4/55231 Internet Engineering Kent State University Dept. of Computer Science LECT-4A4 LAN 1 2 LAN Topologies-1 In the last class we saw how two computers can connect to each other. In this class we
More informationChapter 15 Local Area Network Overview
Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard
More informationLocal Area Networks (LANs) SMU CSE 5344 /
Local Area Networks (LANs) SMU CSE 5344 / 7344 1 LAN/MAN Technology Factors Topology Transmission Medium Medium Access Control Techniques SMU CSE 5344 / 7344 2 Topologies Topology: the shape of a communication
More informationEITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst
EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error
More informationToken Ring/IEEE 802.5
CHAPTER 9 Token /IEEE 802.5 Background The Token network was originally developed by IBM in the 1970s. It is still IBM s primary local area network (LAN) technology and is second only to Ethernet/IEEE
More informationECE 333: Introduction to Communication Networks Fall Lecture 19: Medium Access Control VII
ECE : Introduction to Communication Networks Fall 2002 Lecture 9: Medium Access Control VII More on token ring networks LAN bridges and switches. More on token rings In the last lecture we began discussing
More informationReal-Time (Paradigms) (47)
Real-Time (Paradigms) (47) Memory: Memory Access Protocols Tasks competing for exclusive memory access (critical sections, semaphores) become interdependent, a common phenomenon especially in distributed
More informationToday. Last Time. Motivation. CAN Bus. More about CAN. What is CAN?
Embedded networks Characteristics Requirements Simple embedded LANs Bit banged SPI I2C LIN Ethernet Last Time CAN Bus Intro Low-level stuff Frame types Arbitration Filtering Higher-level protocols Today
More informationET4254 Communications and Networking 1
Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data
More informationInternet Architecture and Protocol
Internet Architecture and Protocol Set# 03 Local Area Networks Delivered By: Engr Tahir Niazi Layer Reference to Protocol Application Presentation Session Application FTP, Telnet, SMTP, HTTP, SNMP.. Transport
More informationNetworking Technologies and Applications
Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution
More information1999, Scott F. Midkiff
Lecture Topics Direct Link Networks: Multiaccess Protocols (.7) Multiaccess control IEEE 80.5 Token Ring and FDDI CS/ECpE 556: Computer Networks Originally by Scott F. Midkiff (ECpE) Modified by Marc Abrams
More informationCSE/EE 461 Section 2
CSE/EE 461 Section 2 Latency in a store-and-forward network 4ms, 10MB/s B How long does it take to send a 2kB packet from to B? 2ms, 10MB/s C 2ms, 10MB/s B What if it has to pass through a node C? Plan
More informationLocal Area Network Overview
Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and
More informationIEEE 802 LANs SECTION C
IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison
More informationGood day. In the last lecture, we talked about various multiple access schemes and one of this set of schemes is token bus DQD etc.
Computer Networks Prof. Sujoy Ghosh Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture - 14 Token-Based MAC Good day. In the last lecture, we talked about various
More informationObjectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet
2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various
More informationELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition
ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #2 Due Thursday, Nov 10 th By midnight Homework #5 Due Thursday, Nov 17 th Later this semester: Homework
More informationIntegrating Information Systems: Technology, Strategy, and Organizational Factors
MASSACHUSETTS INSTITUTE OF TECHNOLOGY SLOAN SCHOOL OF MANAGEMENT 15.565 Integrating Information Systems: Technology, Strategy, and Organizational Factors 15.578 Global Information Systems: Communications
More informationOutline: Connecting Many Computers
Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point
More informationThe Link Layer and LANs. Chapter 6: Link layer and LANs
The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple
More informationFundamentals of Networking Introduction to Networking Devices
Fundamentals of Networking Introduction to Networking Devices Kuldeep Sonar 1 NIC (Network Interface Card) A network interface provides connectivity from an end-user PC or laptop to the public network.
More informationLocal Area Network(LAN)
Local Area Network(LAN) A local area network (LAN) is a computer network that interconnects computers within a limited area. Example: a residence, school, laboratory, university campus,office building
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationLecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren
Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits
More informationM242 COMPUTER NETWORS AND SECURITY
M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location
More information2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS Collision Free Protocols 2.3 FDDI 2.4 DATA LINK LAYER DESIGN ISSUES 2.5 FRAMING & STUFFING
UNIT-2 2.1 CHANNEL ALLOCATION 2.2 MULTIPLE ACCESS PROTOCOLS 2.2.1 Pure ALOHA 2.2.2 Slotted ALOHA 2.2.3 Carrier Sense Multiple Access 2.2.4 CSMA with Collision Detection 2.2.5 Collision Free Protocols 2.2.5.1
More informationData Link Layer, Part 3 Medium Access Control. Preface
Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
More informationMultiple Access Channels
Multiple Access Channels Some Queuing Theory MAC: Aloha, ethernet Exponential backoff & friends LANs: Local Area Networks Goal: extend benefits of simple connection as far as possible Means: Share medium
More informationJaringan Komputer. Broadcast Network. Outline. MAC (Medium Access Control) Channel Allocation Problem. Dynamic Channel Allocation
Broadcast Network Jaringan Komputer Medium Access Control Sublayer 2 network categories: point-to-point connections broadcast channels Key issue in broadcast network: how to determine who gets to use the
More informationThe Network Access Layer. In This Lecture. Network Access Layer. Hour 3
The Network Access Layer Hour 3 In This Lecture Explain what the Network Access layer is Discuss how TCP/IP's Network Access layer relates to the OSI networking model Explain what a network architecture
More informationData Link Layer, Part 5. Medium Access Control
CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU
More informationBiSS C (unidirectional) PROTOCOL DESCRIPTION
Rev A2, Page 1/10 FEATURES Unidirectional sensor interface Synchronous, real-time-capable data transmission Fast, serial, safe Point-to-point or multiple slaves networks Compact and cost-effective Open
More informationMedium Access Protocols
Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning
More informationLinks. Error Detection. Link Layer. Multiple access protocols. Nodes Links Frame. Shared channel Problem: collisions How nodes share a channel
Link Layer Error Detection Nodes Links Frame R yclic Redundancy hecksum Parity its More about this in exercise! Data Link Layer -1 Data Link Layer -2 Links Two types of links : point-to-point broadcast
More informationDifferent network topologies
Network Topology Network topology is the arrangement of the various elements of a communication network. It is the topological structure of a network and may be depicted physically or logically. Physical
More informationMedium Access Control. IEEE , Token Rings. CSMA/CD in WLANs? Ethernet MAC Algorithm. MACA Solution for Hidden Terminal Problem
Medium Access Control IEEE 802.11, Token Rings Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 9/15/06 CS/ECE 438 - UIUC, Fall 2006 1 9/15/06 CS/ECE
More informationLink Layer and Ethernet
Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple
More informationRedes de Computadores. Medium Access Control
Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium
More informationCOMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1
Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing
More informationThe random access methods we study in this chapter have evolved from a very interesting protocol known as ALOHA, which used a very simple procedure
Multiple Accesses When nodes or stations are connected and use a common link, called a multipoint or broadcast link, we need a multiple-access protocol to coordinate access to the link. The problem of
More informationTelematics Chapter 5: Medium Access Control Sublayer
Telematics Chapter 5: Medium Access Control Sublayer User watching video clip Beispielbild Application Layer Presentation Layer Session Layer Transport Layer Server with video clips Application Layer Presentation
More informationCS 455/555 Intro to Networks and Communications. Link Layer
CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer
More informationLecture 4b. Local Area Networks and Bridges
Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable
More informationSummary of MAC protocols
Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,
More informationIEEE , Token Rings. 10/11/06 CS/ECE UIUC, Fall
IEEE 802.11, Token Rings 10/11/06 CS/ECE 438 - UIUC, Fall 2006 1 Medium Access Control Wireless channel is a shared medium Need access control mechanism to avoid interference Why not CSMA/CD? 10/11/06
More informationLecture 9: Bridging & Switching"
Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link
More informationLocal Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins. Part 3: Packet Switching and. Network Technologies.
Part 3: Packet Switching and Gail Hopkins Local Area Networks (LANs): Packets, Frames and Technologies Gail Hopkins Introduction Circuit Switching vs. Packet Switching LANs and shared media Star, bus and
More informationPart3. Local Area Networks (LAN)
Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly
More informationCS 43: Computer Networks. 27: Media Access Contd. December 3, 2018
CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently
More informationReview For Exam 2. Internetworking. Summary Questions. School of Business Eastern Illinois University. School of Business Eastern Illinois University
School of Business Review For Exam 2 Wednesday 10/6/2004) Abdou Illia, Fall 2004 School of Business Internetworking 3 1. Name the two most known Medium Access Control Protocols found in LANs. How they
More informationLinks Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame
Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared
More informationData Link Layer (Sicherungsschicht) Medium Access Control (Zugriffsverfahren)
Data Link Layer (Sicherungsschicht) Medium Access Control (Zugriffsverfahren) f References: [Bossert99] [Wa0102] www.comnets.uni-bremen.de MAC - 1 LOGICAL LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING
More informationTopics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:
1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies
More informationSystems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded
Communication Roland Institute of Computer Engineering Vienna University of Technology 10. November 2010 Overview 1. Definition of a protocol 2. Protocol properties 3. Basic Principles 4. system communication
More informationCSE 461: Multiple Access. Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58
CSE 461: Multiple Access Homework: Chapter 2, problems 1, 8, 12, 18, 23, 24, 35, 43, 46, and 58 Next Topic Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for
More informationCS343: Data Communication LAN Overview
CS343: Data Communication LAN Overview by Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Guwahati E-mail: manaskhatua@iitg.ac.in Communication Network Topology Topology refers to the way in which
More informationCSE 461: Multiple Access Networks. This Lecture
CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.
More informationFundamentals of Networking Types of Topologies
Fundamentals of Networking Types of Topologies Kuldeep Sonar 1 Bus Topology Bus topology is a network type in which every computer and network device is connected to single cable. When it has exactly two
More informationCSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!
CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also
More informationUnit II. Part A (2 Marks)
Unit II Part A (2 Marks) 1. Differentiate fast Ethernet and Gigabit Ethernet. Fast Ethernet increased speed from 10 to 100 megabits per second (Mbit/s). Gigabit Ethernet was the next iteration, increasing
More informationNetworks 15.2 Multiplexing Technologies Access Networks 15.5 Common Peripheral Interfaces
Chapter 15 Computer and Multimedia Networks 15.11 Basics of Computer and Multimedia Networks 15.2 Multiplexing Technologies 15.3 LAN and WAN 15.4 Access Networks 15.5 Common Peripheral Interfaces 15.6
More informationChapter 10: Local Area Networks
Chapter 10: Local Area Networks MULTIPLE CHOICE 1. CSMA stands for: a. Client-Server Multi-Access c. Carrier Server Master Application b. Carrier Sense Multiple Access d. none of the above 2. The CD in
More informationCS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017
CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,
More informationData Link Layer -2- Network Access
EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control
More informationUNIT II DATA LINK LAYER 10
UNIT II DATA LINK LAYER 10 Error detection and correction Parity LRC CRC Hamming code flow Control and Error control - stop and wait go back-n ARQ selective repeat ARQ- sliding window HDLC. - LAN - Ethernet
More informationLAN Systems. Bus topology LANs
Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong
More informationHighly Available Networks
Highly Available Networks Pamela Williams Dickerman Advanced Technology Consultant Michael Hayward Hewlett-Packard Company Copyright 1996 Hewlett-Packard Co., Inc. Table of Contents Abstract Single Points
More informationGoal and Outline. Computer Networking. What Do We Need? Today s Story Lecture 3: Packet Switched Networks Peter Steenkiste
Goal and Outline 15-441 15-641 Computer Networking Lecture 3: Packet Switched Networks Peter Steenkiste Fall 2016 www.cs.cmu.edu/~prs/15 441 F16 Goal: gain a basic understanding of how you can build a
More informationRMIT University. Data Communication and Net-Centric Computing COSC 1111/2061/1110. Lecture 8. Medium Access Control Methods & LAN
RMIT University Data Communication and Net-Centric Computing COSC 1111/2061/1110 Medium Access Control Methods & LAN Technology Slide 1 Lecture Overview During this lecture, we will Look at several Multiple
More informationMAC in /20/06
MAC in 802.11 2/20/06 MAC Multiple users share common medium. Important issues: Collision detection Delay Fairness Hidden terminals Synchronization Power management Roaming Use 802.11 as an example to
More informationNetwork Topology. By Dr. Piya Techateerawat. Bus Topology Ring Topology Star Topology Fully Connected Topology. Combined Topology
By Dr. Piya Techateerawat Network Topology Bus Topology Ring Topology Star Topology Fully Connected Topology (Please refer to the 1 st lecture) Combined Topology Local Area Network IEEE 802.3:- Ethernet
More informationPage 1 of 5 Print this Page Close this Window TECHNICAL ARTICLE: STANDARDS-BASED REAL TIME ETHERNET NOW OFF-THE-SHELF Almost every major user organisation is currently propagating its own Ethernet-based
More informationCh. 4 - WAN, Wide Area Networks
1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate
More informationComputer Networks and Internet
Computer Networks and Internet Objectives Computer Networks Internet 2 Computer Networks Introducing Computer Networks A computer network consists of two or more computers linked together to exchange data
More informationAdaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols
Link Layer: Introduction daptors ommunicating hosts and routers are nodes links connect nodes wired links wireless links layer-2 packet is a frame, encapsulates datagram datagram controller sending host
More information1/29/2008. From Signals to Packets. Lecture 6 Datalink Framing, Switching. Datalink Functions. Datalink Lectures. Character and Bit Stuffing.
/9/008 From Signals to Packets Lecture Datalink Framing, Switching Peter Steenkiste Departments of Computer Science and Electrical and Computer Engineering Carnegie Mellon University Analog Signal Digital
More informationData always flows in one direction around ring Like Ethernet, all nodes see all frames, and protocol is necessary to decide when to send
Token Ring Developed by IBM, adopted by IEEE as 802.5 standard Token rings latter extended to FDDI (Fiber Distributed Data Interface) and 802.17 (Resilient Packet Ring) standards Nodes connected in a ring
More informationLecture 6 Datalink Framing, Switching. From Signals to Packets
Lecture 6 Datalink Framing, Switching David Andersen Department of Computer Science Carnegie Mellon University 15-441 Networking, Spring 2005 http://www.cs.cmu.edu/~srini/15-441/s05/ 1 From Signals to
More informationReminder: Datalink Functions Computer Networking. Datalink Architectures
Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram
More informationAdaptors Communicating. Link Layer: Introduction. Parity Checking. Error Detection. Multiple Access Links and Protocols
Link Layer: Introduction daptors ommunicating Terminology: hosts and routers are nodes communication channels that connect adjacent nodes along communication path are links wired links wireless links LNs
More informationMessage, Segment, Packet, and Frame Link-layer services Encoding, framing, error detection, transmission control Error correction and flow control
Links EE 122: Intro to Communication Networks Fall 2007 (WF 4-5:30 in Cory 277) Vern Paxson TAs: Lisa Fowler, Daniel Killebrew & Jorge Ortiz http://inst.eecs.berkeley.edu/~ee122/ Announcements Homework
More informationData Communications. Data Link Layer Protocols Wireless LANs
Data Communications Data Link Layer Protocols Wireless LANs Wireless Networks Several different types of communications networks are using unguided media. These networks are generally referred to as wireless
More informationConcept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.
83 Chapter 6 Ethernet Technologies and Ethernet Switching Ethernet and its associated IEEE 802.3 protocols are part of the world's most important networking standards. Because of the great success of the
More informationOutline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties
Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers
More informationLecture 6. Data Link Layer (cont d) Data Link Layer 1-1
Lecture 6 Data Link Layer (cont d) Data Link Layer 1-1 Agenda Continue the Data Link Layer Multiple Access Links and Protocols Addressing Data Link Layer 1-2 Multiple Access Links and Protocols Two types
More informationLAN PROTOCOLS. Beulah A AP/CSE
LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety
More informationLink Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.
Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple
More informationComputer Network Fundamentals Spring Week 3 MAC Layer Andreas Terzis
Computer Network Fundamentals Spring 2008 Week 3 MAC Layer Andreas Terzis Outline MAC Protocols MAC Protocol Examples Channel Partitioning TDMA/FDMA Token Ring Random Access Protocols Aloha and Slotted
More information