Simulation of Switched Ethernet

Size: px
Start display at page:

Download "Simulation of Switched Ethernet"

Transcription

1 Technical report, IDE0633, February 2006 Simulation of Switched Ethernet Master s Thesis in Computer System Engineering Kishore Kumar Nachegari Suresh Babu Eadi School of Information Science, Computer and Electrical Engineering Halmstad University

2

3 Simulation of Switched Ethernet Master s Thesis in Computer System Engineering School of Information Science, Computer and Electrical Engineering Halmstad University Box 823, S Halmstad, Sweden February 2006

4 iv

5 Preface and Acknowledgements This project is a part of the work required for the fulfillment of our Master s degree in Computer Systems Engineering in February 20006, which was carried out in the CC-Lab, Halmstad University, Sweden. We would like to thank our supervisors, Professor Magnus Jonsson and Xing Fan without whose continuous valuable guidance this work would not have been achieved. Kishore Kumar Nachegari & Suresh Babu Eadi Halmstad University, February v

6 vi

7 Abstract Switched Ethernet is an Ethernet LAN that uses switches to connect individual nodes. This is popular because of its effective and convenient way of exting the bandwidth of existing Ethernets. Switched Ethernet is being considered by the industry community because of its open standardization, cost effectiveness, and the support for higher data rates up to 10Gbps. Even though many special-purposed solutions were proposed to support time constrained communication over Switched Ethernet, still there were some doubts about the real time handling capability of Switched Ethernet. To achieve reliable transmission guarantees for real time traffic over Switched Ethernet, it is important to measure the performance of Switched Ethernet networks for real time communication. In this thesis work we have observed the average -to- packet delay for real time traffic over a Switched Ethernet by simulation, which is very much essential for real time communication in industrial applications, where the communication is time-deterministic. In our thesis we used FCFS priority queuing in both the source nodes and switch. In this thesis we also discussed about the feasibility analysis for fixed sized frames and some traffic handling methods. We used 100mbp/s single full duplex Ethernet switch for our simulation. Finally simulation analysis and simulation results are discussed. Our purpose of simulation of Switched Ethernet networks is of good importance for the real time industrial applications. Keywords Switched Ethernet, Real time Communication, First Come First Serve (FCFS), Feasibility analysis. vii

8 viii

9 Goals The main goal of this project is to investigate the performance of real time Switched Ethernet by simulation on packet level. Our task is to build a software simulator which is used to test the performance of the method over a Switched Ethernet. We need to observe the average to packet delay of the real time traffic over a Switched Ethernet. By using some traffic handling methods and queuing mechanisms, the performance of the Switched Ethernet for real time communication can be determined. ix

10 x

11 TABLE OF CONTENTS PREFACE AND ACKNOWLEDGEMENTS...V ABSTRACT...VII GOALS... IX TABLE OF FIGURES...XIII 1. INTRODUCTION APPLICATIONS RELATED WORK INDUSTRY PROPOSAL Ethercat Profibus Profinet ACADEMIC PROPOSAL Related Research work NETWORK ARCHITECTURE AND TRAFFIC HANDLING REAL TIME COMMUNICATION REAL TIME CHANNEL ESTABLISHMENT REAL TIME ANALYSIS REAL TIME CHARACTERISTICS FEASIBILITY ANALYSIS APPROACH FLOWCHART TO CALCULATE AVERAGE DELAY DESCRIPTION OF THE ALGORITHM SIMULATION ANALYSIS SIMULATION RESULTS CONCLUSIONS REFERENCES APPENDIX A GLOSSARY AND EXPLANATIONS APPENDIX B SOURCE CODE xi

12 xii

13 Table of Figures FIGURE 1 CONCEPTUAL DIAGRAM OF ETHERCAT... 6 FIGURE 2 FORMAT OF THE IEEE P EXTENDED ETHERNET FRAME FIGURE 3 STAR TOPOLOGY FIGURE 4 CONCEPTUAL MODEL OF A FULL DUPLEX ETHERNET SWITCH FIGURE 5 MODEL OF FRAME TRANSITION IN AN ETHERNET SWITCH FIGURE 6 ESTABLISHMENT OF REAL TIME CHANNEL FIGURE 7 FLOWCHART 1 AVERAGE DELAY CALCULATION FOR FIXED SIZED PACKETS AND FCFS QUEUING FIGURE 8 AVERAGE DELAY VS TOTAL NO OF REQUESTED CHANNELS AND NUMBER OF ACCEPTED CHANNELS VS NUMBER OF REQUESTED CHANNELS FIGURE 11 UTILIZATION OF REAL TIME CHANNELS VS TOTAL NUMBER OF REQUESTED CHANNELS FIGURE 12 AVERAGE DELAY VS TOTAL NUMBER OF REQUESTED CHANNELS AND NUMBER OF ACCEPTED CHANNELS VS NUMBER OF REQUESTED CHANNELS FIGURE 13 UTILIZATION OF REAL TIME CHANNELS VS NUMBER OF REQUESTED CHANNELS FIGURE 14 AVERAGE DELAY VS TOTAL NUMBER OF REQUESTED CHANNELS AND NUMBER OF ACCEPTED CHANNELS VS NUMBER OF REQUESTED CHANNELS FIGURE 15 UTILIZATION OF REAL TIME CHANNELS VS TOTAL NUMBER OF REQUESTED CHANNELS FIGURE 16 AVERAGE DELAY VS TOTAL NUMBER OF REQUESTED CHANNELS AND NUMBER OF ACCEPTED CHANNELS VS NUMBER OF REQUESTED CHANNELS FIGURE 17 UTILIZATION OF REAL TIME CHANNELS VS NUMBER OF REQUESTED CHANNELS FIGURE 18 AVERAGE DELAY VS TOTAL NUMBER OF REQUESTED CHANNELS AND NUMBER OF ACCEPTED CHANNELS VS NUMBER OF REQUESTED CHANNELS FIGURE 19 UTILIZATION OF REAL TIME CHANNELS VS TOTAL NUMBER OF REQUESTED CHANNELS xiii

14 xiv

15 1. Introduction Ethernet is the most widely used local area network. Since it s inception in 1973, Ethernet has achieved much popularity and success because of its simplicity and very low price. Ethernet is unsuitable for control level network applications under moderate to heavy traffic loads. Ethernet was not originally designed to support real time traffic due to the random strategy employed by Ethernet s Carrier Sense Media Access/Collision Detection (CSMA/CD) Media Access Control (MAC) protocol for resolving access contention to the network media. CSMA/CD used in Ethernet causes collisions and congestions and there is no flow control in it. This is the fundamental limitation of Ethernet for real time applications. However, Ethernet is attractive for real time applications due its popularity, low cost and high performance. Several techniques were developed to make Ethernet s exhibit the real time behavior, some requires specialized hardware, some providing soft real time guarantees and others providing hard real time guarantees with varying bandwidth efficiency. Switched Ethernet eliminate the CSMA/CD collision problem caused by traditional Ethernet networks. The properties like full duplex and flow control has caused the migration to Switched Ethernet networks. Apart from that it is also very cheap and increases the network bandwidth efficiency. This has opened the way to enable time constrained communication over Switched Ethernet networks. Switched Ethernet is a packet switching technology that reduces the network congestion caused by the CSMA/CD over shared media, and it offers guaranteed bandwidth per port and operates at the medium access control sub layer of the network access layer of the TCP/IP protocol. Switched Ethernet is used to support high bandwidth real time communication in process control, factory automation and other real time applications. There are three main architectures of switches, which are store & forward, cut through and fragment free, but the most commonly available switch is store and forward, in which an Ethernet packet is entirely stored and checked by the device before retransmitting in to the proper destination. Corrupted data grams are eliminated and results in the maximum utilization of the bandwidth. In conventional Ethernet, information is exchanged among the nodes over a common communication channel, whereas in Switched Ethernet the nodes are connected to a switch using point to point connection. In Switched Ethernet, switch is an active device that identifies the destination ports. It controls the data to and from the nodes communicating over the Ethernet. This optimizes data bandwidth and improves real time data traffic. The conventional Ethernet uses a half-duplex link, whereas, the Switched Ethernet uses a full duplex link [18]. Switched Ethernet in recent years has grown as an attractive enabling technology for supporting time constrained communication. Process control, factory automation are some of the examples of using Switched Ethernet to support high speed real time communication [18]. This can be seen by HMS (HMS Industrial Networks), one of the Sweden s fastest growing manufacturing companies in the field bus technology sphere has adapted to Switched Ethernet networks [11]. This shows the growing importance of Switched Ethernet for real time industrial networks. As industries migrate towards Switched Ethernet networks for time critical applications still there s some uncertainty about the time behaviors of the Switched Ethernet networks. End to delay is the most important character in real time systems. This is one of the user 1

16 defined QoS metrics. To evaluate the performance of Switched Ethernet networks to achieve reliable guarantees in time critical applications, it is important to observe the average to packet delay for real time traffic over Switched Ethernet. 2

17 2. Applications Real time applications such as industry process control, telecommunication equipment, automation control and other industrial applications require strict time deterministic transmissions. In such systems frames containing the real time information, have to be delivered with in certain time limit. Correct performance is specified by the packet delivery with in a certain delay bound [13]. The properties like reduced cost, flexibility and expandability makes Switched Ethernet a suitable technology for many real-time communications. Switched Ethernet in industrial applications increases network bandwidth and provides network determinism for industrial control applications, and is the cost effective solution for industrial environments. Switched Ethernet networks are suitable for range of high performance parallel and distributed applications such as radar signal processing, cluster computing, computer integrated manufacturing [13]. Switched Ethernet is also used in optical networks. Switched Ethernet in optical networking brings high quality real time performance capabilities for packet switching networks. Switched Ethernet networks are also used for heavy-duty applications such as process control, machine monitoring, remote data acquisition, environmental control and in other real time applications. In academic applications, Switched Ethernet in VPLS (Virtual Private LAN services) provides proactive network monitoring, browser-based reporting, notification and trouble shooting, flexible billing and service options [26]. Switched Ethernet helps you consolidate administration by providing remote locations with high speed access to servers, file servers and shared internet access. Presently Switched Ethernet is predominantly used for enterprise branch office and site to site communication [25]. 3

18 4

19 3. Related work 3.1 Industry proposal To satisfy the time constrained communication required by process control, factory automation and other real time applications many field bus protocols have been developed and are successfully implemented. The demands on real time communication in the automation world are determined in large part by the applications, and are often characterized by the response time. Ethercat, Profibus, and Profinet are some of the special purposed real time Ethernet solutions designed to meet the real time communication requirements in the industry. Some of the industrial real time Ethernet solutions are briefly discussed below: The below mentioned technologies are used in the same area of application, which is in automation industry. Ethercat, Profibus and Profinet can meet the requirements needed for real time communication like Switched Ethernet. But Ethercat, Profibus and Profinet are particularly suited for exchange of small amounts of data under time and offers low bit rate. Exchange of large amount of data under time and higher bandwidth can be achieved by using Switched Ethernet while fulfilling the requirements of real time communication. Limitations of these dedicated technologies, possibly formed along the way to Switched Ethernet Ethercat Ethercat, which is defined as Ethernet for control automation technology is developed by the Beckhoff electronic industry [2]. Ethernet at the field level has some drawbacks. It is not very useful for sing frequent, short messages, and the connection costs are high. These can be overcome by using Ethercat that is fast and cheap.in Ethercat, a new approach is used to bring Ethernet to the I/O domain. A significant improvement of the usable data rate can be achieved by using the Ethercat. The field memory management unit in the Ethercat helps utilizing the data rate almost up to 100%. In fact, a high bandwidth and real time capability can be achieved using Ethercat. It does not require an IP address, where the master automatically controls the configuration using simple algorithms. Therefore Ethercat provides a powerful communication basis for the automation industry [2]. Working Principle: Ethercat bus ss and receives Ethernet telegrams. It has large number of Ethercat slaves, which extract the information coming from its predecessor and insert relevant data before passing it on its next successor, where the last slave s the processed telegram to its master. It operates in a full duplex mode. Ethercat supports almost any topology: line, star or bus. The topology of Ethercat is an open ring bus in logical terms because of the master-slave communication. It can also support branches wherever applicable to form a tree structure instead of a line structure. The Ethercat protocol is optimized for processing data for different types of communication and is transported directly within the Ethernet frame. It consists of several Ethercat telegrams. Any type of communication is possible among the slaves. The following are some of the features of Ethercat [2]: Ethercat has a flexible topology, simple configuration and it is cost effective. Therefore, Ethercat enabled filed buses to be used in the applications, where they were not used in the past. The Ethercat protocol is optimized for processing data and is transported directly within 5

20 the Ethernet frame. This new approach is used to bring the Ethernet to the I/O domain, which is the first true Ethernet solution for the field level. Ethercat can access 12,000 digital I/O in 350 micro second or 100 servo axes in 100 micro seconds. For Ethernet point of view, an Ethercat bus is a large device that ss and receives Ethernet telegrams. Ethercat does not contain an Ethernet controller with down stream but contains large number of Ethernet frames. These process the incoming datagram s directly and the relevant user data can be extracted, or the data is transferred to the next slave by inserting data to the telegram. The last Ethercat slave ss the fully processed data to the master, thus the processing is performed while passing. In Ethercat, Ethernet deals separately with the transfers in separate directions (Tx and Rx) and this operates in full duplex mode by loop back through R x pair, transmitted telegrams are returned to the control. By using cross over cable, direct communication without switch can be established like any other Ethernet, thereby creating a pure Ethercat system. With Ethercat technology, switching is done in the network interface, while the Ethernet frame continues through the device [2]. Figure 1 Conceptual diagram of Ethercat There are no microprocessors or software stacks to execute communication functions in Ethercat. Ethercat achieves the high speed by performing all communication functions in hardware. Ethercat, which is indepent of the transmission speed, can be used for 1 Gb or more without any modification. It is so fast that the master, while sing the last bytes of its query, receives the returned response. The configuration of the Ethercat is automatically controlled by the master. Some of the advantages of the Ethercat are optimized telegram structure for decentralized I/O, communication completely in hardware that gives maximum performance and no switch is needed if only Ethercat devices in the network. By using Ethercat available bandwidth is almost fully utilized and the costs are reduced. Ethercat does not require an IP address, and configuration is automatic-controlled by the master. It has Standard hardware for the master. Compatible with legacy CAN Open. It is well suited for cost-effective control applications and has outstanding performance. Despite of all these advantages it also has some drawbacks which include lack of integration with other systems and high installation overhead, and it does not use switching to increase the throughput. 6

21 3.1.2 Profibus Profibus, which is a field bus standard for manufacturing automation and process control, uses a token passing protocol on the top of a MAC level [18]. This is one of the most famous field bus standards. Profibus encompasses several industrial bus protocol specifications, which include Profibus-DP, Profibus-PA, and Profibus-FMS. Profibus-DP is a device level bus that supports both analog and discrete signals, used in motor control centers and remote I/O systems. Profibus PA is used for process level instrumentation and is a fullfunction field bus. Profibus-FMS is a control bus used for communication between DCS and PLC systems. Real time behavior of the traffic in the Profibus can be guaranteed by two different approaches. One approach is the unconstrained low priority traffic profile, where the real time requirements for the synchronous traffic are satisfied. In this synchronous message is transmitted per token which is indepent of asynchronous traffic load [17]. Another approach is constrained low priority traffic profile, where all ping real time traffic can be transmitted at each token by controlling the number of a low priority traffic message [20]. Working Principle: The Profibus protocol architecture consists of three layers: physical, data link, and the application layers. The physical transmission characteristics are defined by the physical layer, bus access is defined by the data link layer and the application functions are defined by the application layer. It uses a shared bus topology. Profibus service allows information broadcasting/multicasting. Profibus uses a token-passing protocol on top of a broadcast medium on the MAC level. Profibus MAC is based on token passing procedure, which is used by the master stations to grant the bus access to each other, and on a master slave procedure, which is used by the master to communicate with the slave stations [18]. The interaction model offered by the Profibus is mainly on the master slave polling, which is more suitable to periodic data exchanges [19]. The Profibus token passing procedure uses a simplified timed token protocol. One important parameter of this kind of protocol is the target token rotation time (T TR ), which is set at the network installation time and stands for all the network nodes. After receiving the token, the station may transmit high priority messages for a time period no more than its allocated synchronous capacity (H i ). If the previous rotation time is lower than the T TR, low priority messages can be transmitted [18]. When comparing to the timed token protocol, the main difference of the Profibus token passing consists the absence of synchronous bandwidth allocation. In Timed Token, if a station receives a late token, only one high priority message can be transmitted, whereas, in Profibus, low priority traffic affects the high priority traffic. In fact, if a station receives an early token, and the low priority traffic is not constrained in that station, the subsequent stations may be limited to one high priority message transmission. Real time behavior of the high priority traffic can be guaranteed with the Profibus, despite the absence of the synchronous bandwidth allocation [20]. Profibus addresses the needs of multiple manufacturing domains, from bus power for field instruments to high-speed deterministic control. It is a single integrated system from planning to maintenance. It is used in wide range of applications, particularly in the field of process automation and factory automation. It is suitable for fast, time-critical applications and complex communication tasks. It can handle large amounts of data at high speed and serve the needs of large installations. The Profibus DP, FMS and PA versions collectively address the majority of automation applications. Some of the advantages of Profibus DP-PA- FMS networks are: network support at the device, process control and Ethernet levels, interfaces are available for variable speed drive and motor control applications (Profibus DP), process instrumentation available with Profibus PA devices, gate way devices are available to directly support lower cost sensor bus networks. It offers cost effective solution for industrial automation. Some of its drawbacks are high overhead to message ratio for small amounts of 7

22 data, no power on the bus, slightly higher cost than some other buses, Profibus DP does not support intrinsically safety installations, and no control in the field capabilities Profinet Profinet is the industrial Ethernet based communication system devised by Profibus International (PI) [3]. It can simultaneously handle standard Ethernet transmissions and realtime transmissions at high speeds. Profinet is developed to allow Profibus communication across Ethernet networks. It is divided into three classes: Profinet CBA, Profinet RT, and Profinet IRT. Profinet CBA is used for controller communication in component based systems, uses TCP/IP. Profinet RT is used for I/O device communication in soft real-time systems and is well suited for use with distributed I/O, and the Profinet IRT is used for motion control applications in hard real-time systems. Profinet is an integrated and comprehensive standard of automation technology from the field level to the management level, from the standard control to high motion control with safety and security functions integrated. It can support all the general network topologies or even a mixture of these structures. It is based on industrial Ethernet, uses TCP/IP and IT-standards. It offers an open interface to the field buses. Working principle: The real-time channel is established for time critical messages, which is implemented by software based controllers, whereas, the non-time critical messages are carried over TCP/UDP and IP. An Isochronous real time communication is established for motion control applications. Profinet CBA supports non real-time communication over TCP/IP and RT class 1 protocol for medium performance real time communication. The Profinet IO supports non RT based on UDP/IP, and RT class 1, RT class 2 for hard real time applications. It supports a multi-layer diagnostics that helps efficient error location and elimination. To carry all the traffic classes on the same channel time division multiplexing is employed [4]. Profinet IO and Profinet CBA use the same real time protocol to distribute real time data. Real-time data and other data are scheduled by the driver inside the device to keep the real-time at high priority. The components of the Profinet are mapped during run time in the form of DCOM objects whose communication is ensured through the mechanisms of the object protocol. This identifies the object and the method with the associated interface and parameters. The DCOM protocol is part of the run time software. The service definition and protocol specification of real time communication are provided by the Profibus I/O device, based on Ethernet, IP and UDP for the field bus domain. Service communication between I/O controllers and I/O devices can be defined by the Profibus I/O. Profinet defines a non-real time protocol and two classes for real time communication to enable real time and TCP/IP traffic. Each protocol has a specific target time. Profinet CBA focuses its efforts in defining an object oriented environment, where the engineering phase can be simplified [4]. The biggest advantage of using Profinet for communication is real-time and TCP-based IT communications can coexist on a single line. It allows seamless integration of underlying field bus systems thereby reducing costs for product development. It supports both pure Ethernet applications, and combined field bus and Ethernet applications. It supports standard IT communication mechanisms for normal use in the office environment. The use of the same communication mechanisms in the office and automation environment permits total integration of different corporate levels. Since it builds on the world-class and highly popular Profibus standards, it can be applied on very wide range of applications like remote access, wireless communication, and high performance motion control applications. The disadvantage of using Profinet is that, it cannot be ported to other architectures. It overrides the standard 8

23 Ethernet medium access control, requires strict synchronization and also higher in cost compared to other existing standards. However, these standards have their own drawbacks when we demand more real time capability than they offer. To achieve higher bandwidth, flexibility and scalability many field bus standards include Ethernet networks as a low layer communication system. These networks are soon replaced by the Switched Ethernet to achieve real time handling capability. Because of the complex load of real time applications and different network context, there is a growing demand for the use of Switched Ethernet in these applications. Switched Ethernet has grown to be more and more attractive enabling technology for supporting time constrained communication. To ensure a guaranteed delivery of the real time traffic using Switched Ethernet in industrial applications, we analyze the real time handling capability of Switched Ethernet networks by observing the average to packet delay. 3.2 Academic proposal There are different networks with different real time capabilities, aiming at different applications. Switched Ethernet is one of the approaches to improve Ethernet s behavior to support real time communications. The real-time Switched Ethernet network approach is presented in Ethereal [23], SIXNET Industrial Ethernet Switch [24]. Ethereal is a real time fast Ethernet switch architecture that provides bandwidth guarantees to distributed multimedia applications without any OS and hardware modifications Related Research work There are also several research areas to support real time communication over Switched Ethernet. Research work is carried out to improve the real time behavior of Ethernet networks using traffic smoothing [15]. In this the author talks about fuzzy traffic smoothing. To achieve statistical delay bound on packet delivery over Ethernet networks, an Adaptive traffic smoothing technique at the field level is employed. This technique was chosen because fuzzy smoother outperform the other adaptive smoothers proposed earlier. Fuzzy traffic smoothing is a soft computing based technique to perform adaptive traffic smoothing and address the optimization of the fuzzy smoother through genetic algorithms. Some further work needs to be done for traffic smoothing dealt with fuzzy smoothers for Switched Ethernet networks. In order to support quality of service (QoS), a FTT-Ethernet protocol, which supports hard real time communication in a flexible way, seamlessly over shared or Switched Ethernet is proposed in [22]. This protocol satisfies the requirements of dynamic real time applications. It includes online admission control to guarantee continued real time operation under dynamic communication requirements together with data structures and mechanisms that are used to support dynamic QoS management. The implementation of FTT-Ethernet over micro segmented Switched architectures needs to be addressed further to solve some of the problems that affect the real time performance of Ethernet switches. Research work is going on Switched Real Time communication for industrial applications in Halmstad University by Dr. Magnus Johnson and Xing Fan [10] [1]. The research work is going on how to form methods to support industrial real time services, how they can be implemented in the switches without changing the underlying protocol, how it should be supported by the existing higher level protocols in the mean while. The aim of the research is to implement such methods in the industrial applications. Other aim of the research 9

24 is how to form methods to increase analyzability and what degree of throughput, latency can be expected from these communication systems. For industrial applications it requires minimum latency. The main goal of this research is to develop and analyze methods to support real time traffic. To get as much functionality and performance these methods can be implemented in the switches or network. By including more number of switches, the system performance can be improved and the possibility to offer real time services can also be increased. Some research work was already done in the field real time services which are used to introduce real time services on the top of the LAN technology, and the traffic with different priority classes has been developed [11]. For the industrial applications we require shorter response times. Some work on real time communication over Switched Ethernet has done but they mainly focused on the bandwidth guarantees for multimedia traffic not on the industrial applications with shorter response time. 10

25 3 Network architecture and traffic handling Switch handling: We consider a network with a star topology, single Ethernet switch and number of nodes. Every node is connected to other node via switch. A direct logical line of communication is established between two points for each frame by the switch. The switch is assumed to be store and forward, contains three main components: queuing model, switch implementation and switch fabric [8]. The queuing model refers to the buffer and congestion mechanism in switch, and switch implementation is the decision making process, whereas the switch fabric is the path that moves the data from one port to other [8]. All recent Ethernet switches are operating with wire speed and nonblocking. Wire speed means all ports of a switch can simultaneously transmit or receive at their full bit rates. In nonblocking, a message can be forwarded to the destination port as long as that port is free, while a blocking one may not able to forward the message to the destination although the destination port is free. Buffering and buffering delay exist in the switch. Buffering delay occurs when the output port cannot forward all the input messages in time and this corresponds to the burst traffic arrival. Buffering delay analysis deps on the input traffic pattern. The true number of the buffering switch with each output port bit rate is higher than/or equal to the sum of all input ports [8]. The contents of the Switched Ethernet frame is shown in the below [8]: Figure 2 Format of the IEEE p Exted Ethernet frame Preamble: A sequence of 56 bits that have alternative 1 and 0 values used for synchronization. Start Frame Delimiter (SFD): The bit sequence , which indicates the actual start of the frame. Destination Address (DA): It may be a unique physical, global or group address, in which inted frames are specified by the stations. Source Address (SA): It specifies the station that sent the frame. Tag Protocol Id (TPID): TPID carries the tag field. In an Ethernet frame if the TPID filed value equals to 8100 then it carries tag IEEE 802.1Q/802.1P. 11

26 Tag Control Info (TCI): TCI filed is the header field that is having following 3 fields level format network User Priority: This is a 3 bit field. This field can be used to store the priority for the frame. Canonical Format Indicator (CFI): This is a one bit field denoting whether MAC addresses in the frames are in canonical format. This is called the canonical indicator. Virtual Local Area Network (VLAN) ID: This is a 12 bit virtual local area ID. Length: Indicates the length of the data field in bytes. Type: This is Ethernet type field, which is used for identifying the contents of the data field. Data: The data which we s is IP data grams. Maximum length of the data field is 1492 bytes. Frame Check Sequence (FCS): This is a 32 bit cyclic redundancy check, based on all fields except preamble, SFD, FCS. The length of the Ethernet frame excluding SFD and preamble is between 64 and 1518 bytes. Traffic can be classified by addling 802.1P header to the frame and the classified traffic can be put into different priority queues. Network Topologies: In our work we have preferred star topology. The star topology is the simplest one for the real time communication because between any communication points only one switch is needed to be traversed. It is very easy to maintain and configure. This topology is suitable for small and some special purpose networks. It is a cost effective way to achieve real time services [12]. Figure 3 Star Topology 12

27 Traffic Handling: A network with a star topology, where nodes are connected by switch is examined. The IEE 802.1p queuing feature, which enables layer 2 switches to set priorities for traffic and perform dynamic multicasting to distinguish between different traffic classes. In our work we have considered hard real time traffic for our simulation. The generated traffic can be put into the corresponding queue before entering into the network interface card. The generated traffic is stored in the queue according to the FCFS. In the same way, there are buffering queues for each output port in the switch, where all queues in the switch follows the FCFS scheduling [5]. Generally a full duplex Ethernet switch model of n ports is given below [5]: Figure 4 Conceptual model of a full duplex Ethernet switch All N physical ports are in full duplex mode, which has n input ports and n output ports. Here, switch is running with 2n times of the line speed, where the switches are wired speed switches, which provides the bit rate of 100mbps with output buffering. Arrival packets can be classified and Switched according to the TDMA principle. The switching program periodically polls the n input ports according to the TDMA, and the arrived packets can be transmitted according to the transmission buffer that is also called as output buffer. Buffering and buffering delay exists in the switch. Output buffering overflow can be minimized by using shared memory queuing. The worst case time corresponds to the sum of the transmission time and interframe spacing time, where worst case response can be evaluated by using fixed priority scheduling. [5] Here we are considering the star topology of Switched Ethernet and nodes. Realtime traffic guarantees can be achieved by adding RT layer to the Switched Ethernet and nodes. Nodes are connected via the switches, which establishes the logical line of communication between two points in each frame and the nodes are connected virtually. In this network, nodes have the capability of controlling the traffic from the nodes, using the FCFS algorithm at the source node and the switch [9]. Frame Transition Model: In a fully Switched Ethernet there is only one switch per switch port, using full duplex switches to delay can be minimized by decreasing the 13

28 message buffering at maximum [8]. A frame traveling through switches with out any buffering has the minimum delay. Total delay introduced by a switch consists of switching latency, frame forwarding latency, and the buffering delay [8]. Policy of service used in the input queue is FIFO. The frames transition for all the input queue is done towards CPU. The objective of the CPU is route frames towards the output according to the routing table. Here also FIFO policy is used. In the output queues, routing is done towards a port of another switch or system [8]. Frame transition in the Switched Ethernet with output buffering is shown in the figure below. Figure 5 Model of Frame transition in an Ethernet switch 14

29 4 Real time communication 5.1 Real time channel Establishment Before real time traffic is delivered, real time channel must be established. Real time channel establishment consists of request and acknowledgement communication where the source node, destination node and the switch agree on the channel establishment. When a node wants to establish an RT channel, it ss a request frame to the switch. Switch performs the admission control and ss a response frame. If the switch finds any feasible link then it forwards the request frame to the destination node [9]. Destination node responds with a response frame to the switch and intimates whether the channel is accepted or not. After taking the response from destination node, switch forwards the response frame to the source node. If the switch did not find any feasible schedule then the response frame is not forwarded to the destination, instead switch ss that requested frame to the source node by intimating about the rejection. After the channel is established, nodes use that channel. Both the switch and nodes have RT layer which shapes the real time traffic on the channel. When an RT channel is established, the network guarantees to deliver each generated message with a bounded delay. Following figure shows the establishment of real time channel [9]. Figure 6 Establishment of real time Channel 5.2 Real time Analysis The to delay bound is one of the user defined QoS parameter. By adding real time channels dynamically, time constraints can be guaranteed, which are characterized by certain parameters. A real time channel is the unidirectional virtual link between the two nodes, which provides the real time guarantee for hard real time traffic. A real time channel with index i is characterized as [10]: {Sourcei, Dest i, T period, i, C i, T deadline, i } Where Source i indicates the source node, Dest i indicates the destination node, Period i is the period of the data generation, C i is the amount of data per period (capacity), T deadline, i defines 15

30 relative deadlines used for the admission control. T period, i and T deadline, i are expressed in microseconds, C i is expressed as the number of bytes of the complete message. One message can have several Ethernet frames. Before performing feasibility analysis, we need to calculate the total amount of traffic per period including data and header for each logical real-time channel. The length of the Ethernet frame T ef is 1526 bytes, if only Ethernet header is considered. Minimum length of the data filed in an Ethernet frame T mind is 10 bytes. Maximum length of the data field in an Ethernet frame T maxd is 1492 byes. If the data field is not less than 38 bytes then the length of the header T h is 34 bytes. Otherwise a pad field is added to meet the minimum frame size required by IEEE standard [10]. The amount of traffic including the data and header per period for each real time channel i is expressed as number of bytes C i, where C i can be derived as [27]: capi Tef T max d + ((cap i mod T maxd )) +T h If ((cap i mod T maxd )) T mind; C i = capi Tef T max d +72 If 0< ((cap i mod T maxd )) <T mind ; capi Tef T d max If ((cap i mod T maxd )) = 0; 5.3 Real time Characteristics A. Switch architecture: Functionally, switch is considered as a multi port bridge. Switch is more powerful than a multi port bridge due to its ASIC based hardware architecture and ultra rapid simultaneous multiple access memory. Switch can have an IP address and as many as MAC addresses. Ethernet switch provides one collision domain per port. Collisions can be completely eliminated, if it is a full duplex switch. There is no standard for Ethernet switch. There exist many kinds of internal architectures called switch fabrics. Three main architectures are matrix, bus and shared memory [8]. Matrix based switch fabrics, also called as crossbars. This type of architecture has great number of ports that neither bus nor shared memory can achieve. But matrix based architecture is more problematic, when broad cast or multicast or unicast occur simultaneously. When a broadcast or multicast taking place, no unicast can be transmitted. In bus based architecture it has very high speed core bus, shared by input and output ports. Bus architecture is based on TDMA access control, when compared to the matrix architecture, bus based architecture naturally supports broad cast traffic. This is an advantage for bus based architecture. But the problem with this architecture is when many inputs are forwarded to the same output port then out put buffer overflows. 16

31 Third widely used architecture is shared memory architecture which is based on ultra rapid simultaneous multiple access memory, shared by all ports. Here data entered into the switch is stored in memory. And the data can be forwarded by ASIC engine which looks up the MAC destination address in the forwarding table, finds it and ss to the correct output port. To avoid the head of line blocking, output buffering is used instead of input buffering. Using shared memory, output buffering can be minimized since the buffer size is dynamically adjusted. Buffer over flow can be reduced when all output ports, share the same global memory compared to per port queuing. All recent Ethernet switches are announced to be working with wire speed and non blocking. In wire speed switches, all ports of a switch can simultaneously transmit or receive at their full bit rates. This requires the switch fabric to operate at a bit rate that equals to the aggregate speeds of all the ports. A switch is non blocking when it can forward a message to the destination port as long as the port is free, while blocking one may not forward the message to the destination although the destination port is free. B. Full-Duplex: In a full duplex mode, both the ser and receiver can transmit information simultaneously. It is only possible when a single LAN station is connected to an Ethernet Switched port. Shared hubs do not support full duplex mode. Server performance can be improved in full duplex mode. Bandwidth is also improved because both transmission and reception can occur simultaneously. The other factor, signal attenuation has the major effect on the cabling scheme. Attenuation is nothing but weakening of the signal and this is a crucial factor in LAN design. Full duplex is primarily useful to ext the distance of an Ethernet, where the limitation length is due to propagation delay not attenuation. Full duplex doubles the Ethernet speed. Full duplex cabling scheme is a point to point, where all clients communicate with the server [8]. C. Bit rate improvement: A switch can support different bit ports: 10 Mbps, 100Mbps, 1Gbps and even 10 Gbps. Switch can adopt to the bit rates of their ports according to the connected equipment. Scalable bandwidth can be achieved by switch. Higher the bit rate, shorter the delay of communication is achieved [8]. D. Forwarding Model: A switch decreases the data transmission delay by forwarding a frame before it is completely received by the switch [8]. Normal Switch Model: 1) Store & Forward mode: It waits until the reception of the complete frame and stores it before forwarding it to the output port that corresponds to its destination address. Through CRC calculation, error can be detected and causes long frame transmission latencies. 2) Cut through mode: It waits until the reception of the destination address and then forwards it to the output port. This reduces the frame forwarding latency but this model some times transmits erroneous frames, since CRC is not calculated before forwarding. 3) Fragment free mode: This mode eliminates the small fragments caused by collisions. This mode is same as cut through mode but waits until the 64 th byte before forwarding. 4) Auto select mode: This mode is the integration of store and forward, cut through and fragment free mode. This mode begins with store and forward and if no error occurs then it shifts to fragment free. If always no errors then it shifts to cut through. 17

32 E. Congestion control: Switched Ethernet is a packet switching technology that reduces the congestion caused by CSMA/CD. Congestion can be reduced by dynamically routing frames across network. A switch can achieve congestion control by preventing buffer over flow. Two techniques can be used for this: 1. Back pressure: In a full duplex mode, the switch can simulate a collision, if the amount packets received on the port is more than the switch can handle. 2. IEEE 802.3x pause command : A pause command can be s by the switch to the ser if the port in full duplex mode receives more traffic than it can handle [8]. 5.4 Feasibility Analysis Feasibility test can be done by the admission controller. Feasibility test can be implemented in an node or switch. In our thesis we discuss the feasibility analysis, only using FCFS priority queuing in both the source nodes and switch. In our work, feasibility is done by the switch. Feasibility test includes two steps, utilization constraint and delay constraint. Utilization for the physical link, U should be less than or equal to the 100% [10]. Ci U = 100% T i period, i The delay bound constraint is the sum of the worst case delay in the source node T d1,i and the worst case delay in the switch T d2,i. It should be less than or equal to deadline T deadline, i. T d1, i + T d2, i T deadline, i Worst case delay in the source node is the same for those logical real time channels who have the same source, this can be expressed as: T d1, i = T d1, j = D node n if Source i = Source j = n Where D node, n is the worst case delay, for the packets from the source node n. Worst case delay in the source node can be calculated when all real time channels start their period at the same time and maximum capacity of each real time channels is used [10]. D node n calculated as D node n = i C i Lr Where Lr k is the data bit rate of the link. k Worst case delay in the switch is the same for those logical real time channels who have the same destination, this can be expressed as T d2, i = Td2, j = Dport k if Dest i = Dest j = k. Where D port k is the worst case delay in the switch for the packets through output port k and D port k can be calculated by the following algorithm [10]: 18

33 1. Initialization Input (Nchs, Nports, k); T=0;Q=0; D portk = 0; plink = zeros[1...nports] 2 Find out D portk is the worst case delay in the switch for the packets through out put port k. 2.1 Find out how many packets on the way for each incoming physical link for j=1.nchs If (Dest j = = k) && mod (t, T period, j ) = =0 then Plink[source j ] = Plink[source j ] + C j ; if for 2.2 S packets to the output buffer in the switch at most one packet from each physical link for j = 1.Nports If Plink j >0 then Plink j = Plink j -1; Q = Q + 1; if End for 2.3 Remove one packet from the output buffer If t>0 then Q = Q 1; if 2.4 Keep track of worst case queuing delay If Q> D port k then D port k = Q if 3 If the output buffer is not empty then repeat step 2; 4 Return (D port k ); Table 1 Algorithm 1 Dportk calculation for fixed size frames and FCFS queuing In the algorithm Nchs denotes the number of logical real time channels in the system and Nports denotes the number of out put ports in the switch. After establishing the real time logical channel we have to generate the traffic in the source nodes. We have to calculate the average delay for the total number of transmitted packets. 19

34 20

35 5 Approach To support the real time communication over Switched Ethernet and to increase the performance, an Ethernet switch and nodes combines the several short messages into an Ethernet frame. The generated traffic must be checked by the admission control in the switch whether they can be accepted into the network or not. We have employed FCFS scheduling in the source node and the switch, as FCFS scheduling guarantees real time transmission. FCFS priority queuing in the switch gives hardware support for switching at wire speed and limits the switch processing overhead [15]. End to delay bounds can be guaranteed by the feasibility analysis. Steps for building a simulator: At first traffic should be generated. The admission controller located in the switch performs the feasibility analysis. The FCFS scheduling algorithm is used at both the source nodes and the switch. In order to put the generated traffic in a queue at each node, the maximum number of packets has to be checked at every time point t. For each input packet, we need to observe average delay of the generated traffic for a successful transmission of the generated packets. Assumptions: Some assumptions are made for performing the simulation. The network architecture is star topology. Each incoming frame has its destination address. The simulation is done by taking hard real time traffic into consideration. We consider fixed size frames for simulation. 21

36 22

37 7. Flowchart to calculate average delay Figure 7 Flowchart 1 Average delay calculation for fixed sized packets and FCFS queuing 23

38 24

39 8. Description of the algorithm The calculation of average delay is shown in flowchart 1.We use Nch to denote the number of channels, N denotes the number of nodes, Nports denotes the number of ports in the switch, simt denotes the simulation time and max queue length denotes the maximum size of the queue. In the simulation, each real time channels having randomly generated source and destination nodes. We have to generate the period, deadline and capacity for each real time channel. In the simulation logical real time channels are added one by one and checked whether the channels are accepted or not. This can be done by the admission control. To check whether the channel is accepted or not, we have to check the utilization constraint and delay bound constraint. If the utilization constraint and delay bound constraint are met, the new logical real time channel can be accepted. If the channels are accepted then keep track of total number of accepted channels. If the channel is accepted and the period starts, then generate the packets in the source nodes and the generated traffic should be kept in the FCFS sorted queue of the source nodes. In our simulation we used FCFS priority queuing in both the source nodes and switch. When the packet is generated, then keep track of the time when they were generated and store the packets in the queue according to the position. If the queue is full don t s any more packets. After this, move at most one packet, which is in the first position of the source node queue to the switch. After this, move the packet from the switch to its corresponding destination node. Then calculate the delay for each transmitted packet. After the transmission of all packets for a given simulation time, calculate the average delay. Average delay is the sum of the delay of all packets divide by total number of transmitted packets. Delay for each packet is given by finish time minus start time. Finish time is the time at which the packet reaches its destination and start time is the generated time of the packet. We have done this up to large simulation time to observe the average delay. 25

Page 1 of 5 Print this Page Close this Window TECHNICAL ARTICLE: STANDARDS-BASED REAL TIME ETHERNET NOW OFF-THE-SHELF Almost every major user organisation is currently propagating its own Ethernet-based

More information

Interface The exit interface a packet will take when destined for a specific network.

Interface The exit interface a packet will take when destined for a specific network. The Network Layer The Network layer (also called layer 3) manages device addressing, tracks the location of devices on the network, and determines the best way to move data, which means that the Network

More information

2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS

2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS 2. REAL-TIME CONTROL SYSTEM AND REAL-TIME NETWORKS 2.1 Real-Time and Control Computer based digital controllers typically have the ability to monitor a number of discrete and analog inputs, perform complex

More information

Chapter 15 Local Area Network Overview

Chapter 15 Local Area Network Overview Chapter 15 Local Area Network Overview LAN Topologies Bus and Tree Bus: stations attach through tap to bus full duplex allows transmission and reception transmission propagates throughout medium heard

More information

Chapter 3: Industrial Ethernet

Chapter 3: Industrial Ethernet 3.1 Introduction Previous versions of this handbook have dealt extensively with Ethernet so it is not our intention to revisit all the basics. However, because Smart Grid protocols are increasingly reliant

More information

CH : 15 LOCAL AREA NETWORK OVERVIEW

CH : 15 LOCAL AREA NETWORK OVERVIEW CH : 15 LOCAL AREA NETWORK OVERVIEW P. 447 LAN (Local Area Network) A LAN consists of a shared transmission medium and a set of hardware and software for interfacing devices to the medium and regulating

More information

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet

Objectives. Hexadecimal Numbering and Addressing. Ethernet / IEEE LAN Technology. Ethernet 2007 Cisco Systems, Inc. All rights reserved. Cisco Public Objectives Ethernet Network Fundamentals Chapter 9 ITE PC v4.0 Chapter 1 1 Introduce Hexadecimal number system Describe the features of various

More information

CCNA Exploration1 Chapter 7: OSI Data Link Layer

CCNA Exploration1 Chapter 7: OSI Data Link Layer CCNA Exploration1 Chapter 7: OSI Data Link Layer LOCAL CISCO ACADEMY ELSYS TU INSTRUCTOR: STELA STEFANOVA 1 Explain the role of Data Link layer protocols in data transmission; Objectives Describe how the

More information

SWITCHED REAL-TIME ETHERNET WITH EARLIEST DEADLINE FIRST SCHEDULING - PROTOCOLS, TRAFFIC HANDLING AND SIMULATION ANALYSIS

SWITCHED REAL-TIME ETHERNET WITH EARLIEST DEADLINE FIRST SCHEDULING - PROTOCOLS, TRAFFIC HANDLING AND SIMULATION ANALYSIS SWITCHED REAL-TIME ETHERNET WITH EARLIEST DEADLINE FIRST SCHEDULING - PROTOCOLS, TRAFFIC HANDLING AND SIMULATION ANALYSIS HOAI HOANG, MAGNUS JONSSON, ULRIK HAGSTROM, AND ANDERS KALLERDAHL Abstract. There

More information

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Seven. Local Area Networks: Part 1. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Seven Local Area Networks: Part 1 Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: State the definition of

More information

Layer 2 functionality bridging and switching

Layer 2 functionality bridging and switching Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How

More information

The MAC Address Format

The MAC Address Format Directing data is what addressing is all about. At the Data Link layer, this is done by pointing PDUs to the destination MAC address for delivery of a frame within a LAN. The MAC address is the number

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Multiple Access Protocols

Multiple Access Protocols Multiple Access Protocols Computer Networks Lecture 2 http://goo.gl/pze5o8 Multiple Access to a Shared Channel The medium (or its sub-channel) may be shared by multiple stations (dynamic allocation) just

More information

Internetworking Part 1

Internetworking Part 1 CMPE 344 Computer Networks Spring 2012 Internetworking Part 1 Reading: Peterson and Davie, 3.1 22/03/2012 1 Not all networks are directly connected Limit to how many hosts can be attached Point-to-point:

More information

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ

Networking for Data Acquisition Systems. Fabrice Le Goff - 14/02/ ISOTDAQ Networking for Data Acquisition Systems Fabrice Le Goff - 14/02/2018 - ISOTDAQ Outline Generalities The OSI Model Ethernet and Local Area Networks IP and Routing TCP, UDP and Transport Efficiency Networking

More information

ET4254 Communications and Networking 1

ET4254 Communications and Networking 1 Topic 10:- Local Area Network Overview Aims:- LAN topologies and media LAN protocol architecture bridges, hubs, layer 2 & 3 switches 1 LAN Applications (1) personal computer LANs low cost limited data

More information

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang

Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application. Ling Wang Networked Control Systems for Manufacturing: Parameterization, Differentiation, Evaluation, and Application Ling Wang ling.wang2@wayne.edu Outline Introduction Parameterization Differentiation Evaluation

More information

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan

Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol. Master s thesis defense by Vijay Chandramohan Design and Performance Evaluation of a New Spatial Reuse FireWire Protocol Master s thesis defense by Vijay Chandramohan Committee Members: Dr. Christensen (Major Professor) Dr. Labrador Dr. Ranganathan

More information

Real-Time, Determinism and Ethernet

Real-Time, Determinism and Ethernet Real-Time, Determinism and Ethernet Paul Taylor Slide 1 Agenda Definitions Real-Time Determinism Control Network Ethernet Evolution Bandwidth Switches Fast Ethernet Full Duplex Prioritisation Redundancy

More information

Media Access Control (MAC) Sub-layer and Ethernet

Media Access Control (MAC) Sub-layer and Ethernet Media Access Control (MAC) Sub-layer and Ethernet Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF MAC Sub-layer The MAC sub-layer is a sub-layer

More information

Chapter 4 NETWORK HARDWARE

Chapter 4 NETWORK HARDWARE Chapter 4 NETWORK HARDWARE 1 Network Devices As Organizations grow, so do their networks Growth in number of users Geographical Growth Network Devices : Are products used to expand or connect networks.

More information

LAN Systems. Bus topology LANs

LAN Systems. Bus topology LANs Bus topology LANs LAN Systems Design problems: not only MAC algorithm, not only collision domain management, but at the Physical level the signal balancing problem (signal adjustment): Signal must be strong

More information

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren

Lecture 9: Bridging. CSE 123: Computer Networks Alex C. Snoeren Lecture 9: Bridging CSE 123: Computer Networks Alex C. Snoeren Lecture 9 Overview Finishing up media access Ethernet Contention-free methods (rings) Moving beyond one wire Link technologies have limits

More information

Ethernet And Implementation In Automation

Ethernet And Implementation In Automation And Implementation In Automation Robert Rawlyk Beckhoff Automation, LLC North American Headquarters Burnsville, Minnesota USA ABSTRACT There has been a significant movement in recent years to bring to

More information

Direct Link Communication II: Wired Media. Multi-Access Communication

Direct Link Communication II: Wired Media. Multi-Access Communication Direct Link Communication II: Wired Media Multi-Access Communication Two classes: contention-based e.g., CSMA/CD, CSMA/CA used in Ethernet, WLAN contention-free e.g., TDM, FDM, TDMA, CDMA, token ring one

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Summary of MAC protocols

Summary of MAC protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division, Code Division, Frequency Division Random partitioning (dynamic) ALOHA, S-ALOHA,

More information

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection:

Topics. Link Layer Services (more) Link Layer Services LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS. flow control: error detection: 1 Topics 2 LECTURE 5 MULTIPLE ACCESS AND LOCAL AREA NETWORKS Multiple access: CSMA/CD, CSMA/CA, token passing, channelization LAN: characteristics, i basic principles i Protocol architecture Topologies

More information

Using Time Division Multiplexing to support Real-time Networking on Ethernet

Using Time Division Multiplexing to support Real-time Networking on Ethernet Using Time Division Multiplexing to support Real-time Networking on Ethernet Hariprasad Sampathkumar 25 th January 2005 Master s Thesis Defense Committee Dr. Douglas Niehaus, Chair Dr. Jeremiah James,

More information

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 6 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 6 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

Local Area Network Overview

Local Area Network Overview Local Area Network Overview Chapter 15 CS420/520 Axel Krings Page 1 LAN Applications (1) Personal computer LANs Low cost Limited data rate Back end networks Interconnecting large systems (mainframes and

More information

Sections Describing Standard Software Features

Sections Describing Standard Software Features 30 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to

More information

Performance of a Switched Ethernet: A Case Study

Performance of a Switched Ethernet: A Case Study Performance of a Switched Ethernet: A Case Study M. Aboelaze A Elnaggar Dept. of Computer Science Dept of Electrical Engineering York University Sultan Qaboos University Toronto Ontario Alkhod 123 Canada

More information

Introduction to the Catalyst 3920

Introduction to the Catalyst 3920 CHAPTER 1 Introduction to the Catalyst 3920 This chapter contains the following information about the Catalyst 3920: Product Overview Physical Characteristics of the Catalyst 3920 System Architecture Product

More information

IEEE 802 LANs SECTION C

IEEE 802 LANs SECTION C IEEE 802 LANs SECTION C Outline of the Lecture Basic characteristics of LAN Topology Transmission Media MAC IEEE 802 LANs 802.3 - CSMA/CD based (Ethernet) 802.4 Token bus-based 802.5 Token ring-based Comparison

More information

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub

Ethernet Hub. Campus Network Design. Hubs. Sending and receiving Ethernet frames via a hub Campus Network Design Thana Hongsuwan Ethernet Hub 2003, Cisco Systems, Inc. All rights reserved. 1-1 2003, Cisco Systems, Inc. All rights reserved. BCMSN v2.0 1-2 Sending and receiving Ethernet frames

More information

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols

High Level View. EE 122: Ethernet and Random Access protocols. Medium Access Protocols High Level View EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 Goal: share a communication medium among multiple hosts connected to it Problem: arbitrate between connected hosts Solution goals:

More information

Part3. Local Area Networks (LAN)

Part3. Local Area Networks (LAN) Part3 Local Area Networks (LAN) LAN Characteristics Small geographical area Relatively high data rate Single management Topologies Bus, star, ring Specifications at physical and data link layer mostly

More information

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과.

Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과. Link Layer and LANs 안상현서울시립대학교컴퓨터 통계학과 ahn@venus.uos.ac.kr Data Link Layer Goals: understand principles behind data link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions

Goals. Fundamentals of Network Media. More topics. Topics. Multiple access communication. Multiple access solutions Fundamentals of Network Media Local Area Networks Ursula Holmström Goals Learn the basic concepts related to LAN technologies, for example use of shared media medium access control topologies Know the

More information

The Link Layer and LANs. Chapter 6: Link layer and LANs

The Link Layer and LANs. Chapter 6: Link layer and LANs The Link Layer and LANs EECS3214 2018-03-14 4-1 Chapter 6: Link layer and LANs our goals: understand principles behind link layer services: error detection, correction sharing a broadcast channel: multiple

More information

Lecture 3. The Network Layer (cont d) Network Layer 1-1

Lecture 3. The Network Layer (cont d) Network Layer 1-1 Lecture 3 The Network Layer (cont d) Network Layer 1-1 Agenda The Network Layer (cont d) What is inside a router? Internet Protocol (IP) IPv4 fragmentation and addressing IP Address Classes and Subnets

More information

Medium Access Protocols

Medium Access Protocols Medium Access Protocols Summary of MAC protocols What do you do with a shared media? Channel Partitioning, by time, frequency or code Time Division,Code Division, Frequency Division Random partitioning

More information

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on

Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on CBCN4103 Internetworking is connecting two or more computer networks with some sort of routing device to exchange traffic back and forth, and guide traffic on the correct path across the complete network

More information

Introduction to LAN Protocols

Introduction to LAN Protocols CHAPTER 2 Chapter Goals Learn about different LAN protocols. Understand the different methods used to deal with media contention. Learn about different LAN topologies. This chapter introduces the various

More information

Chapter 2. Switch Concepts and Configuration. Part I

Chapter 2. Switch Concepts and Configuration. Part I Chapter 2 Switch Concepts and Configuration Part I CCNA3-1 Chapter 2-1 Note for Instructors These presentations are the result of a collaboration among the instructors at St. Clair College in Windsor,

More information

Additional Switched Ethernet Protocol for Industrial Hard Real-Time Traffic

Additional Switched Ethernet Protocol for Industrial Hard Real-Time Traffic Additional Switched Ethernet Protocol for Industrial Hard Real-Time Traffic ALIMUJIANG YIMING and TOSHIO EISAKA Dept of Computer Sciences Kitami Institute of Technology 165, Koen-cho, Kitami, Hokkaido

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Jannotti Administrivia Homework I out later today, due next Thursday Today: Link Layer (cont.)

More information

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca

CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca CSCI-1680 Link Layer Wrap-Up Rodrigo Fonseca Based partly on lecture notes by David Mazières, Phil Levis, John Janno< Administrivia Homework I out later today, due next Thursday, Sep 25th Today: Link Layer

More information

Sections Describing Standard Software Features

Sections Describing Standard Software Features 27 CHAPTER This chapter describes how to configure quality of service (QoS) by using automatic-qos (auto-qos) commands or by using standard QoS commands. With QoS, you can give preferential treatment to

More information

Your Global Automation Partner. Elevating Ethernet Intelligence: Implementing Ethernet Technology in Industrial Applications. White Paper - W1004

Your Global Automation Partner. Elevating Ethernet Intelligence: Implementing Ethernet Technology in Industrial Applications. White Paper - W1004 Your Global Automation Partner Elevating Ethernet Intelligence: Implementing Ethernet Technology in Industrial Applications White Paper - W1004 Manufacturers are faced with the constant demand to increase

More information

EE 122: Ethernet and

EE 122: Ethernet and EE 122: Ethernet and 802.11 Ion Stoica September 18, 2002 (* this talk is based in part on the on-line slides of J. Kurose & K. Rose) High Level View Goal: share a communication medium among multiple hosts

More information

Overview of Networks

Overview of Networks CMPT765/408 08-1 Overview of Networks Qianping Gu 1 Overview of Networks This note is mainly based on Chapters 1-2 of High Performance of Communication Networks by J. Walrand and P. Pravin, 2nd ed, and

More information

Industrial Ethernet Comparison for Motion Control Applications

Industrial Ethernet Comparison for Motion Control Applications Industrial Ethernet Comparison for Motion Control Applications Sari Germanos sari.germanos@ethernet-powerlink.org Technology Marketing Ethernet POWERLINK Standardization Group Topology comparison - Conventional

More information

SINAMICS S120. Communication. Communication 2/7. Overview

SINAMICS S120. Communication. Communication 2/7. Overview Overview Most production machines use digital bus systems. These handle the between the control level, the machine control and the executing components, i.e. the sensors and actuators. There are two types

More information

Workshop : Ethernet as a fieldbus Genève Friday 28th September How Ethernet becomes industrial

Workshop : Ethernet as a fieldbus Genève Friday 28th September How Ethernet becomes industrial Workshop : Ethernet as a fieldbus Genève September 2001 How Ethernet becomes industrial Prof. Bernard Jouga - Supélec, Rennes France Bernard.Jouga@supelec.fr You said Ethernet Ethernet offers A level 1

More information

Chapter 6: Network Communications and Protocols

Chapter 6: Network Communications and Protocols Learning Objectives Chapter 6: Network Communications and Protocols Understand the function and structure of packets in a network, and analyze and understand those packets Understand the function of protocols

More information

CS 455/555 Intro to Networks and Communications. Link Layer

CS 455/555 Intro to Networks and Communications. Link Layer CS 455/555 Intro to Networks and Communications Link Layer Dr. Michele Weigle Department of Computer Science Old Dominion University mweigle@cs.odu.edu http://www.cs.odu.edu/~mweigle/cs455-s13 1 Link Layer

More information

MONITORING AND ANALYZING COMMUNICATION LATENCY IN DISTRIBUTED REAL-TIME SYSTEMS

MONITORING AND ANALYZING COMMUNICATION LATENCY IN DISTRIBUTED REAL-TIME SYSTEMS MONITORING AND ANALYZING COMMUNICATION LATENCY IN DISTRIBUTED REAL-TIME SYSTEMS A thesis presented to the faculty of the Fritz J. and Dolores H. Russ College of Engineering and Technology of Ohio University

More information

EtherCAT Introduction

EtherCAT Introduction Industrial EtherCAT Introduction EtherCAT: Control Automation Technology 1 EtherCAT for Control and Automation Technology EtherCAT is ultra Fast: 1000 dig. I/O: 30 µs, 100 servo s: 100 µs EtherCAT is :

More information

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame

Links Reading: Chapter 2. Goals of Todayʼs Lecture. Message, Segment, Packet, and Frame Links Reading: Chapter 2 CS 375: Computer Networks Thomas Bressoud 1 Goals of Todayʼs Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared

More information

Question 7: What are Asynchronous links?

Question 7: What are Asynchronous links? Question 1:.What is three types of LAN traffic? Unicasts - intended for one host. Broadcasts - intended for everyone. Multicasts - intended for an only a subset or group within an entire network. Question2:

More information

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21!

CSE 123: Computer Networks Alex C. Snoeren. HW 2 due Thursday 10/21! CSE 123: Computer Networks Alex C. Snoeren HW 2 due Thursday 10/21! Finishing up media access Contention-free methods (rings) Moving beyond one wire Link technologies have limits on physical distance Also

More information

H3C S9500 QoS Technology White Paper

H3C S9500 QoS Technology White Paper H3C Key words: QoS, quality of service Abstract: The Ethernet technology is widely applied currently. At present, Ethernet is the leading technology in various independent local area networks (LANs), and

More information

Cisco Cisco Certified Network Associate (CCNA)

Cisco Cisco Certified Network Associate (CCNA) Cisco 200-125 Cisco Certified Network Associate (CCNA) http://killexams.com/pass4sure/exam-detail/200-125 Question: 769 Refer to exhibit: Which destination addresses will be used by Host A to send data

More information

Generic term for using the Ethernet standard in automation / industrial applications

Generic term for using the Ethernet standard in automation / industrial applications Seite 24 Industrial Ethernet Generic term for using the Ethernet standard in automation / industrial applications Specific Quality of Service requirements Real-time Cycle time (e.g. < 1 ms for motion control

More information

GUARANTEED END-TO-END LATENCY THROUGH ETHERNET

GUARANTEED END-TO-END LATENCY THROUGH ETHERNET GUARANTEED END-TO-END LATENCY THROUGH ETHERNET Øyvind Holmeide, OnTime Networks AS, Oslo, Norway oeyvind@ontimenet.com Markus Schmitz, OnTime Networks LLC, Texas, USA markus@ontimenet.com Abstract: Latency

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition

ELEC / COMP 177 Fall Some slides from Kurose and Ross, Computer Networking, 5 th Edition ELEC / COMP 177 Fall 2011 Some slides from Kurose and Ross, Computer Networking, 5 th Edition Project #2 Due Thursday, Nov 10 th By midnight Homework #5 Due Thursday, Nov 17 th Later this semester: Homework

More information

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair

Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Test Bank for A Guide to Designing and Implementing Local And Wide Area Networks 2nd Edition by Palmer and Sinclair Link download full: https://testbankservice.com/download/test-bank-for-aguide-to-designing-and-implementing-local-and-wide-area-networks-2ndedition-by-palmer-and-sinclair/

More information

Implementing Industrial Ethernet Field Device Functionality by Using FPGAs

Implementing Industrial Ethernet Field Device Functionality by Using FPGAs Implementing Industrial Ethernet Field Device Functionality by Using FPGAs Executive Summary Industrial Ethernet protocols like PROFINET or EtherCAT are currently taking over the communication role in

More information

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it

Lecture 5 The Data Link Layer. Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Lecture 5 The Data Link Layer Antonio Cianfrani DIET Department Networking Group netlab.uniroma1.it Link Layer: setting the context two physically connected devices: host-router, router-router, host-host,

More information

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017

CS 43: Computer Networks Switches and LANs. Kevin Webb Swarthmore College December 5, 2017 CS 43: Computer Networks Switches and LANs Kevin Webb Swarthmore College December 5, 2017 Ethernet Metcalfe s Ethernet sketch Dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology

More information

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem.

Chapter 4. The Medium Access Control Sublayer. Points and Questions to Consider. Multiple Access Protocols. The Channel Allocation Problem. Dynamic Channel Allocation in LANs and MANs Chapter 4 The Medium Access Control Sublayer 1. Station Model. 2. Single Channel Assumption. 3. Collision Assumption. 4. (a) Continuous Time. (b) Slotted Time.

More information

Switching and Forwarding Reading: Chapter 3 1/30/14 1

Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Reading: Chapter 3 1/30/14 1 Switching and Forwarding Next Problem: Enable communication between hosts that are not directly connected Fundamental Problem of the Internet or any

More information

Hard Real Time guarantees using Switched Ethernet and distributed scheduling (EDF)

Hard Real Time guarantees using Switched Ethernet and distributed scheduling (EDF) Technical report, IDE0616, January 2006 Hard Real Time guarantees using Switched Ethernet and distributed scheduling (EDF) Masters thesis in computer systems engineering Kam KinShe & Kondreddi Bhavani

More information

2. LAN Topologies Gilbert Ndjatou Page 1

2. LAN Topologies Gilbert Ndjatou Page 1 2. LAN Topologies Two basic categories of network topologies exist, physical topologies and logical topologies. The physical topology of a network is the cabling layout used to link devices. This refers

More information

Lecture (05) Network interface Layer media & switching II

Lecture (05) Network interface Layer media & switching II Lecture (05) Network interface Layer media & switching II By: ElShafee ١ Agenda Circuit switching technology (cont,..) Packet switching technique Telephone network ٢ Circuit switching technology (cont,..)

More information

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY

RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY RAJIV GANDHI COLLEGE OF ENGINEERING AND TECHNOLOGY DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING QUESTION BANK SUBJECT NAME: COMPUTER NETWORKS SUBJECT CODE: CST52 UNIT-I 2 MARKS 1. What is Network? 2.

More information

Chapter 5 Link Layer and LANs

Chapter 5 Link Layer and LANs Chapter 5 Link Layer and LANs Computer Networking: A Top Down Approach 4 th edition. Jim Kurose, Keith Ross Addison-Wesley, July 2007. All material copyright 1996-2007 J.F Kurose and K.W. Ross, All Rights

More information

Network Superhighway CSCD 330. Network Programming Winter Lecture 13 Network Layer. Reading: Chapter 4

Network Superhighway CSCD 330. Network Programming Winter Lecture 13 Network Layer. Reading: Chapter 4 CSCD 330 Network Superhighway Network Programming Winter 2015 Lecture 13 Network Layer Reading: Chapter 4 Some slides provided courtesy of J.F Kurose and K.W. Ross, All Rights Reserved, copyright 1996-2007

More information

IT4405 Computer Networks (Compulsory)

IT4405 Computer Networks (Compulsory) IT4405 Computer Networks (Compulsory) INTRODUCTION This course provides a comprehensive insight into the fundamental concepts in data communications, computer network systems and protocols both fixed and

More information

CSE 461: Multiple Access Networks. This Lecture

CSE 461: Multiple Access Networks. This Lecture CSE 461: Multiple Access Networks This Lecture Key Focus: How do multiple parties share a wire? This is the Medium Access Control (MAC) portion of the Link Layer Randomized access protocols: 1. Aloha 2.

More information

Link Layer and Ethernet

Link Layer and Ethernet Link Layer and Ethernet 14-740: Fundamentals of Computer Networks Bill Nace Material from Computer Networking: A Top Down Approach, 6 th edition. J.F. Kurose and K.W. Ross traceroute Data Link Layer Multiple

More information

PROFINET The industrial Ethernet standard. This is my way

PROFINET The industrial Ethernet standard. This is my way PROFINET The industrial Ethernet standard This is my way PROFINET This is my way PROFINET Users Benefits PROFIBUS x PROFINET News Just imagine: a communication system for all automation tasks with wireless

More information

CS343: Data Communication LAN Overview

CS343: Data Communication LAN Overview CS343: Data Communication LAN Overview by Dr. Manas Khatua Assistant Professor Dept. of CSE IIT Guwahati E-mail: manaskhatua@iitg.ac.in Communication Network Topology Topology refers to the way in which

More information

M242 COMPUTER NETWORS AND SECURITY

M242 COMPUTER NETWORS AND SECURITY M242 COMPUTER NETWORS AND SECURITY 2.1. Network Models: UNIT - II OSI MODEL AND LAN PROTOCOLS 1. Explain Network model A network is a combination of hardware and software that sends data from one location

More information

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15

Introduction to Real-Time Communications. Real-Time and Embedded Systems (M) Lecture 15 Introduction to Real-Time Communications Real-Time and Embedded Systems (M) Lecture 15 Lecture Outline Modelling real-time communications Traffic and network models Properties of networks Throughput, delay

More information

Networks Fall This exam consists of 10 problems on the following 13 pages.

Networks Fall This exam consists of 10 problems on the following 13 pages. CSCI 466 Final Networks Fall 2011 Name: This exam consists of 10 problems on the following 13 pages. You may use your two- sided hand- written 8 ½ x 11 note sheet during the exam and a calculator. No other

More information

Module 1. Introduction. Version 2, CSE IIT, Kharagpur

Module 1. Introduction. Version 2, CSE IIT, Kharagpur Module 1 Introduction Version 2, CSE IIT, Kharagpur Introduction In this module we shall highlight some of the basic aspects of computer networks in two lessons. In lesson 1.1 we shall start with the historical

More information

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet

CCNA Exploration Network Fundamentals. Chapter 09 Ethernet CCNA Exploration Network Fundamentals Chapter 09 Ethernet Updated: 07/07/2008 1 9.0.1 Introduction 2 9.0.1 Introduction Internet Engineering Task Force (IETF) maintains the functional protocols and services

More information

Principles behind data link layer services

Principles behind data link layer services Data link layer Goals: Principles behind data link layer services Error detection, correction Sharing a broadcast channel: Multiple access Link layer addressing Reliable data transfer, flow control: Done!

More information

Links. CS125 - mylinks 1 1/22/14

Links. CS125 - mylinks 1 1/22/14 Links 1 Goals of Today s Lecture Link-layer services Encoding, framing, and error detection Error correction and flow control Sharing a shared media Channel partitioning Taking turns Random access Shared

More information

Mittuniversitetet PROFIBUS PA

Mittuniversitetet PROFIBUS PA PROFIBUS PA Profibus PA is the same protocol as Profibus DP. The physical medium is different with reduced voltage and current levels to meet the requirements of intrinsically safe areas. Profibus PA is

More information

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies

Data Link Layer. Our goals: understand principles behind data link layer services: instantiation and implementation of various link layer technologies Data Link Layer Our goals: understand principles behind data link layer services: link layer addressing instantiation and implementation of various link layer technologies 1 Outline Introduction and services

More information

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115

CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications. Dr Shahedur Rahman. Room: T115 CCM 4300 Lecture 5 Computer Networks, Wireless and Mobile Communications Dr Shahedur Rahman s.rahman@mdx.ac.uk Room: T115 1 Recap of Last Session Described the physical layer Analogue and Digital signal

More information

Hardware Robot Operating System. D-module STUDY CASE

Hardware Robot Operating System. D-module STUDY CASE Hardware Robot Operating System D-module STUDY CASE Han s Robot D-module Han s Robot Han s Robot is a global supplier in direct drive technology, ranging from linear motors, torque motors, servo drives,

More information

ELEVATING ETHERNET INTELLIGENCE:

ELEVATING ETHERNET INTELLIGENCE: ELEVATING ETHERNET INTELLIGENCE: IMPLEMENTING ETHERNET TECHNOLOGY IN INDUSTRIAL APPLICATIONS A WHITE PAPER Published 11/28/2012 M anufacturers are faced with the constant features, benefits and performance

More information

Data Link Layer Technologies

Data Link Layer Technologies Chapter 2.2 La 2 Data Link La Technologies 1 Content Introduction La 2: Frames Error Handling 2 Media Access Control General approaches and terms Aloha Principles CSMA, CSMA/CD, CSMA / CA Master-Slave

More information