TCP/IP Communication Aspects in Monitoring of a Remote Wind Turbine

Size: px
Start display at page:

Download "TCP/IP Communication Aspects in Monitoring of a Remote Wind Turbine"

Transcription

1 TCP/IP Communication Aspects in Monitoring of a Remote Wind Turbine Tapio Sokura, Taneli Korhonen, Mikael M. Nordman, and Matti Lehtonen Power Systems and High Voltage Engineering Laboratory P.O.Box HUT, Finland {tapio.sokura, taneli.korhonen, mikael.nordman, matti.lehtonen}@hut.fi ABSTRACT Today there is a growing interest in utilizing different distributed energy resources (DER) in the power system. A problem that the system operators, owners and power utilities have to consider is thus how this technology can be integrated within the existing information systems. Another emerging problem is what type of telecommunication architecture should be used for remote monitoring and control of these units that normally are distributed over a large geographical area. One possible solution is to use the commercially available TCP/IP based telecommunication infrastructure and extend it with different technologies when needed to reach a distant DER unit. The commercial TCP/IP telecommunication network poses, however, concerns regarding the reliability, response time and level of security that can be achieved. This paper addresses different protocol aspects and presents a pilot study where a wide area internet and a local packet switched radio network were used to monitor parameters of a wind turbine located approximately 1000 km away from the control center. In the pilot system, the applicability of the protocol based on the IEC draft standard as well as a protocol based on a proprietary solution were assessed. Main emphasize was put to the evaluation of the system architecture as well as the reliability and response characteristics of the tested communication solution in the pilot installation. Based on the test results, the general usability of a commercial wide area internet and packet switched radios as a communication means in monitoring of distant wind power plants is discussed. INTRODUCTION One of the most important aspects that will affect the success and cost-competitiveness of distributed energy resources integrated within the power system, is the development and usability of communications and control technologies. Because distributed energy resources typically are small and geographically spread over a large area, the units must be linked together as well as monitored and controlled from a remote control center [1]. This requires that a robust and lowcost communication infrastructure is available and that appropriate communication protocols are developed. Today, the most known communication protocol is TCP/IP. TCP/IP was developed by research groups in the USA in the late seventies and became during the next twenty years the de facto standard for communication between computers and information systems [2]. TCP/IP is today used in all relevant telecommunication systems and is also considered to be the preferred platform for future communication in large distributed control infrastructures. However, TCP/IP 1

2 defines only the network and transport protocols. Hence, the application objects, data format and exchange rules must be specified by some other related standard. Well-known commercially used application protocols are e.g. FTP for file transfer and HTTP for transfer of web contents. Appropriate application protocol standards for TCP/IP based communication networks in the power systems domain, are currently under development. For example, the joint efforts of IEC, IEEE and EPRI has resulted in the proposed standard IEC 61850, which defines functions, data objects and protocol mappings for substation automation (and determines thus generic interfaces for distribution automation as well). This joint standardization effort has also been extended to consider e.g. distributed energy resources. It seems thus possible that in the future there can be a commonly agreed TCP/IP based communication platform for the management, control and integration of power systems and distributed energy resources. Because the distributed energy resources are geographically spread over a large area, it may not be economically feasible to purchase proprietary physical communication links. The communication resources can instead be leased from a telecommunications operator, e.g. an internet service provider. However, there are two major concerns with this arrangement. Typically the first issue considered relates to the level of data security that can be offered. Although the communication can be implemented using secure virtual private networks (a link protected by means of encryption and authentication providing rather reliable and secure data transmission [3]), the trust in this service should be delegated from the power system operator to the telecommunications network operator. These trust relationships are today not sufficiently strong and the operators lack tools to efficiently manage them. The second major concern relates to the performance and the reliability of the TCP/IP based network. The leased resources are shared with other traffic and although prioritization can be implemented to avoid congestion in network routers, these types of service agreements are not very common today (and also difficult to implement in networks with several operators involved). In addition, because the TCP protocol was not developed for real-time applications, it does not provide means to control acknowledgements nor does it provide means to efficiently control the response time (e.g. the timeout mechanisms of the TCP retransmission scheme varies with the quality of the link [2]). Using UDP and application level acknowledgements can however mitigate this problem. In this paper, a pilot study of a system using a leased wide area communication link from an internet service provider to monitor a remote wind turbine is discussed. The pilot system is used to assess the performance characteristics of the communication system and its behavior when different communication protocols are used. Emphasize is also put to the performance of the interface link between the wind turbine and the wide area network. This link is implemented with radio modems. The protocols tested are the draft standard IEC , which is developed for the remote monitoring of wind power plants, and a proprietary protocol, which is developed for test purposes only. The paper is structured as follows: In Section 2, a short introduction to the current standardization work in communication protocols for distributed energy resources, is given. Main emphasize is put to the communication standard for monitoring and control of wind turbines and wind power plants. Section 3 discusses the general architecture of the communication system used in the pilot project. Section 4 is dedicated to evaluation of the pilot system, applicability of the communication protocols in this particular environment, and to the traffic tests that were made in the system. Section 5 concludes the paper. 2

3 INTRODUCTION TO THE RELEVANT STANDARDIZATION WORK In the power systems domain, the actors (manufacturers, operators, utilities, etc.) have always faced problems of what communication and data modeling protocols to provide to the customers for monitoring and control of their devices. Distributed energy resources face the same problems and proprietary solutions have generally been as common in this area as in the rest of the domain. However, as an extension to the power system standardization effort UCA (Utility Communications Architecture), a new and international framework for defining interconnection and data communication for distributed resources is evolving. It has the work name UCA-DER (Utility Communications Architecture Object Models for Distributed Energy Resources) [4]. The approach taken in the standardization work is to define generic object models of devices, of functions and for the exchange of information within a system. That is, a real device (e.g. a fuel cell) is modeled as a logical device containing data objects that determine the information and attributes that can be exchanged and managed as well as the functionality that the devices can support. The data exchange is realized with a client-server relationship between the devices and with several different communication services. Typical services being supported are conventional request-response data transactions, reporting and logging. Hence, UCA-DER adapts the same modeling approach as used in the standard for substation automation, IEC [5], which is frequently discussed among utilities and electrical engineering companies today. One subpart of the general standardization effort considers wind power plants. This standardization work has been given the name IEC Communications for monitoring and control of wind power plants [6]. It defines the object models and information exchange models of units and devices in wind power engineering as well as for auxiliary services. Consequently, in the standard, object models for e.g. wind turbine rotor information (WROT), wind turbine generator information (WGEN), wind turbine alarm information (WALM), and wind power plant meteorological information (WMET), are given. In addition, different communication topologies and services are determined. These are given on an abstract level and specific performance requirements are not specified (due to the assumption that a wide range of applications and communication systems will be integrated). Nevertheless, the major topologies proposed, allow the protocol and data servers to be implemented in three locations, at a local supervisory computer, at the controllers directly connected to the wind power plant components, and as a mix of these two. The major communication services proposed for wind power plant management are authorization (e.g. authentication service), client initiated control operations, monitoring (both request-response and spontaneous reporting) and different management functions (e.g. time synchronization and configurations management). The communication services and the application data contents are in the real implementations mapped to some application protocol on top of preferably TCP/IP. Four different mapping profiles are proposed in the standard. These are ISO 9506 (MMS) + ASN.1, or XML + HTTP, or DNP3.0, or IEC /104. [6] Generally it can be expected that the MMS and the XML based profiles will gain most attention and the DNP3.0 and IEC 101/104 standards will be used in the transition from currently developed systems to the systems developed in the future. 3

4 SYSTEM ARCHITECTURE OF THE PILOT STUDY At the Olos fell in Lapland, located approximately 1000 km north of Helsinki, 5 wind turbines, each with the size of 600 MW, are located, see Figure 1. In this environment, the purpose of the pilot study was to test the applicability of a wide area communication network (refereed to as an internet) and different protocols in remote monitoring of one of the wind turbines. A standard ADSL connection of 256 kbps was chosen for the implementation of the internet link. This connection was leased from an internet service provider and connected clients located in the Helsinki area with a data server located in Muonio close to the Olos fell. The communication between the server and the controllers, which managed the interface to different wind turbine sensors, was implemented with packet switched radio modems having the speed of bps. The distance between the server in Muonio and the controllers at the Olos fell was approximately 6 km. The general system architecture and the monitored parameters are depicted in Figure 2, and a snapshot of a view presented to clients (in a standard Web browser) is shown in Figure 3. Figure 1: Map of Finland where the location of the wind turbine and server (at Olos) as well as the location of the client (Helsinki) are shown at the left-hand side, and a picture of the measurement arrangement and thus the location of the controllers is shown at the right-hand side. WAN TCP/IP Controller A Wind speed Temperature Humidity Web client Server Controller B Energy of wind turbine 2 Figure 2: The architecture of the test system. 4

5 Figure 3: A snapshot from a Web client of the wind speed and the generated energy. Three different protocol configurations were developed, see Figure 4. The first protocol was based on the IEC logical node object WMET that was mapped to the application protocol IEC according to the Annex B in [6]. Of the available WMET attributes, the wind speed, ambient temperature and humidity were selected. Encapsulated in the IEC application data frame, this application data had a total length of 52 Bytes. With the TCP/IP header (40 Bytes) and the PPP header (5 Bytes) added the length of an IEC type protocol message was thus 97 Bytes (excluding low-level framing and byte stuffing). The second protocol was a proprietary protocol developed for assessing different performance parameters of the communication network as well as the performance of the IEC based protocol. The content of the proprietary protocol is shown in Figure 4. It has a header of 11 Bytes and a maximum data payload of 244 Bytes. This protocol was configured to support TCP/IP and PPP with a total header length of 56 Bytes, or alternatively a plain serial transport protocol (total header length 11 Bytes). The plain serial protocol and the PPP protocol were used only in the radio communication between the controllers and the server (see Figure 2). The internet had its own low-level protocol layers that are dependent on the network owned by the service provider. The following data exchange services were developed: Periodic data transactions initiated by a controller (controller server communication). Spontaneous data transactions initiated by a controller upon violation of some threshold (controller server communication). Periodic request-response transactions initiated by some remote client (client server communication or client controller communication with the server as a transparent node forwarding the messages). Spontaneous request-response transactions initiated by some remote client (client server communication or client controller communication with the server as a transparent node forwarding the messages). Time synchronization. 5

6 Configuration A (IEC ) Radio/WAN Framing PPP/- IP TCP IEC IEC Configuration B (TCP/IP protocol) Radio/WAN Framing PPP/- IP TCP Proprietary Configuration C (Serial protocol) Radio Framing Sender [1] Receiver [1] Length [1] Type [1] Seq Nr [1] Timestamp [4] Data [0-244] CRC [2] Figure 4: The three different protocol configurations (A), (B), and (C) used in the test system. Hence, the server could not spontaneously send critical messages (e.g. alarms) to a client. This limitation was because the clients were intended to be web clients without advanced features like e.g. server push implemented. SYSTEM PERFORMANCE EVALUATION In remote monitoring and control of wind power plants, the requirements on the communication system are rather rigorous, especially if control sequences are allowed. Hence, although the IEC standard does not give specific performance requirements, it can generally be stated that it is expected that the data transfer is reliable, that the response time is predictable and that messages are rarely lost or duplicated. However, for monitoring purposes only, the performance requirements can be slightly relaxed, especially if remote alarm management is not considered a function of high priority. To evaluate the applicability of an internet type network (generally considered a broadband telecommunications network although there are different opinions regarding the definition of broadband), packet switched radio modems and different protocols, several performance tests were made in the pilot installation. In the first test session, the average round-trip delay of request-response transactions between a controller and the server (the radio link), the server and a remote client (the internet link), as well as a controller and a remote client (denoted the total link) were measured. In this test session, the serial proprietary protocol (depicted C in Figure 4) and the TCP/IP based proprietary protocol (depicted B in Figure 4) were assessed for different sizes of the application data. The IEC based protocol was not considered, as it in these tests simply is a specific case of the TCP/IP based protocol. The test results are depicted in Figure 5, where the left-hand side shows the measured protocol throughput characteristics and the righthand side shows the round trip delay characteristics. The serial type protocol performed, as expected, slightly better than the TCP/IP based protocol. The different length of the packet header (header lengths of 56 Bytes compared to 11 Bytes) mainly caused the performance differences. For a standard remote monitoring application, however, the measured performance of both protocol types was acceptable. 6

7 Figure 5: The left-hand side shows the throughput characteristics and corresponding maximum number of queries that can be achieved with the proprietary protocol using the simple serial protocol stack and TCP/IP. The right-hand side shows the average round trip delays (controllerserver, server-client, and controller-client) achieved with the serial and the TCP/IP based protocols. In addition, the delay characteristics of the internet network were measured (with standard TCP/IP ping and traceroute messages). The internet delay was on average 46 ms, with a maximum deviation of ±10%. This delay mainly (approximately 70%) originated from the last link between the ADSL modem at the server end and the internet gateway it communicated with. Generally, a total of 10 internet gateways connected the client site with the server. Of these 4 were part of the general university network in Finland (the test client was located at Helsinki University of Technology) and 6 were part of the internet service provider s network. Next, the reliability of the radio network was assessed. As in the previous test session, the serial protocol and the TCP/IP proprietary protocol were tested with different size of the application data. The protocol messages were sent between a controller and the server without using application layer acknowledgements. Hence, application layer retransmissions did not occur. The results of the test runs with the serial protocol are denoted in Figure 6. The test results of the TCP/IP protocol are, however, not shown because no packets were lost with this protocol (because TCP handles retransmissions). Nevertheless, with the plain serial protocol the probability of not succeeding was almost always below 1%, and this probability did not depend on the message size. Hence, it was concluded that some messages were lost but with retransmissions this problem could be mitigated. The radio network did therefore not decisively degrade the communication performance of a remote monitoring application. As the first test session was dedicated to measurements of the average round trip delays, the third session considered the distribution of the round trip delays for request-response transactions implemented with the different protocol configurations. The aim with these measurements was to assess the predictability of the performance achieved with the TCP/IP protocol in the pilot system. Especially the characteristics of TCP/IP at the radio modem link were of interest, as this link was assumed to have less predictable performance than the internet link. However, in the 7

8 same test session, also information of the internet link was collected. Hence, protocol messages (request-response transactions) were sent between a controller and a remote client using the serial protocol (i.e. without TCP/IP at the radio link and with TCP/IP at the internet link) and the TCP/IP protocol (TCP/IP at both the radio and the internet link). Three different sizes of application data were tested. The test results are shown in Figure 7. A clear difference can be noted in the distribution of round trip delays between the serial protocol and the TCP/IP protocol. Because both protocol configurations used TCP/IP at the internet link, the difference is assumed to originate from the radio link. The explanation for the distribution can thus be found in the way that TCP handles retransmissions and timeouts. TCP adjusts the value of its retransmission timeout according to the time elapsed between a message transmission and the reception of the acknowledgement. Therefore, if the quality of the link is bad, the retransmission timeout grows and can finally become significantly long. Consequently, both the number of retransmissions needed and the extended timeout affect the duration between successful transactions. [2] This phenomenon is seen in the results shown in Figure 7. Accordingly, it can also be seen that the size of the application data did not affect the behavior (almost equal distributions for 0, 100, and 240 Bytes of application data) and that the internet link had a rather predictable performance. Figure 6: Lost packets probability for different packet data lengths at the radio link (controllerserver). Figure 7: Distribution of the round trip delay (controller-client) for the serial proprietary protocol (left-hand side) and the TCP/IP proprietary protocol (right-hand side) and for different packet data lengths. 8

9 In the last test session, the distribution of the round trip delay of request-response transactions with the IEC based protocol was compared to the distribution of the round trip delay of request-response transactions with the other two protocols having the same application data contents. To assess the distribution characteristics the following protocol configurations were made (see also Table 1 for the total size of the data packets at different communication links): The proprietary serial protocol with application data 12 Bytes and standard header 11 Bytes. The application data size is determined by the data needed to send the wind speed, temperature, and humidity as well as related timestamp information with the protocol. The proprietary TCP/IP protocol with application data 12 Bytes and standard header 51 Bytes (TCP/IP header + proprietary header). The application data size is determined by the data needed to send the wind speed, temperature, and humidity as well as related timestamp information with the protocol. The IEC protocol mapped to IEC and TCP/IP. A total of 52 Bytes application data was sent (three objects, wind speed, temperature and humidity according to the specification). The test results are given in Figure 8, where the left-hand side shows the general distribution and the right-hand side shows a zoomed version of the distribution (for 100 ms to 500 ms) of the round trip delays. The results conform well to the results shown in Figure 7. Accordingly, the IEC based protocol performance was similar to the performance measured for a general protocol using TCP/IP (this was also expected). Therefore, it is verified that the TCP protocol may not be appropriate for control applications where the response times must be short and predictable, especially if communication links with lower quality are used (e.g. radio links experiencing noise from the environment). However, for remote monitoring applications the achieved performance is satisfactory, also with a protocol based on the IEC standard proposal. DISCUSSION Using the available telecommunications infrastructure as a means to accomplish remote monitoring of distributed energy resources seems to be rather attractive and cost-efficient. However, there are several problems that must be considered before an implementation can be realized. For example, data security must be managed, a low-cost solution for the communication between the resource and the interface gateway of the telecommunication network must be found (generally called the last mile problem), appropriate application protocols and data modeling should be standardized and the performance of the communication network should be assessed. Table 1: Size of the data packets for different protocols used in the measurements of the round trip delay distribution. Protocol Radio link [Bytes] Proprietary (serial) Proprietary (TCP/IP) IEC IEC Internet link (without low-level protocol headers) [Bytes]

10 Figure 8: Distribution of the round trip delay (controller-client) with different protocols. In this paper a pilot system for remote monitoring of a wind turbine is discussed. A wide area communication network (internet) is used to connect remote clients to a data server, which further communicates with the wind turbine controllers via radio modems. The main motivation for developing the pilot system was to assess the system architecture and the applicability of the communication means as well as the proposed standard for wind power management, IEC Different communication performance tests were executed in the pilot environment. According to the experience gained from the developed system and the executed test sessions, it can be concluded that the IEC based protocol performance meets the requirements for remote monitoring applications. When retransmissions were used, packets were not lost. The internet response time was rather predictable and the general round trip delays for data transactions was satisfactory. However, using the (non-optimized) TCP/IP protocol at the radio link caused some unpredictable delays. The pilot study presented in this paper is a pre-study of a real system and more extensive traffic tests should be made to verify the behavior under different conditions. In addition, the IEC standard proposes several different protocol mappings of which only the IEC has been tested. This configuration should be compared to e.g. an XML based solution, and to a solution using e.g. GPRS instead of the ADSL internet link. However, the results of the conducted tests give confidence in the applicability of IEC and TCP/IP as a future platform for remote monitoring of wind power plants. REFERENCES [1] E. Petrie, and D. Julian, Microgrids unleash true power of dispersed energy, IEEE Transmission & Distribution, August [2] Comer, Internetworking with TCP/IP, vol 1: Principles, Protocols, and Architecture. 3 rd ed., Engelwood Cliffs, New Jersey, USA, Prentice Hall, 1995, ISBN: [3] Venkateswaran, R., Virtual private networks, IEEE Potentials, vol 20, issue 1, February- March

11 [4] EPRI, Draft UCA-DER Object Models, October [5] IEC-TC57-WG10/11/12, IEC 61850: Communications Networks and Systems in Substations, International Electrotechnical Commission, Draft IEC 61850, [6] Draft IEC , Communications for monitoring and control of wind power plants, 4 July,

A TCP/IP BASED COMMUNICATION ARCHITECTURE FOR DISTRIBUTION NETWORK OPERATION AND CONTROL

A TCP/IP BASED COMMUNICATION ARCHITECTURE FOR DISTRIBUTION NETWORK OPERATION AND CONTROL A BASED COMMUNICATION ARCHITECTURE FOR DISTRIBUTION NETWORK OPERATION AND CONTROL Mikael NORDMAN, Matti LEHTONEN Helsinki University of Technology, Espoo Finland Mikael.Nordman@hut.fi, Matti.Lehtonen@hut.fi

More information

MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY

MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY MODERNIZATION OF AUTOMATIC SURFACE WEATHER OBSERVING SYSTEMS AND NETWORKS TO UTILIZE TCP/IP TECHNOLOGY Olli Ojanperä, Hannu Heikkinen and Hannu M. Heikkinen Vaisala Oyj, P.O.Box 26, FIN-00421 Helsinki,

More information

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications

Data and Computer Communications. Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based Applications Data and Computer Communications Chapter 2 Protocol Architecture, TCP/IP, and Internet-Based s 1 Need For Protocol Architecture data exchange can involve complex procedures better if task broken into subtasks

More information

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING

UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING UNIVERSITY OF TORONTO FACULTY OF APPLIED SCIENCE AND ENGINEERING ECE361 Computer Networks Midterm March 06, 2017, 6:15PM DURATION: 80 minutes Calculator Type: 2 (non-programmable calculators) Examiner:

More information

Chapter 12 Network Protocols

Chapter 12 Network Protocols Chapter 12 Network Protocols 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems Interconnection (OSI) Transmission Control Protocol/Internetworking Protocol (TCP/IP)

More information

Virtual private networks

Virtual private networks Technical papers Virtual private networks Virtual private networks Virtual private networks (VPNs) offer low-cost, secure, dynamic access to private networks. Such access would otherwise only be possible

More information

Creating a Dynamic Serial Edge For Integrated Industrial Networks

Creating a Dynamic Serial Edge For Integrated Industrial Networks Creating a Dynamic Serial Edge For Integrated Industrial Networks Technical Brief GarrettCom, Inc. As industrial networks evolve, is becoming the standard technology for new system interfaces and for new

More information

Lecture-4. TCP/IP-Overview:

Lecture-4. TCP/IP-Overview: Lecture-4 TCP/IP-Overview: The history goes back to ARPANET a research network sponsored by DoD US Govt. It eventually connected hundreds of universities and govt installations, using leased telephone

More information

Layered Architecture

Layered Architecture 1 Layered Architecture Required reading: Kurose 1.7 CSE 4213, Fall 2006 Instructor: N. Vlajic Protocols and Standards 2 Entity any device capable of sending and receiving information over the Internet

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

Analyzing the Receiver Window Modification Scheme of TCP Queues

Analyzing the Receiver Window Modification Scheme of TCP Queues Analyzing the Receiver Window Modification Scheme of TCP Queues Visvasuresh Victor Govindaswamy University of Texas at Arlington Texas, USA victor@uta.edu Gergely Záruba University of Texas at Arlington

More information

Measuring MPLS overhead

Measuring MPLS overhead Measuring MPLS overhead A. Pescapè +*, S. P. Romano +, M. Esposito +*, S. Avallone +, G. Ventre +* * ITEM - Laboratorio Nazionale CINI per l Informatica e la Telematica Multimediali Via Diocleziano, 328

More information

Communication networks and systems for power utility automation Part 80-3: Mapping to web protocols Requirements and technical choices

Communication networks and systems for power utility automation Part 80-3: Mapping to web protocols Requirements and technical choices TECHNICAL REPORT IEC TR 61850-80-3 Edition 1.0 2015-11 colour inside Communication networks and systems for power utility automation Part 80-3: Mapping to web protocols Requirements and technical choices

More information

E-Commerce. Infrastructure I: Computer Networks

E-Commerce. Infrastructure I: Computer Networks E-Commerce Infrastructure I: Computer Networks Almost all computers today are networked or part of a distributed system. I will provide an overview of networking and a basic description of network technology.

More information

Operating Systems CS 571

Operating Systems CS 571 Computer Networks: Overview Operating Systems CS 571 Network types Range Bandwidth (Mbps) Latency (ms) LAN 1-2 kms 10-1000 1-10 WAN worldwide 0.010-600 100-500 MAN 2-50 kms 1-150 10 Wireless LAN 0.15-1.5

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Outline 9.2. TCP for 2.5G/3G wireless

Outline 9.2. TCP for 2.5G/3G wireless Transport layer 9.1 Outline Motivation, TCP-mechanisms Classical approaches (Indirect TCP, Snooping TCP, Mobile TCP) PEPs in general Additional optimizations (Fast retransmit/recovery, Transmission freezing,

More information

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms

Chapter 13 TRANSPORT. Mobile Computing Winter 2005 / Overview. TCP Overview. TCP slow-start. Motivation Simple analysis Various TCP mechanisms Overview Chapter 13 TRANSPORT Motivation Simple analysis Various TCP mechanisms Distributed Computing Group Mobile Computing Winter 2005 / 2006 Distributed Computing Group MOBILE COMPUTING R. Wattenhofer

More information

Basic Reliable Transport Protocols

Basic Reliable Transport Protocols Basic Reliable Transport Protocols Do not be alarmed by the length of this guide. There are a lot of pictures. You ve seen in lecture that most of the networks we re dealing with are best-effort : they

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network FAQ 07/2014 Latency on a Switched Ethernet Network RUGGEDCOM Ethernet Switches & Routers http://support.automation.siemens.com/ww/view/en/94772587 This entry is from the Siemens Industry Online Support.

More information

Computer Networks (Introduction to TCP/IP Protocols)

Computer Networks (Introduction to TCP/IP Protocols) Network Security(CP33925) Computer Networks (Introduction to TCP/IP Protocols) 부산대학교공과대학정보컴퓨터공학부 Network Type Elements of Protocol OSI Reference Model OSI Layers What we ll learn today 2 Definition of

More information

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT

CS 421: COMPUTER NETWORKS SPRING FINAL May 24, minutes. Name: Student No: TOT CS 421: COMPUTER NETWORKS SPRING 2012 FINAL May 24, 2012 150 minutes Name: Student No: Show all your work very clearly. Partial credits will only be given if you carefully state your answer with a reasonable

More information

Reti di Calcolatori I

Reti di Calcolatori I Reti di Calcolatori I Prof. Roberto Canonico Dipartimento di Ingegneria Elettrica e delle Tecnologie dell Informazione Corso di Laurea in Ingegneria delle Telecomunicazioni Corso di Laurea in Ingegneria

More information

Ch. 4 - WAN, Wide Area Networks

Ch. 4 - WAN, Wide Area Networks 1 X.25 - access 2 X.25 - connection 3 X.25 - packet format 4 X.25 - pros and cons 5 Frame Relay 6 Frame Relay - access 7 Frame Relay - frame format 8 Frame Relay - addressing 9 Frame Relay - access rate

More information

Chapter 09 Network Protocols

Chapter 09 Network Protocols Chapter 09 Network Protocols Copyright 2011, Dr. Dharma P. Agrawal and Dr. Qing-An Zeng. All rights reserved. 1 Outline Protocol: Set of defined rules to allow communication between entities Open Systems

More information

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4

CCNA Exploration Network Fundamentals. Chapter 06 Addressing the Network IPv4 CCNA Exploration Network Fundamentals Chapter 06 Addressing the Network IPv4 Updated: 20/05/2008 1 6.0.1 Introduction Addressing is a key function of Network layer protocols that enables data communication

More information

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36

Introductions. Computer Networking Lecture 01. January 16, HKU SPACE Community College. HKU SPACE CC CN Lecture 01 1/36 Introductions Computer Networking Lecture 01 HKU SPACE Community College January 16, 2012 HKU SPACE CC CN Lecture 01 1/36 Outline What is a Computer Network? Basic Requirements of Building a Computer Network

More information

Bridging and Switching Basics

Bridging and Switching Basics CHAPTER 4 Bridging and Switching Basics This chapter introduces the technologies employed in devices loosely referred to as bridges and switches. Topics summarized here include general link-layer device

More information

Chapter 3 Protocols and the TCP/IP Suite

Chapter 3 Protocols and the TCP/IP Suite Chapter 3 Protocols and the TCP/IP Suite 3.1 The Need for a Protocol Architecture need for a standard communication tasks by layers architecture peer protocol: a set of rules or conventions to exchange

More information

Smart Grid Architecture Committee (SGAC) Standard Review IEC Suite of Standards White Paper November 2011

Smart Grid Architecture Committee (SGAC) Standard Review IEC Suite of Standards White Paper November 2011 Smart Grid Architecture Committee (SGAC) Standard Review IEC 61850 Suite of Standards White Paper November 2011 Standard Name IEC 61850 Suite of standards Communication networks and systems for power utility

More information

Summary of Data Communications

Summary of Data Communications Summary of Data Communications Nixu Oy PL 21 A REFRESHING TOUR - INCLUDES PICTURES (Mäkelänkatu 91) 00601 Helsinki, Finland tel. +358 9 478 1011 fax. +358 9 478 1030 info@nixu.fi http://www.nixu.fi Network

More information

Chapter 2 Communication for Control in Heterogeneous Power Supply

Chapter 2 Communication for Control in Heterogeneous Power Supply Chapter 2 Communication for Control in Heterogeneous Power Supply The need to modernize the power grid infrastructure, and governments commitment for a cleaner environment, is driving the move towards

More information

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD

Part VI. Appendixes. Appendix A OSI Model and Internet Protocols Appendix B About the CD Part VI Appendixes Appendix A OSI Model and Internet Protocols Appendix B About the CD OSI Model and Internet Protocols APPENDIX A In this appendix, you will Learn about the OSI model Review the network

More information

Chapter 2 Network Models 2.1

Chapter 2 Network Models 2.1 Chapter 2 Network Models 2.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Network Models n Network Architecture: n A) Hardware: at the core of any network;

More information

Jeff Dagle. P.O. Box 999, M/S K5-20; Richland WA ; Fax: ;

Jeff Dagle. P.O. Box 999, M/S K5-20; Richland WA ; Fax: ; SCADA: A Deeper Look Jeff Dagle Pacific Northwest t National Laboratory P.O. Box 999, M/S K5-20; Richland WA 99352 509-375-3629; Fax: 509-375-3614; jeff.dagle@pnl.gov gov Outline Vendors Protocols DNP3.0ProtocolExample

More information

No, the bogus packet will fail the integrity check (which uses a shared MAC key).!

No, the bogus packet will fail the integrity check (which uses a shared MAC key).! 1. High level questions a. Suppose Alice and Bob are communicating over an SSL session. Suppose an attacker, who does not have any of the shared keys, inserts a bogus TCP segment into a packet stream with

More information

Lecture #9 Introduction to communication networks

Lecture #9 Introduction to communication networks KTH ROYAL INSTITUTE OF TECHNOLOGY Lecture #9 Introduction to communication networks Nicholas Honeth In this series Lecture #9 Communication protocol basics Relationship between OSI and

More information

ECE 650 Systems Programming & Engineering. Spring 2018

ECE 650 Systems Programming & Engineering. Spring 2018 ECE 650 Systems Programming & Engineering Spring 2018 Networking Introduction Tyler Bletsch Duke University Slides are adapted from Brian Rogers (Duke) Computer Networking A background of important areas

More information

Network Connectivity and Mobility Part 2

Network Connectivity and Mobility Part 2 Network Connectivity and Mobility Part 2 BSAD 141 Dave Novak Topics Covered Lecture is structured based on the five elements of creating a connected world from the text book (with additional content) 1.

More information

Transmission Control Protocol. ITS 413 Internet Technologies and Applications

Transmission Control Protocol. ITS 413 Internet Technologies and Applications Transmission Control Protocol ITS 413 Internet Technologies and Applications Contents Overview of TCP (Review) TCP and Congestion Control The Causes of Congestion Approaches to Congestion Control TCP Congestion

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

UNIT 2 TRANSPORT LAYER

UNIT 2 TRANSPORT LAYER Network, Transport and Application UNIT 2 TRANSPORT LAYER Structure Page No. 2.0 Introduction 34 2.1 Objective 34 2.2 Addressing 35 2.3 Reliable delivery 35 2.4 Flow control 38 2.5 Connection Management

More information

Application of Monitoring Standards for enhancing Energy System Security

Application of Monitoring Standards for enhancing Energy System Security Application of Monitoring Standards for enhancing Energy System Security G. DONDOSSOLA*, R. TERRUGGIA*, P. WYLACH*, G. PUGNI**, F. BELLIO*** RSE SpA*, Enel SpA**, Enel Produzione SpA*** Italy About RSE

More information

IEC Overview. Grant Gilchrist. Principal Consultant, Smart Grid Engineering November 2009

IEC Overview. Grant Gilchrist. Principal Consultant, Smart Grid Engineering November 2009 IEC 61850 Overview Grant Gilchrist Principal Consultant, Smart Grid Engineering November 2009 Traditional Power System Protocols Memory-mapped Register-based, like a filing cabinet. Anything could be in

More information

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for

QUESTION BANK ENGINEERS ACADEMY. Computer Networks Computer Network Basics Segentation is done in. 12. Session layer is used for Computer Networks Computer Network Basics 1 QUESTION BANK 1. Segentation is done in (a) transport layer (c) data link layer 2. Network layer activities are: (d) physical layer (a) logical addressing (b)

More information

CSE 4215/5431: Mobile Communications Winter Suprakash Datta

CSE 4215/5431: Mobile Communications Winter Suprakash Datta CSE 4215/5431: Mobile Communications Winter 2013 Suprakash Datta datta@cse.yorku.ca Office: CSEB 3043 Phone: 416-736-2100 ext 77875 Course page: http://www.cse.yorku.ca/course/4215 Some slides are adapted

More information

Performance Enhancement Of TCP For Wireless Network

Performance Enhancement Of TCP For Wireless Network P a g e 32 Vol. 10 Issue 12 (Ver. 1.0) October 2010 Global Journal of Computer Science and Technology Performance Enhancement Of TCP For Wireless Network 1 Pranab Kumar Dhar, 2 Mohammad Ibrahim Khan, 3

More information

Problem 7. Problem 8. Problem 9

Problem 7. Problem 8. Problem 9 Problem 7 To best answer this question, consider why we needed sequence numbers in the first place. We saw that the sender needs sequence numbers so that the receiver can tell if a data packet is a duplicate

More information

Configuring Cisco IOS IP SLA Operations

Configuring Cisco IOS IP SLA Operations CHAPTER 58 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLA) on the switch. Cisco IP SLA is a part of Cisco IOS software that allows Cisco customers to analyze IP service levels

More information

Area Limitations on Smart Grid Computer Networks

Area Limitations on Smart Grid Computer Networks I.J. Wireless and Microwave Technologies, 2016, 3, 71-78 Published Online May 2016 in MECS(http://www.mecs-press.net) DOI: 10.5815/ijwmt.2016.03.08 Available online at http://www.mecs-press.net/ijwmt Area

More information

Network protocols and. network systems INTRODUCTION CHAPTER

Network protocols and. network systems INTRODUCTION CHAPTER CHAPTER Network protocols and 2 network systems INTRODUCTION The technical area of telecommunications and networking is a mature area of engineering that has experienced significant contributions for more

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS

2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS 2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS 2.1 Real-Time and Control Computer based digital controllers typically have the ability to monitor a number of discrete and analog inputs, perform complex

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE 333: Introduction to Communication Networks Fall 2001 Lecture 28: Transport Layer III Congestion control (TCP) 1 In the last lecture we introduced the topics of flow control and congestion control.

More information

Computer Networks Principles

Computer Networks Principles Computer Networks Principles Introduction Prof. Andrzej Duda duda@imag.fr http://duda.imag.fr 1 Contents Introduction protocols and layered architecture encapsulation interconnection structures performance

More information

Da t e: August 2 0 th a t 9: :00 SOLUTIONS

Da t e: August 2 0 th a t 9: :00 SOLUTIONS Interne t working, Examina tion 2G1 3 0 5 Da t e: August 2 0 th 2 0 0 3 a t 9: 0 0 1 3:00 SOLUTIONS 1. General (5p) a) Place each of the following protocols in the correct TCP/IP layer (Application, Transport,

More information

System Programming. Introduction to computer networks

System Programming. Introduction to computer networks Content : by Dr. B. Boufama School of Computer Science University of Windsor Instructor: Dr. A. Habed adlane@cs.uwindsor.ca http://cs.uwindsor.ca/ adlane/60-256 Content Content 1 Introduction to Computer

More information

UNIT IV -- TRANSPORT LAYER

UNIT IV -- TRANSPORT LAYER UNIT IV -- TRANSPORT LAYER TABLE OF CONTENTS 4.1. Transport layer. 02 4.2. Reliable delivery service. 03 4.3. Congestion control. 05 4.4. Connection establishment.. 07 4.5. Flow control 09 4.6. Transmission

More information

RED behavior with different packet sizes

RED behavior with different packet sizes RED behavior with different packet sizes Stefaan De Cnodder, Omar Elloumi *, Kenny Pauwels Traffic and Routing Technologies project Alcatel Corporate Research Center, Francis Wellesplein, 1-18 Antwerp,

More information

Dr Markus Hagenbuchner CSCI319 SIM. Distributed Systems Chapter 4 - Communication

Dr Markus Hagenbuchner CSCI319 SIM. Distributed Systems Chapter 4 - Communication Dr Markus Hagenbuchner markus@uow.edu.au CSCI319 SIM Distributed Systems Chapter 4 - Communication CSCI319 Chapter 4 Page: 1 Communication Lecture notes based on the textbook by Tannenbaum Study objectives:

More information

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols

Week 2 / Paper 1. The Design Philosophy of the DARPA Internet Protocols Week 2 / Paper 1 The Design Philosophy of the DARPA Internet Protocols David D. Clark ACM CCR, Vol. 18, No. 4, August 1988 Main point Many papers describe how the Internet Protocols work But why do they

More information

Network Configuration Example

Network Configuration Example Network Configuration Example Configuring Dual-Stack Lite for IPv6 Access Release NCE0025 Modified: 2016-10-12 Juniper Networks, Inc. 1133 Innovation Way Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net

More information

CS 428/528 Computer Networks Lecture 01. Yan Wang

CS 428/528 Computer Networks Lecture 01. Yan Wang 1 CS 428/528 Computer Lecture 01 Yan Wang 2 Motivation: Why bother? Explosive growth of networks 1989, 100,000 hosts on the Internet Distributed Applications and Systems E-mail, WWW, multimedia, distributed

More information

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS

Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk SOLUTIONS Examination 2D1392 Protocols and Principles of the Internet 2G1305 Internetworking 2G1507 Kommunikationssystem, fk Date: January 17 th 2006 at 14:00 18:00 SOLUTIONS 1. General (5p) a) Draw the layered

More information

Improving TCP Performance over Wireless Networks using Loss Predictors

Improving TCP Performance over Wireless Networks using Loss Predictors Improving TCP Performance over Wireless Networks using Loss Predictors Fabio Martignon Dipartimento Elettronica e Informazione Politecnico di Milano P.zza L. Da Vinci 32, 20133 Milano Email: martignon@elet.polimi.it

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network Page 1 of 6 1 Introduction This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency as well as provide some real world examples.

More information

The effect of Mobile IP handoffs on the performance of TCP

The effect of Mobile IP handoffs on the performance of TCP Mobile Networks and Applications 4 (1999) 131 135 131 The effect of Mobile IP handoffs on the performance of TCP Anne Fladenmuller a and Ranil De Silva b a Alcatel CIT, Software Department, Route de Nozay,

More information

Mobile Communications Chapter 9: Mobile Transport Layer

Mobile Communications Chapter 9: Mobile Transport Layer Prof. Dr.-Ing Jochen H. Schiller Inst. of Computer Science Freie Universität Berlin Germany Mobile Communications Chapter 9: Mobile Transport Layer Motivation, TCP-mechanisms Classical approaches (Indirect

More information

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS

TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS TCP PERFORMANCE FOR FUTURE IP-BASED WIRELESS NETWORKS Deddy Chandra and Richard J. Harris School of Electrical and Computer System Engineering Royal Melbourne Institute of Technology Melbourne, Australia

More information

Chapter 2 Network Architectures A global view

Chapter 2 Network Architectures A global view Chapter 2 Architectures A global view Professor Dongning uo Architecture Architecture, n. 2a: formation or construction as or as if as the result of conscious act, 2b: a unifying or coherent form or structure.

More information

Data Link layer (CN chap 3.1, 3.4, 3.6)

Data Link layer (CN chap 3.1, 3.4, 3.6) Data Link layer (CN chap 3.1, 3.4, 3.6) The OSI model an old friend... Application Presentation Session Transport Network Data link Physical F.eks. ftp, mail, http,... handles data structures and conversion

More information

NetWare Protocols. Background. Technology Basics CHAPTER

NetWare Protocols. Background. Technology Basics CHAPTER CHAPTER 19 NetWare Protocols Background NetWare is a network operating system (NOS) and related support services environment created by Novell, Inc. and introduced to the market in the early 1980s. Then,

More information

Module 2 Overview of Computer Networks

Module 2 Overview of Computer Networks Module 2 Overview of Computer Networks Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link:

More information

Module 2 Overview of. Computer Networks

Module 2 Overview of. Computer Networks Module Overview of Networks and Communication Give me names of all employees Who earn more than $00,000 ISP intranet backbone satellite link desktop computer: server: network link: CS454/654 - Issues How

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security

Introduction to Computer Networks. CS 166: Introduction to Computer Systems Security Introduction to Computer Networks CS 166: Introduction to Computer Systems Security Network Communication Communication in modern networks is characterized by the following fundamental principles Packet

More information

Transport layer issues

Transport layer issues Transport layer issues Dmitrij Lagutin, dlagutin@cc.hut.fi T-79.5401 Special Course in Mobility Management: Ad hoc networks, 28.3.2007 Contents Issues in designing a transport layer protocol for ad hoc

More information

IP Mobility vs. Session Mobility

IP Mobility vs. Session Mobility IP Mobility vs. Session Mobility Securing wireless communication is a formidable task, something that many companies are rapidly learning the hard way. IP level solutions become extremely cumbersome when

More information

TECHNICAL REPORT IEC/TR

TECHNICAL REPORT IEC/TR TECHNICAL REPORT IEC/TR 61850-90-5 Edition 1.0 2012-05 Communication networks and systems for power utility automation Part 90-5: Use of IEC 61850 to transmit synchrophasor information according to IEEE

More information

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2

Chapter 2. Communicating Over The Network. CCNA1-1 Chapter 2 Chapter 2 Communicating Over The Network CCNA1-1 Chapter 2 Communicating Over the Network The Platform for Communications CCNA1-2 Chapter 2 Elements of Communication People communicate in many different

More information

Architectural Principles

Architectural Principles Architectural Principles Brighten Godfrey CS 538 January 29 2018 slides 2010-2017 by Brighten Godfrey unless otherwise noted Cerf and Kahn: TCP/IP Clark: TCP / IP design philosophy Goals of the architecture

More information

Data & Computer Communication

Data & Computer Communication Basic Networking Concepts A network is a system of computers and other devices (such as printers and modems) that are connected in such a way that they can exchange data. A bridge is a device that connects

More information

Performance Enhanced Proxy Solutions for Satellite Networks: State of the Art, Protocol Stack and Possible Interfaces

Performance Enhanced Proxy Solutions for Satellite Networks: State of the Art, Protocol Stack and Possible Interfaces Performance Enhanced Proxy Solutions for Satellite Networks: State of the Art, Protocol Stack and Possible s Igor Bisio, Mario Marchese, and Maurizio Mongelli Abstract. There are many types of Performance

More information

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak

Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak Significance of TCP/IP Model Divya Shree Assistant Professor (Resource Person), Department of computer science and engineering, UIET, MDU, Rohtak Abstract: TCP/IP (Transmission Control Protocol/Internet

More information

CS-461 Internetworking. Dr. Mohamed Aboutabl

CS-461 Internetworking. Dr. Mohamed Aboutabl CS-461 Internetworking Dr. Mohamed Aboutabl http://www.cs.jmu.edu/users/aboutams The McGraw-Hill Companies, Inc., 2000 1 Chapter 1 Introduction The McGraw-Hill Companies, Inc., 2000 2 Internet today Network

More information

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network Chapter Goals Chapter 15 Networks Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

FUJITSU Software Interstage Information Integrator V11

FUJITSU Software Interstage Information Integrator V11 FUJITSU Software V11 An Innovative WAN optimization solution to bring out maximum network performance October, 2013 Fujitsu Limited Contents Overview Key technologies Supported network characteristics

More information

IP in MV/LV: Expanding IP services to the medium and low voltage layers of the power distribution grid

IP in MV/LV: Expanding IP services to the medium and low voltage layers of the power distribution grid IP in MV/LV: Expanding IP services to the medium and low voltage layers of the power distribution grid UtiliNet Europe 2018 May 15 th, 2018 Brussels, Belgium Dr. Jürgen Tusch Head of Telecommunications

More information

Communication Networks

Communication Networks Communication Networks Nicholas Honeth (nicholash@ics.kth.se) Contents of the series Lecture 10 - Recap of the networks we ve seen so far - OSI model - Circuit and packet switching - Physical media Lecture

More information

White Paper. Performance in Broadband Wireless Access Systems

White Paper. Performance in Broadband Wireless Access Systems White Paper Performance in Broadband Wireless Access Systems Defining Broadband Services Broadband service is defined as high speed data that provides access speeds of greater than 256K. There are a myriad

More information

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322 1 Local & Metropolitan Area Networks ACOE322 Lecture 5 TCP/IP Protocol suite and IP addressing 1 0. INTRODUCTION We shall cover in this topic: 1. The relation of TCP/IP with internet and OSI model 2. Internet

More information

Wireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer

Wireless TCP. TCP mechanism. Wireless Internet: TCP in Wireless. Wireless TCP: transport layer Wireless TCP W.int.2-2 Wireless Internet: TCP in Wireless Module W.int.2 Mobile IP: layer, module W.int.1 Wireless TCP: layer Dr.M.Y.Wu@CSE Shanghai Jiaotong University Shanghai, China Dr.W.Shu@ECE University

More information

ETSF10 Internet Protocols Transport Layer Protocols

ETSF10 Internet Protocols Transport Layer Protocols ETSF10 Internet Protocols Transport Layer Protocols 2012, Part 2, Lecture 2.1 Kaan Bür, Jens Andersson Transport Layer Protocols Process-to-process delivery [ed.4 ch.23.1] [ed.5 ch.24.1] Transmission Control

More information

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer

Layering in Networked computing. OSI Model TCP/IP Model Protocols at each layer Layering in Networked computing OSI Model TCP/IP Model Protocols at each layer Learning outcomes Understand the need of layering in Networked computing Understand the OSI model and the tcp/ip model Understand

More information

THE TCP specification that specifies the first original

THE TCP specification that specifies the first original 1 Median Filtering Simulation of Bursty Traffic Auc Fai Chan, John Leis Faculty of Engineering and Surveying University of Southern Queensland Toowoomba Queensland 4350 Abstract The estimation of Retransmission

More information

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski

Operating Systems. 16. Networking. Paul Krzyzanowski. Rutgers University. Spring /6/ Paul Krzyzanowski Operating Systems 16. Networking Paul Krzyzanowski Rutgers University Spring 2015 1 Local Area Network (LAN) LAN = communications network Small area (building, set of buildings) Same, sometimes shared,

More information

Networking Models OSI Model Created by International Organization Standardization

Networking Models OSI Model Created by International Organization Standardization Networking Models OSI Model Created by International Organization Standardization Prepared by Agha Mohammad Haidari Network Manager ICT Directorate Ministry of Communication & IT Email : Agha.m@mcit.gov.af

More information

Information Network Systems The network layer. Stephan Sigg

Information Network Systems The network layer. Stephan Sigg Information Network Systems The network layer Stephan Sigg Tokyo, November 1, 2012 Error-detection and correction Decoding of Reed-Muller codes Assume a second order (16, 11) code for m = 4. The r-th order

More information