Real-Time, Determinism and Ethernet

Size: px
Start display at page:

Download "Real-Time, Determinism and Ethernet"

Transcription

1 Real-Time, Determinism and Ethernet Paul Taylor Slide 1

2 Agenda Definitions Real-Time Determinism Control Network Ethernet Evolution Bandwidth Switches Fast Ethernet Full Duplex Prioritisation Redundancy Real-Time / Determinism with Ethernet Mathematical Example Slide 2

3 Definitions Real-Time Adjective :(computer science) of a system, in which dataprocessing occurs as the data is generated. Real-time systems are systems that respond to an input immediately. Any system which uses some kind of shared transmission medium cannot be a real-time system under this definition. Slide 3

4 Definitions - Determinism Determinism. The ability for a system to respond with a consistent, predictable time delay between input and response. This time delay is commonly referred to as a scan time and is usually given a maximum value. Slide 4

5 Definitions Control Network That network which links the controllers of a process to the devices which the process controls. May also link several controllers to one (or more) master controllers. Merges with the automation network and the device network. Information Automation Control Device Slide 5

6 IBM Ethernet Evolution - The ALOHA network Terminal Terminal Pioneered the concept of a shared transmission channel, or the CSMA/CD model. Developed to link the IBM 360 mainframe to the other islands of Hawaii Outbound channel uses one to many transmission All inbound transmissions use same channel frequency with possible contention IBM Mainframe University of Hawaii Terminal Acknowledgements sent to everyone simultaneously Slide 6

7 Ethernet Evolution - The First Ethernet Designed by Bob Metcalf at PARC in 1972/3 Slide 7

8 Ethernet Evolution Ethernet today is not the same as it was when it was invented 30 years ago. Improvements have consisted of : Higher bandwidth Dual duplex communication Switching Prioritisation VLANs Slide 8

9 Ethernet Evolution - Bandwidth 1000 Mbps IEEE 802.3c 1BASE5 StarLAN standard 100 Mbps 10 Mbps ALOHA network runs in Hawaii Bob Metcalf invents Ethernet at PARC DIX Ethernet v2.0 specification IEEE BASE2 standard IEEE 802.3i 10BASE-T standard IEEE 802.3z 1000BASE-T standard 1 Mbps 0.1 Mbps 0.01 Mbps IEEE BASE5 standard IEEE BASE-T standard Slide 9

10 Ethernet Evolution Half, Full and Dual Duplex Half duplex one pair of cables used for communication. Can either be for transmission or reception, but not both at the same time. Full duplex two pairs of cables used for communication. One pair for transmission, one for reception. Dual duplex one pair of cables used for communication. The pair can be used for transmission and reception at the same time. Slide 10

11 Ethernet Evolution - Switching Original Ethernet composed of one collision domain. Only one device at a time can talk. Collision Slide 11

12 F1 F6 F2 F7 F3 F8 F4 F9 F5 F1 Ethernet Evolution - Switching Switched Ethernet has broken up the collision domains Now lots of little collision domains. Still only half duplex. TX Collision TX Slide 12

13 F1 F6 F2 F7 F3 F8 F4 F9 F5 F1 Ethernet Evolution - Switching Switched Ethernet with full duplex communication Now there are no collision domains and hence no collisions! Slide 13

14 Ethernet Evolution Prioritisation (QoS) Original Ethernet standards Maximum frame size 1518 bytes Preamble SFD Destination- Address Source Address Length/ Type Data FCS 64 byte byte Recent change to allow Prioritisation Maximum frame size 1522 bytes (increase of 4 bytes) Preamble SFD Destination- Address Source Address TAG Length/ Type Data FCS TPID TCI TPID = Tag Protocol Identifier Tag Protocol ID User Priority CFI VLAN ID TCI = Tag Control Information 16 bit 3 bit 1 bit 12 bit CFI = Canonical Format Indicator Slide 14

15 Ethernet Evolution Prioritisation (QoS) + Attach File Video Voice Voice Video File Priority Slide 15

16 Ethernet Evolution - VLANs Part of the same development as Prioritisation was VLANs or Virtual Local Area Networks. DTE can be tagged as belonging to a virtual LAN. Any traffic for something outside of that VLAN will not be accepted by the DTE. Switches too can monitor VLAN traffic and will not pass on frames that are not for that VLAN. Slide 16

17 Ethernet Evolution - VLANs Personnel Department Personnel Server Admin Server Admin Department Employees Server Employees Slide 17

18 Ethernet Evolution - Redundancy Spanning Tree? No, Industrial Redundancy! Windows NT, 2000 etc a b Slide 18

19 Bringing it all together By combining all the recent developments of Ethernet together, data throughput is greatly increased. 100Mbit/s switched full duplex 200Mbit/s 100Mbit/s switched 100Mbit/s 100Mbit/s shared 10Mbit/s switched full duplex 10Mbit/s switched 10Mbit/s shared 10Mbit/s 4Mbit/s 20Mbit/s 40Mbit/s Slide 19

20 Real-Time Ethernet So is Ethernet a real-time control network? Consider our original definition of real-time Adjective :(computer science) of a system, in which dataprocessing occurs as the data is generated. No, Ethernet cannot be considered a real-time control network, a control network definitely, but not a real-time one. BUT, what about a deterministic one?? Slide 20

21 Deterministic Ethernet Consider this typical RS485 bus network Bus Termination 500m Bus Termination Master Controller I/O 1 I/O 31 I/O Density site 500m I/O I/O 500m Density Density site site I/O Density site Slide 21

22 Cascading of 10/100 Switches SW1 SW2 SW3 SW4 100 Mbit/s 100 Mbit/s 100 Mbit/s 10 Mbit/s 10 Mbit/s 10 Mbit/s 10 Mbit/s 10 Mbit/s M S7 S8 S1 S8 S15 S16 S23 S24 S31 M M=Master; S= Slave; SW= Switch RS1 Application with one Master, 31 Slaves and 4 RS1-Switches Slide 22

23 Cascading of 10/100 Switches Multicast from Master to all Slaves: Send packet from Master to SW1: 57.6µs Latency in SW1: Receive packet in Slave 1: 57.6µs Send packet S1 to SW2: 5.76µs Transmit time SW1 to SW2 : 2.5µs Latency in SW2: Send packet SW2 to SW3: 5.76µs Transmit time SW2 to SW3 2.5µs Latency in SW3: Send packet SW3 to SW4: 5.76µs Transmit time SW3 to SW4 2.5µs Latency in SW4: Receive packet in Slave 31: 57.6µs Total time: µs Receive packet at slave 1 Receive packet at slave 31 This time is called: Receive variance 36.78µs Slide 23

24 Cascading of 10/100 switches All Slaves sending response to Master: Send packet Slaves to SW4: 57.6µs Latency in SW4: Send packet from SW4 to SW3: 52.8µs Transmit time SW4 to SW3: 2.5µs Latency in SW3: Send packet SW3 to SW2: 52.8µs Transmit time SW3 to SW2 2.5µs Latency in SW2: Send packet SW2 to SW1: 52.8µs Transmit time SW2 to SW1 2.5µs Latency in SW1: Send packet SW1 to Master: 528.0µs Total time: 767.5µs Slide 24

25 Upgrading all links to 100Mbps SW1 SW2 SW3 SW4 100 Mbit/s 100 Mbit/s 100 Mbit/s 100 Mbit/s 100 Mbit/s 100 Mbit/s 100 Mbit/s 100 Mbit/s M S1 S8 S15 S16 S23 S24 S31 M = Master; S = Slave; SW = Switch RS2 Application with one Master, 31 Slaves and 4 RS2-Switches Slide 25

26 Upgrading all links to 100Mbps Multicast from Master to all Slaves: Send packet from Master to SW1: 5.76µs Latency in SW1: Receive packet in Slave 1: 5.76µs Send packet S1 to SW2: 5.76µs Transmit time SW1 to SW2 : 2.5µs Latency in SW2: Send packet SW2 to SW3: 5.76µs Transmit time SW2 to SW3 2.5µs Latency in SW3: Send packet SW3 to SW4: 5.76µs Transmit time SW3 to SW4 2.5µs Latency in SW4: Receive packet in Slave 31: 5.76µs Total time taken: 52.3µs Receive packet at slave 1 Receive packet at slave 31 This time is called: Receive variance 36.78µs Slide 26

27 Upgrading all links to 100Mbps All Slaves sending response to Master: Send packet Slaves to SW4: 5.76µs Latency in SW4: Send packet from SW4 to SW3: 52.8µs Transmit time SW4 to SW3: 2.5µs Latency in SW3: Send packet SW3 to SW2: 52.8µs Transmit time SW3 to SW2 2.5µs Latency in SW2: Send packet SW2 to SW1: 52.8µs Transmit time SW2 to SW1 2.5µs Latency in SW1: Send packet SW1 to Master: 52.8µs Total time: µs Slide 27

28 Scan Times Scan time of a 10Mbps network 312 µs µs = 2505 µs Scan time of 10Mbps network with 100Mbps links between switches 156 µs µs = 924 µs Scan time of 100Mbps network 52 µs + 240µs = 292 µs Slide 28

29 Real-Time, Determinism and Ethernet So can Ethernet cope with the demands of a real-time control network? Scan times are as quick if not quicker than contemporary bus systems. Deterministic? Definitely in a controlled traffic network. Worldwide, open standards means all vendors support Ethernet. Flexibility means it already supports such things as remote video monitoring. Evolutionary history means it can only get better! Slide 29

30 The Future How many disparate networks do you need between the information and device layers? Device Control Automation Information Interbus Loop Interbus ASI Profibus DP Seriplex Profibus FMS CAN CCLink ControlNet DeviceNet SDS ETHERNET WorldFIP / FIP LonWorks HART IEC/SP50 H2 IEC/SP50 H1 Profibus PA Slide 30

Chapter 3: Industrial Ethernet

Chapter 3: Industrial Ethernet 3.1 Introduction Previous versions of this handbook have dealt extensively with Ethernet so it is not our intention to revisit all the basics. However, because Smart Grid protocols are increasingly reliant

More information

Table of Contents 1 VLAN Configuration 1-1

Table of Contents 1 VLAN Configuration 1-1 Table of Contents 1 VLAN Configuration 1-1 Overview 1-1 Introduction to VLAN 1-1 VLAN Fundamentals 1-2 Types of VLAN 1-3 Introduction to Port-Based VLAN 1-3 Configuring a VLAN 1-4 Configuration Task List

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Risanuri Hidayat. 13/03/2012 Jurusan Teknik Elektro dan Tekn Informasi UGM

Risanuri Hidayat. 13/03/2012 Jurusan Teknik Elektro dan Tekn Informasi UGM Risanuri Hidayat 1 Ilustrasi 2 VLAN JTETI UGM 3 Virtual LAN A virtual LAN (VLAN) is a group of PCs, servers, and other network resources that behave as if they were connected to a single network segment

More information

Switched Ethernet Virtual LANs

Switched Ethernet Virtual LANs Switched Ethernet Virtual LANs Computer Networks Lecture 4 http://goo.gl/pze5o8 Switched Ethernet 2 LAN Switches Behave as bridges (operates in the logical tree topology) Switching is implemented by hardware

More information

Internetwork Basic. Possible causes of LAN traffic congestion are

Internetwork Basic. Possible causes of LAN traffic congestion are Internetworking 1 C H A P T E R 2 Internetworking Basics Internetworking Model The OSI Reference Model Ethernet Networking Wireless Networking Data Encapsulation Topic 3 1 Internetwork Basic 4 Possible

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of Computer Science ALOHA Network Protocol Family Fall 2017 Homework 2 Introduction 3 Network Protocols.......................................................... 3 Problem.................................................................

More information

IEEE Ethernet. Eric Karlsson Thomas Karlsson Morgan Kejerhag

IEEE Ethernet. Eric Karlsson Thomas Karlsson Morgan Kejerhag IEEE 802.3 - Ethernet Eric Karlsson Thomas Karlsson Morgan Kejerhag Today s Presentation Switching and bridging Auto negotiation Power-over-Ethernet Ethernet Performance Ethernet in WAN Switching and Bridging

More information

Zarządzanie sieciami telekomunikacyjnymi

Zarządzanie sieciami telekomunikacyjnymi Ethernet The term Ethernet refers to the family of local-area network (LAN) products covered by the IEEE 802.3 standard that defines what is commonly known as the CSMA/CD protocol. Four data rates are

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer

More information

Networks. In this lesson we will discuss: What do Networks do?

Networks. In this lesson we will discuss: What do Networks do? Networks In this lesson we will discuss: What do Networks do? Why do industrial installations use them? What networks are available and who owns them? Details of each, hardware (media) and setup software

More information

Analysis of Switched Ethernet Networks with different Topologies used in Automation Systems

Analysis of Switched Ethernet Networks with different Topologies used in Automation Systems Analysis of Switched Ethernet Networks with different Topologies used in Automation Systems S. Rüping 1, E. Vonnahme 1, J. Jasperneite 2 1 Heinz Nixdorf Institut University of Paderborn System and Circuit

More information

IP Switches Deterministic & Real-Time Responsive White Paper

IP Switches Deterministic & Real-Time Responsive White Paper IP Switches Deterministic & Real-Time Responsive Abstract Ethernet based Local Area Networks (LANs) have become the most prominent technology that promises to revolutionize automation communications. The

More information

IEEE standards for local area networks

IEEE standards for local area networks IEEE standards for local area networks Telecommunication Networks Group firstname.lastname@polito.it http://www.telematica.polito.it/ COMPUTER NETWORKS Standard for LANs 1 Copyright Quest opera è protetta

More information

Workshop : Ethernet as a fieldbus Genève Friday 28th September How Ethernet becomes industrial

Workshop : Ethernet as a fieldbus Genève Friday 28th September How Ethernet becomes industrial Workshop : Ethernet as a fieldbus Genève September 2001 How Ethernet becomes industrial Prof. Bernard Jouga - Supélec, Rennes France Bernard.Jouga@supelec.fr You said Ethernet Ethernet offers A level 1

More information

Module 5 Local Area Networks

Module 5 Local Area Networks Module 5 Local Area Networks Lesson 15 LAN Topologies, Access Mechanisms And Media 5.1.1 INTRODUCTION Microelectronics brought a great revolution in computer technology. While the processing power of the

More information

Part3. Local Area Networks (LAN)

Part3. Local Area Networks (LAN) Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

More information

(Controller Area Network)

(Controller Area Network) CAN (Controller Area Network) CAN is open technology supporting multiple applications Chips available today from Intel, Motorola, Philips/Signetics, NEC, Hitachi, Siemens Volumes from multiple industry

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next ursday, Sep 27th Today: Link Layer

More information

Simulation of Switched Ethernet

Simulation of Switched Ethernet Technical report, IDE0633, February 2006 Simulation of Switched Ethernet Master s Thesis in Computer System Engineering Kishore Kumar Nachegari Suresh Babu Eadi School of Information Science, Computer

More information

Data Link Layer, Part 5. Medium Access Control

Data Link Layer, Part 5. Medium Access Control CS 455 Medium Access Control, Page 1 Data Link Layer, Part 5 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang s courses at GMU

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information

CCNA 1 Chapter 5 v5.0 Exam Answers 2013

CCNA 1 Chapter 5 v5.0 Exam Answers 2013 CCNA 1 Chapter 5 v5.0 Exam Answers 2013 1 2 A host is trying to send a packet to a device on a remote LAN segment, but there are currently no mappings in its ARP cache. How will the device obtain a destination

More information

The MAC Address Format

The MAC Address Format Directing data is what addressing is all about. At the Data Link layer, this is done by pointing PDUs to the destination MAC address for delivery of a frame within a LAN. The MAC address is the number

More information

Private and Public addresses. Real IPs. Lecture (09) Internetwork Layer (3) Agenda. By: Dr. Ahmed ElShafee

Private and Public addresses. Real IPs. Lecture (09) Internetwork Layer (3) Agenda. By: Dr. Ahmed ElShafee Agenda Lecture (09) Internetwork Layer (3) Private and public addresses Network Address Translation Virtual Private Network (VPN) Virtual LANs By: Dr. Ahmed ElShafee ١ ٢ Private and public addresses Private

More information

2. What is a characteristic of a contention-based access method?

2. What is a characteristic of a contention-based access method? CCNA 1 Chapter 5 v5.0 Exam Answers 2015 (100%) 1. Which statement is true about MAC addresses? MAC addresses are implemented by software. A NIC only needs a MAC address if connected to a WAN. The first

More information

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various

More information

Analysis of Virtual Local Area Networking Technology. Zheng Zhang

Analysis of Virtual Local Area Networking Technology. Zheng Zhang 6th International Conference on Machinery, Materials, Environment, Biotechnology and Computer (MMEBC 2016) Analysis of Virtual Local Area Networking Technology Zheng Zhang Jiangxi Vocational and Technical

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Today: Link Layer (cont.) Framing Reliability Error correction Sliding window Medium

More information

Computer Networks Principles LAN - Ethernet

Computer Networks Principles LAN - Ethernet Computer Networks Principles LAN - Ethernet Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Interconnection structure - layer 3 interconnection layer 3 router subnetwork 1 interconnection layer 2

More information

Page 1 of 5 Print this Page Close this Window TECHNICAL ARTICLE: STANDARDS-BASED REAL TIME ETHERNET NOW OFF-THE-SHELF Almost every major user organisation is currently propagating its own Ethernet-based

More information

GENERATION OF GRAPH FOR ETHERNET VERIFICATION USING TREK M.Vinodhini* 1, P.D. Rathika 2, J.U.Nambi 2, V.Kanmani 1

GENERATION OF GRAPH FOR ETHERNET VERIFICATION USING TREK M.Vinodhini* 1, P.D. Rathika 2, J.U.Nambi 2, V.Kanmani 1 ISSN 2277-2685 IJESR/May 2015/ Vol-5/Issue-5/187-193 M. Vinodhini et. al./ International Journal of Engineering & Science Research GENERATION OF GRAPH FOR ETHERNET VERIFICATION USING TREK M.Vinodhini*

More information

Lecture (04) Using VLANs to segment LANs. Dr. Ahmed M. ElShafee. Dr. Ahmed ElShafee, ACU Spring 2014, Practical Applications in Computer Networks 4.

Lecture (04) Using VLANs to segment LANs. Dr. Ahmed M. ElShafee. Dr. Ahmed ElShafee, ACU Spring 2014, Practical Applications in Computer Networks 4. Lecture (04) Using VLANs to segment LANs Dr. Ahmed M. ElShafee ١ 4.0 ٢ Topology ٣ item Configuration item Configuration Gateway Gateway PC1 DNS Port status Band width Duplex On PC2 DNS Port status Band

More information

- Hubs vs. Switches vs. Routers -

- Hubs vs. Switches vs. Routers - 1 Layered Communication - Hubs vs. Switches vs. Routers - Network communication models are generally organized into layers. The OSI model specifically consists of seven layers, with each layer representing

More information

COS 140: Foundations of Computer Science

COS 140: Foundations of Computer Science COS 140: Foundations of C S Network Protocol Family Fall 2017 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 25 Homework Homework Slides, book Chapter 24 on line Homework: All exercises

More information

Networking Technologies and Applications

Networking Technologies and Applications Networking Technologies and Applications Rolland Vida BME TMIT September 23, 2016 Aloha Advantages: Different size packets No need for synchronization Simple operation If low upstream traffic, the solution

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2

King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2 King Fahd University of Petroleum & Minerals Electrical Engineering Department EE 400, Experiment # 2 IP Addressing and Subnetting: Establishing Elementary Networks using Hubs, Switches and Routers. Objectives:

More information

Introduction to Ethernet and lab3.3

Introduction to Ethernet and lab3.3 Introduction to Ethernet and lab3.3 maglun@sm.luth.se Nov 200 Computation structures Agenda Introduction History Components (MAC, PHY) Packet format CRC Bit order Hubs, Switches and Routers Questions Computation

More information

GUARANTEED END-TO-END LATENCY THROUGH ETHERNET

GUARANTEED END-TO-END LATENCY THROUGH ETHERNET GUARANTEED END-TO-END LATENCY THROUGH ETHERNET Øyvind Holmeide, OnTime Networks AS, Oslo, Norway oeyvind@ontimenet.com Markus Schmitz, OnTime Networks LLC, Texas, USA markus@ontimenet.com Abstract: Latency

More information

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet CCNA Exploration Network Fundamentals Chapter 09 Ethernet Updated: 07/07/2008 1 9.0.1 Introduction 2 9.0.1 Introduction Internet Engineering Task Force (IETF) maintains the functional protocols and services

More information

ECE 158A: Lecture 13. Fall 2015

ECE 158A: Lecture 13. Fall 2015 ECE 158A: Lecture 13 Fall 2015 Random Access and Ethernet! Random Access! Basic idea: Exploit statistical multiplexing Do not avoid collisions, just recover from them When a node has packet to send Transmit

More information

CS 640 Lecture 4: 09/11/2014

CS 640 Lecture 4: 09/11/2014 CS 640 Lecture 4: 09/11/2014 A) Bandwidth-delay product B) Link layer intro C) Encoding, Framing, Error Detection D) Multiple access Ethernet A. Bandwidth-delay product This in the above example is C *

More information

Ethernet 101 Siemens Industry Inc All rights reserved. usa.siemens.com/industry

Ethernet 101 Siemens Industry Inc All rights reserved. usa.siemens.com/industry Connected Manufacturing Ethernet 101 usa.siemens.com/industry Why Ethernet Ethernet is Everywhere! Page 2 Ethernet is everywhere Ethernet is the most common computer networking medium Standardization on

More information

Management Software AT-S67 AT-S68. User s Guide FOR USE WITH AT-FS7016 AND AT-FS7024 SMART SWITCHES VERSION PN Rev A

Management Software AT-S67 AT-S68. User s Guide FOR USE WITH AT-FS7016 AND AT-FS7024 SMART SWITCHES VERSION PN Rev A Management Software AT-S67 AT-S68 User s Guide FOR USE WITH AT-FS7016 AND AT-FS7024 SMART SWITCHES VERSION 1.0.0 PN 613-50494-00 Rev A Copyright 2003 Allied Telesyn, Inc. 960 Stewart Drive Suite B, Sunnyvale,

More information

Bit A binary digit. The smallest unit of data, either a zero or a one. Bus A shared connection for multiple devices over a cable or backplane.

Bit A binary digit. The smallest unit of data, either a zero or a one. Bus A shared connection for multiple devices over a cable or backplane. The interest in Industrial Ethernet has brought about a completely new dictionary of terms. Here are some of the most important terms introduced to date. 4B/5B A block encoding scheme used to send Fast

More information

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1

COMP476 Networked Computer Systems. Polling. Sharing the Wire. LAN Technologies. COMP476 Networked Computer Systems 1 Media Access Control Sub Layer COMP476 Networked Computer Systems Sharing Common Media There are several ways to share common media. Some methods are: Frequency division multiplexing Time division multiplexing

More information

Lecture (03) VLANs. By: Dr. Ahmed ElShafee. Dr. Ahmed ElShafee, ACU : Fall 2015, Practical App. Networks II 4.0

Lecture (03) VLANs. By: Dr. Ahmed ElShafee. Dr. Ahmed ElShafee, ACU : Fall 2015, Practical App. Networks II 4.0 Lecture (03) VLANs By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Practical App. Networks II 4.0 ٢ Topology ٣ item Configuration item Configuration PC1 PC2 IP 10.0.2.1 IP 10.0.2.2 item Configuration

More information

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded

Systems. Roland Kammerer. 10. November Institute of Computer Engineering Vienna University of Technology. Communication Protocols for Embedded Communication Roland Institute of Computer Engineering Vienna University of Technology 10. November 2010 Overview 1. Definition of a protocol 2. Protocol properties 3. Basic Principles 4. system communication

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21! CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also

More information

Computer Networking. December 2004 CEN CN

Computer Networking. December 2004 CEN CN Computer Networking CEN CN 1 Layer 2 - Bridge Frame Header Data Bridge Trailer Data Link Layer Physical Layer More complex than repeat, it requires hardware and software Bridges have diminished because

More information

Multiple Access Channels

Multiple Access Channels Multiple Access Channels Some Queuing Theory MAC: Aloha, ethernet Exponential backoff & friends LANs: Local Area Networks Goal: extend benefits of simple connection as far as possible Means: Share medium

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network Page 1 of 6 1 Introduction This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency as well as provide some real world examples.

More information

The MAC Layer. Contents. Textbook. Jean Yves Le Boudec Fall 2012

The MAC Layer. Contents. Textbook. Jean Yves Le Boudec Fall 2012 The MAC Layer Jean Yves Le Boudec Fall 2012 1 Contents 1. MAC as Shared Medium : The Ethernet Myth and the WiFi Reality 2. MAC as interconnection at small scale : Why Ethernet became a point to point technology

More information

Communication and Networks. Problems

Communication and Networks. Problems Electrical and Information Technology Communication and Networks Problems Link Layer 2016 Problems 1. Consider a network applying a slotted Aloha access system. The assumption for this is that all nodes

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Trademarks. Statement of Conditions by NETGEAR, Inc. All rights reserved.

Trademarks. Statement of Conditions by NETGEAR, Inc. All rights reserved. 2004 by NETGEAR, Inc. All rights reserved. Trademarks @2004 NETGEAR, Inc. NETGEAR, the Netgear logo, The Gear Guy and Everybody s connecting are trademarks of Netgear, Inc. in the United States and/or

More information

VLANs Level 3 Unit 9 Computer Networks

VLANs Level 3 Unit 9 Computer Networks VLANs Some Requirements of LANs Need to split up broadcast domains to make good use of bandwidth People in different departments may need to be grouped together for access to servers Security: restrict

More information

Lecture 4b. Local Area Networks and Bridges

Lecture 4b. Local Area Networks and Bridges Lecture 4b Local Area Networks and Bridges Ethernet Invented by Boggs and Metcalf in the 1970 s at Xerox Local area networks were needed to connect computers, share files, etc. Thick or Thin Ethernet Cable

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a

COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION. (c) Peer-to-peer processes are processes on two or more devices communicating at a COMPUTER NETWORKS MODEL QUESTION PAPER WITH SOLUTION Q-1(a) In half-duplex transmission, only one entity can send at a time; in a full-duplex transmission, both entities can send at the same time. (b)

More information

Lecture (03) VLANs 4.0 PC2 PC1 PC4 PC3. By: Dr. Ahmed ElShafee. Topology. Dr. Ahmed ElShafee, ACU : Fall 2015, Practical App. Networks II IP

Lecture (03) VLANs 4.0 PC2 PC1 PC4 PC3. By: Dr. Ahmed ElShafee. Topology. Dr. Ahmed ElShafee, ACU : Fall 2015, Practical App. Networks II IP Lecture (03) VLANs By: Dr. Ahmed ElShafee 4.0 ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Practical App. Networks II ٢ Topology Gateway Gateway PC1 DNS Port status Band width Duplex On PC2 DNS Port status Band

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2015, Lecture 03 Kaan Bür Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for ACK Error control

More information

Lecture 6: Example LAN: Ethernet

Lecture 6: Example LAN: Ethernet Lecture 6: Example LAN: Ethernet Dr. Mohammed Hawa Electrical Engineering Department University of Jordan EE426: Communication Networks Network Types Local Area Networks (LANs):privately-owned networks

More information

Some portions courtesy Srini Seshan or David Wetherall

Some portions courtesy Srini Seshan or David Wetherall CSE 123 Computer Networks Fall 2009 Lecture 6: Data-Link III: Hubs, Bridges and Switches Some portions courtesy Srini Seshan or David Wetherall Misc Homework solutions have been posted I ll post a sample

More information

The Medium Access Control Sublayer

The Medium Access Control Sublayer The Medium Access Control Sublayer Chapter 4 Channel Allocation Problem Static channel allocation Assumptions for dynamic Assumptions for Dynamic Channel Allocation 1. Independent traffic 2. Single channel

More information

Ahead of the challenge, ahead of the change. Beyond classical substation How seamless communication networks can be used in special applications

Ahead of the challenge, ahead of the change. Beyond classical substation How seamless communication networks can be used in special applications Ahead of the challenge, ahead of the change Beyond classical substation How seamless communication networks can be used in special applications siemens.com/energy-management Agenda Today s reliability

More information

CTS2134 Introduction to Networking. Module 09: Network Management

CTS2134 Introduction to Networking. Module 09: Network Management CTS2134 Introduction to Networking Module 09: Network Management Documentation Facts Good documentation: Ensures that users can find the information they need when making decisions or troubleshooting problems

More information

Abstract. AM; Reviewed: WCH/JK 9/11/02. Solution & Interoperability Test Lab Application Notes 2002 Avaya Inc. All Rights Reserved.

Abstract. AM; Reviewed: WCH/JK 9/11/02. Solution & Interoperability Test Lab Application Notes 2002 Avaya Inc. All Rights Reserved. Configuring a Hunt Group Between a Microsoft Windows NT 4.0 Server Equipped with Two Compaq Gigabit Server NICs and an Avaya P882 MultiService Switch - Issue 1.0 Abstract These Application Notes provide

More information

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers

Ethernet Basics. based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics based on Chapter 4 of CompTIA Network+ Exam Guide, 4 th ed., Mike Meyers Ethernet Basics History Ethernet Frames CSMA/CD Obsolete versions 10Mbps versions Segments Spanning Tree Protocol

More information

Lecture 9: Bridging & Switching"

Lecture 9: Bridging & Switching Lecture 9: Bridging & Switching" CSE 123: Computer Networks Alex C. Snoeren HW 2 due Wednesday! Lecture 9 Overview" Finishing up media access Contention-free methods (rings) Moving beyond one wire Link

More information

Gigabit Networks, VLANs & Wireless LANs

Gigabit Networks, VLANs & Wireless LANs Hands-On Gigabit Networks, VLANs & Wireless LANs ( Advanced Local Area Networks ) Course Description This Hands-On course will discuss traditional Ethernet as it is evolving today and its future. Ethernet

More information

A. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara, UCLA, and U of Utah).

A. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara, UCLA, and U of Utah). Volume: 245 Questions Question No: 1 Which of the following statements best describes ARPANET? A. ARPANET was an early packet switched network initially connecting 4 sites (Stanford, UC Santa Barbara,

More information

RBRIDGES LAYER 2 FORWARDING BASED ON LINK STATE ROUTING

RBRIDGES LAYER 2 FORWARDING BASED ON LINK STATE ROUTING 1 RBRIDGES LAYER 2 FORWARDING BASED ON LINK STATE ROUTING Donald E. Eastlake 3 rd donald.eastlake@stellarswitches.com CONTENTS Introduction Ethernet and Spanning Tree RBridge Features TRILL Encapsulation

More information

Routing Between VLANs Overview

Routing Between VLANs Overview Routing Between VLANs Overview This chapter provides an overview of VLANs. It describes the encapsulation protocols used for routing between VLANs and provides some basic information about designing VLANs.

More information

Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks

Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Importance of Interoperability in High Speed Seamless Redundancy (HSR) Communication Networks Richard Harada Product Manager RuggedCom Inc. Introduction Reliable and fault tolerant high speed communication

More information

Industrial Ethernet Comparison for Motion Control Applications

Industrial Ethernet Comparison for Motion Control Applications Industrial Ethernet Comparison for Motion Control Applications Sari Germanos sari.germanos@ethernet-powerlink.org Technology Marketing Ethernet POWERLINK Standardization Group Topology comparison - Conventional

More information

Data Link Layer, Part 3 Medium Access Control. Preface

Data Link Layer, Part 3 Medium Access Control. Preface Data Link Layer, Part 3 Medium Access Control These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable

More information

Data Link Layer -2- Network Access

Data Link Layer -2- Network Access EITF25 Internet: Technology and Applications Data Link Layer -2- Network Access 2013, Lecture 03 Kaan Bür, Stefan Höst Previously on EITF25 Logical Link Control Sublayer Flow control Send data Wait for

More information

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control

Content. Deterministic Access Polling(1) Master-Slave principles: Introduction Layer 2: Media Access Control Content Introduction Layer 2: Frames Error Handling Media Access Control General approaches and terms Network Topologies Media Access Principles (Random) Aloha Principles CSMA, CSMA/CD, CSMA / CA Media

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x

Computer Networks. Lecture 8 Local Area Network, IEEE 802.x Computer Networks Lecture 8 Local Area Network, IEEE 802.x Local area network A local area network (LAN) is a computer network that interconnects computers within a limited area such as a home, school,

More information

Ethernet And Implementation In Automation

Ethernet And Implementation In Automation And Implementation In Automation Robert Rawlyk Beckhoff Automation, LLC North American Headquarters Burnsville, Minnesota USA ABSTRACT There has been a significant movement in recent years to bring to

More information

IEEE 802 LANs SECTION C

IEEE 802 LANs SECTION C IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison

More information

Lecture 05 Chapter 16 High Speed LANs

Lecture 05 Chapter 16 High Speed LANs NET 456 High Speed Networks Lecture 05 Chapter 16 High Speed LANs Dr. Anis Koubaa Reformatted slides from textbook Data and Computer Communications, Ninth Edition by William Stallings, 1 (c) Pearson Education

More information

Canova Tech. IEEE Plenary Meeting, San Diego (CA) cg draft 2.0 PLCA (Clause 148) Overview July 9 th, 2018

Canova Tech. IEEE Plenary Meeting, San Diego (CA) cg draft 2.0 PLCA (Clause 148) Overview July 9 th, 2018 Canova Tech The Art of Silicon Sculpting PIERGIORGIO BERUTO ANTONIO ORZELLI IEEE 802.3 Plenary Meeting, San Diego (CA) 2018 802.3cg draft 2.0 PLCA (Clause 148) Overview July 9 th, 2018 Introduction PHY-Level

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

Local Area Networks. Ethernet LAN

Local Area Networks. Ethernet LAN Local Area Networks Ethernet 802.3 LAN -7-1 Local Area Networks (Lokale Netze) Wide Area Network LAN -7-2 Local Area Networks What is a LAN? Multiple systems attached to an often shared medium high total

More information

New Ethernet Applications - Accumulated switch latency in industrial applications

New Ethernet Applications - Accumulated switch latency in industrial applications New Ethernet Applications - Accumulated switch latency in industrial applications January 24, 2018 JORDON WOODS Director, Deterministic Ethernet Technology Group 1 Synopsis of the Problem Industrial applications,

More information

Overview of Ethernet Networking

Overview of Ethernet Networking Overview of Ethernet Networking Renesas Electronics America Inc. 1/31/2011 Rev. 0.02 00000-A Agenda This course contains an overview of Ethernet technology and its advantages and limits. Contained in this

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

CSCI Computer Networks

CSCI Computer Networks CSCI-1680 - Computer Networks Link Layer III: LAN & Switching Chen Avin Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti, Peterson & Davie, Rodrigo Fonseca Today: Link Layer (cont.)

More information

10- and 100-Mbps Ethernet

10- and 100-Mbps Ethernet Ethernet Basics 10-Mbps Ethernet Three 10-Mbps Ethernet standards: 10BASE5 10BASE2 10BASE-T 10BASE2 and 10BASE5 were around more than 20 years and have been replaced by newer alternatives 10BASE-T s use

More information

WHITE PAPER AX WAIT, DID WE JUST BUILD A WIRELESS SWITCH?

WHITE PAPER AX WAIT, DID WE JUST BUILD A WIRELESS SWITCH? WHITE PAPER 80.AX WAIT, DID WE JUST BUILD A WIRELESS SWITCH? November 08 Introduction With the initial versions of 80.ax (Wi-Fi ) coming out, some of the most interesting features and enhancements revolve

More information

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst

EITF25 Internet Techniques and Applications L4: Network Access. Stefan Höst EITF25 Internet Techniques and Applications L4: Network Access Stefan Höst Repetition The link layer protocol should make sure that the data is correctly transmitted over the physical link using error

More information

LAN PROTOCOLS. Beulah A AP/CSE

LAN PROTOCOLS. Beulah A AP/CSE LAN PROTOCOLS Beulah A AP/CSE IEEE STANDARDS In 1985, the Computer Society of the IEEE started a project, called Project 802, to set standards to enable intercommunication among equipment from a variety

More information