Ring Local Area Network. Ring LANs

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Ring Local Area Network. Ring LANs"

Transcription

1 Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving data is copied into a 1-bit buffer and then copied out again (1-bit delay) Data in the buffer can be modified before transmission Ring interface can be in one of three states: Listen State Transmit State Bypass State 1

2 States of the Ring Interface Listen State: Incoming bits are copied to output with 1- bit delay To station From station Transmit State: Write data to the ring To station From station States of the Ring Interface Bypass State: Idle station does not incur bit-delay 2

3 Ring LANs If a frame has traveled once around the ring it is removed by the sender Ring LANs have a simple acknowledgment scheme: Each frame has one bit for acknowledgment. If the destination receives the frame it sets the bit to 1. Since the sender will see the returning frame, it can tell if the frame was received correctly. What is the Length of a Ring? The length of a ring LAN, measured in bits, gives the total number of bits which are can be in transmission on the ring at a time Note: Frame size is not limited to the length of the ring since entire frame may not appear on the ring at one time. Why? Bit length = propagation speed length of ring data rate + + No. of stations bit delay at repeater 3

4 Example : Calculate the length of the following ring LAN: 3 km ring 1 Mbps data rate 5 µs/km propagation speed 20 1 bit delay Bit length = Ring LAN Advantages: Can achieve 100 % utilization No collisions Can achieve deterministic delay bounds Can be made efficient at high speeds Disadvantages: Long delays due to bit-delays Solution: Bypass state eliminates bit-delay at idle station Reliability Problems Solution 1: Use a wire center Solution 2: Use a second ring (opposite flow) 4

5 Ring LANS: Wire Center (802.5) Bypass Relay Station Connector Station Station Wire Center Cable Station Ring LANS: Use a second ring failure This is known as a dual-redundant counter-rotating ring 5

6 Token Ring LANS A Token B C Token is a small packet that rotates around the ring When all stations are idle, the token is free and circulates around the ring D Possible Problem: All stations are idle and in the Bypass state. What is the problem? 802.5(Token Ring) MAC Protocol In order to transmit a station must catch a free token The station changes the token from free to busy The station transmits its frame immediately following the busy token IF station has completed transmission of the frame AND the busy token has returned to the station THEN station inserts a new free token into the ring 6

7 Token Ring LANs Note: If the bit length of the ring is less than the packet length, then the completion of a packet transmission implies return of busy token Only one station can transmit at a time. If a station releases a free token, the next station downstream can capture the token Transmission in a Token Ring Free token B Sender looks for free token A C D 7

8 Transmission in a Token Ring B Sender changes free token to busy token and appends data to the token A C Data Busy token D Transmission in a Token Ring A B Busy token C Receiver recognizes that it is the destination of the frame Receiver copies frame to station Note: Frame also returns to sender D Data 8

9 Transmission in a Token Ring A B C Receiver recognizes that it is the destination of the frame Receiver copies frame to station Note: Frame also returns to sender D Data Transmission in a Token Ring A Data B C Sender generates free token when it is done transmitting (Note: The busy token has returned) Free token D 9

10 Properties of the Token Ring No collisions of frames Full utilization of bandwidth is feasible Transmission can be regulated by controlling access to token Recovery protocols is needed if token is not handled properly, e.g., token is corrupted, station does not change to free, etc Token Format / Data Frame Format: Bytes SD AC ED or 6 2 or 6 No Limit 4 Bytes SD AC FC Destination address Source address Data Checksum ED FS Frame control Start delimiter Preamble End delimiter Frame status 10

11 IEEE Frame Format One 3-byte token circulates if all stations are idle. AC = PPPTMRRR where PPP Priority fields RRR Reservation fields T Indicates Token or Data frame SD, ED: FC: FS: Start/End delimiter of a frame Identifies type of a control frame Contains address recognized bit (A bit) and frame copied bit (C bit) Receiver sets A=1 when frame arrives Receiver sets C=1 when frame has been copied Priority of Transmission in Eight levels of priorities Priorities handled by 3-bit priority field and 3-bit reservation field Define: P m = priority of the message to be transmitted P r = token priority of received token R r = reservation priority of received token 11

12 IEEE ( Token Ring) 1. A station wishing to transmit a frame with priority P m must wait for a free token with P r P m 2. The station can reserve a future priority-p m token as follows: If busy token comes by, then set R r P m (if R r < P m ) If free token comes by, then set R r P m (if R r < P m and P m < P r ) IEEE ( Token Ring) 3. If a station gets a free token, it sets the reservation field to 0, and leaves the priority field unchanged and transmits 4. After transmission send a free token with Priority = max (P r, R r, P m ) Reservation = max (R r, P m ) 5. Station which upgraded the priority level of a token must also downgrade the priority (if no one used the token) 12

13 Ring Maintenance Token ring selects one station as the monitor station Duties of the monitor: Check that there is a token Recover ring if it is broken Detect garbled frames Make sure the token (24-bit) is shorter than the ring length Terms in IEEE IEEE requires to maintain a large number of counters THT: Token Holding Timer (one per station) Limits the time that a station can transmit (Default 10 ms) TRR: Time-to-Repeat Timer (one per station) Limits the time that a station waits for return of own message (Default 2.5 ms) TVX: Valid Transmission Timer (in monitor station) Verifies that station which accessed the token actually used it (Default: THT + TRR = 12.5 ms) TNT: No-Token Timer (one per station) If expire, a new token is generated (Default: N * (THT + TRR)) 13

14 Performance of Token Rings Parameters and Assumption: End-to-end propagation delay a Packet transmission time 1 Number of stations N Assume that each station always has a packet waiting for transmission Note: The ring is used either for data transmission or for passing the token Performance of Token Rings Define: T 1 = Average time to transmit a frame. Per assumption, T 1 =1 T 2 = Average time to pass the token Maximum Throughput = Frame Time = Frame Time + Overhead T1 = T + T

15 Effect of propagation delay Effect of propagation delay on throughput: Case 1: a < 1 (Packet longer than ring) T 2 = time to pass token to the next station = a/n Case 2: a > 1 (Packet shorter than ring) Note: Sender finishes transmission after T 1 = 1, but cannot release the token until the token returns T 1 + T 2 = min (1, a) + a/n S = a N S = a + 1 a N Performance of Token Rings Illustration of Analysis ( a>1 ) t 0 t 0 +1 Workstation Workstation t 0 +a t 0 +a+1 Workstation Workstation 15

16 Performance of Token Rings Illustration of Analysis ( a<1 ) t 0 t 0 +a Workstation Workstation t 0 +1 t 0 +a+1 Workstation Workstation Ethernet vs. Token Ring Maximum throughput as a function of a 16

17 Ethernet vs. Token Ring Maximum throughput as a function of N FDDI Some Facts: FDDI = Fiber Distributed Data Interface FDDI is a high-speed token ring Fiber-optic (dual redundant counter rotating) ring LAN Multimode fiber Standardized by ANSI and ISO X3T9.5 committee 100 Mbps data rate Maximum frame size is 4500 bytes Allows up to 1000 connected stations Maximum ring circumference 200 km 17

18 FDDI FDDI distinguishes 4 Service Classes: Asynchronous Synchronous Immediate (for monitor and control) Isochronous (only in FDDI-II) FDDI - Protocol Architecture LLC (IEEE 802.2) Logical Link Control SMT initialization performance monitoring maintenance allocation of bandwidth configuration MAC ring access data transfer PHY coding / decoding transmit / receive data stream PMD Conversion to optical signal SMT: Station Management MAC: Medium Access Control PHY: PMD: Physical Layer Protocol Physical Layer Medium Dependent 18

19 Dual Redundant Counter Rotating Ring Second ring adds a certain level of fault tolerance Station Types - Class A Station Two PHY (and one or two MAC) entities Connects to another Class A station or to a concentrator LLC LLC MAC PHY MAC PHY SMT BYPASS From Last Station To Next Station 19

20 Station Types - Class B Station Class B station has one PHY (and one MAC) entity Connects to a concentrator LLC MAC PHY SMT To Concentrator Station Types - Concentrator Connects Class A and Class B stations into one of the counter rotating rings. Concentrator can bypass failing stations. To Class B Stations PHY PHY PHY LLC MAC PHY PHY SMT BYPASS From Last Station To Next Station 20

21 Topology Example Node 6 M Node 5 M Node 4 M M P P P P P=PHY M=MAC P P P Node 3 P P P P P P M M P FDDI Media Access Control FDDI uses a Token Ring Protocol, similar to Differences of FDDI and 802.5: To release a token, a station does not need to wait until the token comes back after a transmission. The token is released right after the end of transmission In FDDI, multiple frames can be attached to the token FDDI has a different priority scheme 21

22 FDDI Token Ring Protocol A 1. A awaits token T B A F1 2. A seizes token, begins transmitting frame F1 addressed to C B FDDI Token Ring Protocol A D 3. A appends token to end of transmission T B F1 C A D 4. C copies frames F1 as it goes by T B F1 C 22

23 FDDI Token Ring Protocol A F1 D 5. C continues to copy F1; B seizes token and transmits frame F2 addressed to D B A F2 C D 6. B emits token; D copies F2; A absorbs F1 F1 T F2 B C FDDI Token Ring Protocol A D 7. A lets F2 and token pass; B absorbs F2 T F2 B C A D 8. B lets token pass B T C 23

24 Frame and Token Format Bits or 48 >= Preamble SD FC DA SA Info FCS ED FS Bits General Frame Format Preamble SD FC Token Frame Format SD Starting Delimiter FC Frame Control (type of frame) DA Destination Address SA Source Address FCS Frame Check Sequence (CRC) ED End Delimiter FS Frame Status Total Frame length 4500bytes Timed Token Protocol FDDI has a timed token protocol which determines how long a station can transmit Each station has timers to measure the time elapsed since a token was last received TTRT Target Token Rotation Time Value of TTRT is negotiated during initialization (default is 8 ms) Set to the maximum desired rotation time 24

25 Parameters of Timed Token Protocol Station Parameters: TRT Token Rotation Time Time of the last rotation of the token. If TRT < TTRT, then token is early, asynchronous traffic can be transmitted If TRT > TTRT then token is late, asynchronous traffic cannot be transmitted. THT Token Holding Time Controls the time that a station may transmit asynchronous traffic. fi Percentage of the TTRT that is allocated for synchronous traffic at station i. Timed Token Protocol If a station receives the token it sets THT:= TRT TRT:= TTRT Enable TRT (i.e., start the timer) If the station has synchronous frames are waiting the transmit synchronous traffic for up to time TTRT fi (with Σi <1) If the station has asynchronous traffic enable THT while THT > 0 transmit asynchronous traffic. 25

26 Timed Token Protocol Note: Transmission is not interrupted if THT expires during a transmission. If a station does not utilize its maximum transmission time (i.e., THT), the next station can use it. Analysis of FDDI Annalysis of Synchronous traffic Asynchronous trafic Synchronous Traffic: Recall that each station can transmit synchronous traffic for up to time TTRT fi (with Σi fi 1) If Σ i f i = 1, the maximum throughput of synchronous traffic is 100%. One can show that the maximum delay until a frame is completely transmitted is: Maximum Access Delay 2 TTRT 26

27 Analysis of FDDI Station 1 Station 1 Station 3 Asynchronous Traffic Parameters: D T-D D n Ring latency Number of active sessions (all 3T-D T heavily loaded) Value of TTRT Assumption: No synchronous traffic Analysis of FDDI From the Example we see: Cycle in a system has a length of: nt + D Time in a cycle used for transmission: n(t - D) We obtain for the maximum throughput for asynchronous traffic is: n(t - D) Max.Throughput = nt + D... and the maximum access delay for asynchronous traffic: Max. Access Delay = T(n -1) + 2D 27

28 Analysis of FDDI Numerical Example Number of stations: 16 Length of fiber: 200 km Speed of Signal 5 ms/km Delay per station: 1 ms/station TTRT: 5 msec Ring Latency D = (20 km) (5 msec/km) + + (16 stations) 1 msec/station = 0.12 ms. Analysis of FDDI Synchronous Traffic Asynchronous Traffic Max.Throughput = = 100% Max.Access Delay = = 2 5ms = 10ms Max.Throughput = 16(5-0.12) = = 97.5% Max.Access Delay = = 5(16-1) + = 75.24ms

29 Numerical Results We show plots for 3 different FDDI networks. Typical FDDI: 20 stations (single MAC) 4 km ring Big FDDI: 100 stations (single MAC) 200 km ring Largest FDDI: 500 stations (dual MAC) 200 km ring Throughput vs. TTRT 29

30 Maximum Access Delay vs. TTRT Supplemental Material (Token Bus ) 30

31 IEEE (Token Bus) Problems with 802.3: Collisions of frames can lead to unpredictable delays In some real-time scenarios, collisions and unpredictable delays can be catastrophic Solution via Token Bus: A control packet (Token) regulates access to the bus A station must have the token in order to transmit A station can hold the token only for a limited time The token is passed among the stations in a cyclic order This structures the bus as a logical ring IEEE (Token Bus) Stations form a logical ring Each station knows its successor and predecessor in the ring Succ=D Pred=C Succ=A Pred=B A B Succ=C Pred=D C Token Bus D Succ=B Pred=A 31

32 Feature of Token Bus Bandwidth is 1, 5, or 10 Mbps The token bus MAC protocol is very complex Typically, token bus is free of collisions Defines priority transmissions and can offer bounded transmission delays IEEE (Token Bus) requires each station to implement the following management functions: Ring Initialization Addition to ring Deletion from ring Fault management 32

33 Adding a Station to the Token Bus Each node periodically sends a solicit successor packet which invites nodes with an address between itself and the next node to join the ring Sending node waits for response for one round trip One of the following three cases apply (1) No Response: Pass token (2) Response from one node: Reset successor node Pass token to new successor node (3) Response from more than one node: Collision has occurred Node tries to resolve contention Add a station to the Token Bus Assume: Response from more than one node has resulted in a collision. Station sends a resolve contention packet and waits for four windows (window = 1 round trip time) for a response: In window 1, stations with address prefix 00 can reply In window 2, stations with address prefix 01 can reply In window 3, stations with address prefix 10 can reply In window 4, stations with address prefix 11 can reply If there is a another collision, procedure is repeated for the second pair of bits. Only the nodes which replied earlier can join the next round First successful reply joins the ring 33

34 IEEE (Token Bus) Four priority levels: Levels 6, 4, 2, 0 Priority 6 is the highest level Token Holding Time (THT): Maximum time a node can hold a token Token Rotation Time for class i (TRTi): Maximum time of a full token circulation at which priority i transmissions are still permitted Token Bus Transmission Rules Each station can transmit class 6 data for a time THT For i= 4, 2, 0: Transmit class i traffic if all traffic from class i+2 or higher is transmitted and the time of the last token circulation (including the transmission time of higher priority packets during the current holding of the token) is less than TRT i. 34

35 Token Bus Priority Scheme Use Token Class 6 To Send? Y THT Timer expired? N Send Frame N Y Class 4 To Send? Y TRT 4 Timer expired? N Send Frame N Y Class 2 To Send? Y TRT 2 Timer expired? N Send Frame N Y Class 0 To Send? Y TRT 0 Timer expired? N Send Frame N Y More Data To Send? N Want To Stay in Ring? N Send Set- Successor Frame to Predecessor Y Y Use Token 35

Fiber Distributed Data Interface

Fiber Distributed Data Interface CHPTER 8 Chapter Goals Provide background information about FDDI technology. Explain how FDDI works. Describe the differences between FDDI and Copper Distributed Data Interface (CDDI). Describe how CDDI

More information

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1

Token Ring and. Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 Token Ring and Fiber Distributed Data Interface (FDDI) Networks: Token Ring and FDDI 1 IEEE 802.5 Token Ring Proposed in 1969 and initially referred to as a Newhall ring. Token ring :: a number of stations

More information

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software

Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set

More information

Controlled Random Access Methods

Controlled Random Access Methods Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation

More information

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1

Local Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1 Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber

More information

Token Bus. Message Exchange in Token Bus. Example. Problems with Token Bus. Two types of messages are used: Token messages T ID, nextid ID

Token Bus. Message Exchange in Token Bus. Example. Problems with Token Bus. Two types of messages are used: Token messages T ID, nextid ID Token us Token -procedure: Only someone who possesses a certain ken (= bit sequence), may send. One example for a ken network: IEEE 80. Token us All stations should be treated equally, i.e. they have pass

More information

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access

Network Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access Sicherungsebene Network Categories Local Area Networks (LAN): 0m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

More information

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009

Unit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical

More information

Real-Time (Paradigms) (51)

Real-Time (Paradigms) (51) Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL

TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL 1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint

More information

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was

More information

Data Link Protocols. TCP/IP Suite and OSI Reference Model

Data Link Protocols. TCP/IP Suite and OSI Reference Model Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite

More information

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols

EXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate

More information

High-Level Data Link Control

High-Level Data Link Control High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)

More information

Module 15: Network Structures

Module 15: Network Structures Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and

More information

Gigabit Ethernet: Architectural Design and Issues

Gigabit Ethernet: Architectural Design and Issues Gigabit Ethernet: Architectural Design and Issues Professor of Computer and Information Sciences Columbus, OH 43210 http://www.cis.ohio-state.edu/~jain/ 9-1 Overview Distance-Bandwidth Principle 10 Mbps

More information

Data Link Layer. Page 1. Ethernet

Data Link Layer. Page 1. Ethernet Sicherungsebene Network Categories Local Area Networks (LAN): 10m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few

More information

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師

Operating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師 Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized

More information

Token-ring local area network management

Token-ring local area network management Token-ring local area network management by BARBARA J. DON CARLOS IBM Corporation Research Triangle Park, North Carolina ABSTRACT This paper describes an architecture for managing a token-ring local area

More information

Chapter 14: Distributed Operating Systems

Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication

More information

CS263: Wireless Communications and Sensor Networks

CS263: Wireless Communications and Sensor Networks CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA

More information

Chapter 16: Distributed Operating Systems

Chapter 16: Distributed Operating Systems Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology

More information

Latency on a Switched Ethernet Network

Latency on a Switched Ethernet Network Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency

More information

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above

2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above 1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It

More information

RFC 2544 Testing of Ethernet Services in Telecom Networks

RFC 2544 Testing of Ethernet Services in Telecom Networks RFC 2544 Testing of Ethernet Services in Telecom Networks White Paper Nigel Burgess Agilent Technologies Introduction The object of this paper is to discuss the use and testing of Ethernet services in

More information

Computer Networks CS321

Computer Networks CS321 Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,

More information

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006 CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)

More information

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN

Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area Networks) 10/28/2008 Vasile Dadarlat - Computer Networks 1 MAN (Metropolitan

More information

Computer Networks: LANs, WANs The Internet

Computer Networks: LANs, WANs The Internet 1 Computer Networks: LANs, WANs The Internet Required reading: Garcia 1.1 and 1.2 CSE 3213, Fall 2010 Instructor: N. Vlajic History of Computers 2 Computer a machine that manipulates data according to

More information

Network Categories. Network Types for the Local Range. Ethernet

Network Categories. Network Types for the Local Range. Ethernet Sicherungsebene Network Categories Chapter 2: Computer Networks 2.1: Physical Layer: representation of digital signals 2.2: Data Link Layer: error protection and access control 2.3: Network infrastructure

More information

DATA COMMUNICATIONS AND NETWORKING. Solved Examples

DATA COMMUNICATIONS AND NETWORKING. Solved Examples Page 1 of 10 DATA COMMUNICATIONS AND NETWORKING Solved Examples References: STA: Stallings, Data and Computer Communications, 6 th ed. TAN: Tannenbaum, Computer Networks, 4 th ed.) 1. Given the following

More information

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet

Gigabit Ethernet. Abstract. 1. Introduction. 2. Benefits of Gigabit Ethernet Table of Contents Abstract... 2 1. Introduction... 2 2. Benefits of Gigabit Ethernet... 2 2.1 Easy Migration to Higher Performance Levels... 3 2.2 Decreased Overall Costs Over Time... 3 2.3 Supports for

More information

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.

More information

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs

LAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

Performance Evaluation of Wired and Wireless Local Area Networks

Performance Evaluation of Wired and Wireless Local Area Networks International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.

More information

Network Topologies. Network Topologies

Network Topologies. Network Topologies Network Topologies LANs and WANs - Geographical coverage LANs A single geographical location, such as office building, school, etc Typically High speed and cheaper. WANs Spans more than one geographical

More information

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks

Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

Gigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF

Gigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF Gigabit Ethernet MAC (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF 1. INTRODUCTION This document serves as a product info for the Gigabit Ethernet MAC from Hitek Systems. The core supports

More information

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1

Fast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1 Fast Ethernet and Gigabit Ethernet Networks: Fast Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer

More information

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur

Module 5. Broadcast Communication Networks. Version 2 CSE IIT, Kharagpur Module 5 Broadcast Communication Networks Lesson 1 Network Topology Specific Instructional Objectives At the end of this lesson, the students will be able to: Specify what is meant by network topology

More information

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD

Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch

More information

Ethernet, VLAN, Ethernet Carrier Grade

Ethernet, VLAN, Ethernet Carrier Grade Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP

More information

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks

LANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer

More information

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet

Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected

More information

TCP IPX/SPX. 1 The Mattapan/Greater Boston Technology Learning Center.

TCP IPX/SPX. 1 The Mattapan/Greater Boston Technology Learning Center. 1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet

More information

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols

Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various

More information

FOUNDATION Fieldbus High Speed Ethernet Control System

FOUNDATION Fieldbus High Speed Ethernet Control System FOUNDATION Fieldbus High Speed Ethernet Control System Sean J. Vincent Fieldbus Inc. Austin, TX, USA KEYWORDS Fieldbus, High Speed Ethernet, H1, ABSTRACT FOUNDATION fieldbus is described in part by the

More information

Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet

Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet Han-Chieh Chao and Yao-Chung Chang Institute of Electrical Engineering National Dong Hwa University Hualien, Taiwan E-mail: hcc@cc.ndhu.edu.tw

More information

Aprenda Token Ring: An Interactive Learning Tool for Token Ring Networks

Aprenda Token Ring: An Interactive Learning Tool for Token Ring Networks Seventh LACCEI Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2009) Energy and Technology for the Americas: Education, Innovation, Technology and Practice June 2-5, 2009,

More information

Remote I/O Network Determinism

Remote I/O Network Determinism Remote I/O Network Determinism September 2011 by David Doggett & Manuel J. Palomino Make the most of your energy Summary Executive Summary... p 3 Introduction... p 4 Network Determinism vs Overall Performance...

More information

RTT 60.5 msec receiver window size: 32 KB

RTT 60.5 msec receiver window size: 32 KB Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)

More information

LIN (Local Interconnect Network):

LIN (Local Interconnect Network): LIN (Local Interconnect Network): History: LIN (Local Interconnect Network) was developed as cost-effective alternate to CAN protocol. In 1998 a group of companies including Volvo, Motorola, Audi, BMW,

More information

Computer Networks. Chapter 5 Transport Protocols

Computer Networks. Chapter 5 Transport Protocols Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data

More information

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction

Attenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit

More information

Communications and Computer Networks

Communications and Computer Networks SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the

More information

DATA COMMUNICATION AND NETWORKS

DATA COMMUNICATION AND NETWORKS DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone

More information

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller

52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller 52-20-15 RMON, the New SNMP Remote Monitoring Standard Nathan J. Muller Payoff The Remote Monitoring (RMON) Management Information Base (MIB) is a set of object definitions that extend the capabilities

More information

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers

EECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776

More information

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu.

What is CSG150 about? Fundamentals of Computer Networking. Course Outline. Lecture 1 Outline. Guevara Noubir noubir@ccs.neu. What is CSG150 about? Fundamentals of Computer Networking Guevara Noubir noubir@ccs.neu.edu CSG150 Understand the basic principles of networking: Description of existing networks, and networking mechanisms

More information

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.

Overview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007. Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point

More information

Random Access Protocols

Random Access Protocols Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,

More information

Assessment of Traffic Prioritization in Switched Local Area Networks Carrying Multimedia Traffic

Assessment of Traffic Prioritization in Switched Local Area Networks Carrying Multimedia Traffic Assessment of Traffic Prioritization in Switched Local Area Networks Carrying Multimedia Traffic F. A. Tobagi, C. J. Fraleigh, M. J. Karam, W. Noureddine Computer Systems Laboratory Department of Electrical

More information

Communication Systems Internetworking (Bridges & Co)

Communication Systems Internetworking (Bridges & Co) Communication Systems Internetworking (Bridges & Co) Prof. Dr.-Ing. Lars Wolf TU Braunschweig Institut für Betriebssysteme und Rechnerverbund Mühlenpfordtstraße 23, 38106 Braunschweig, Germany Email: wolf@ibr.cs.tu-bs.de

More information

The Impact of QoS Changes towards Network Performance

The Impact of QoS Changes towards Network Performance International Journal of Computer Networks and Communications Security VOL. 3, NO. 2, FEBRUARY 2015, 48 53 Available online at: www.ijcncs.org E-ISSN 2308-9830 (Online) / ISSN 2410-0595 (Print) The Impact

More information

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse

Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse Chapter 4 Medium Access Control 1 Introduction Objectives To manage the access to the medium or channel To take into account the time constraints To schedule the traffics Different solutions History Different

More information

CSE 123A Computer Networks

CSE 123A Computer Networks CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets

More information

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS

Link Layer. 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: ATM and MPLS Link Layer 5.1 Introduction and services 5.2 Error detection and correction 5.3Multiple access protocols 5.4 Link-Layer Addressing 5.5 Ethernet 5.6 Hubs and switches 5.7 PPP 5.8 Link Virtualization: and

More information

INTRODUCTION TO 100BASE-T: FAST (AND FASTER) ETHERNET

INTRODUCTION TO 100BASE-T: FAST (AND FASTER) ETHERNET 51-20-97 DATA COMMUNICATIONS MANAGEMENT INTRODUCTION TO 100BASE-T: FAST (AND FASTER) ETHERNET Colin Mick INSIDE How It Works: An Iso View, 100BASE-TX, 100BASE-T4, 100BASE-T2, Gigabit Ethernet, Impacts

More information

Network Design. Yiannos Mylonas

Network Design. Yiannos Mylonas Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which

More information

QoS issues in Voice over IP

QoS issues in Voice over IP COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This

More information

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet

Fast Ethernet and Gigabit Ethernet. Computer Networks: Fast and Gigabit Ethernet Fast Ethernet and Gigabit Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer Data Link Layer Physical

More information

A Simulation Analysis of BACnet Local. Area Networks

A Simulation Analysis of BACnet Local. Area Networks NISTIR 7038 A Simulation Analysis of BACnet Local Area Networks Wong Seok Song Seung Ho Hong Steven T. Bushby NISTIR 7038 A Simulation Analysis of BACnet Local Area Networks Wong Seok Song Seung Ho Hong

More information

Data Communication Networks

Data Communication Networks Data Communication Networks Data communication networks typically do not send real time data As a result, packet switching is often used OPTI 500, Spring 2011, Lecture 6, Data Networks 1 Packet Switching

More information

The ABCs of Spanning Tree Protocol

The ABCs of Spanning Tree Protocol The ABCs of Spanning Tree Protocol INTRODUCTION In an industrial automation application that relies heavily on the health of the Ethernet network that attaches all the controllers and computers together,

More information

Contents. Connection Guide. What is Dante?... 2. Connections... 4. Network Set Up... 6. System Examples... 9. Copyright 2015 ROLAND CORPORATION

Contents. Connection Guide. What is Dante?... 2. Connections... 4. Network Set Up... 6. System Examples... 9. Copyright 2015 ROLAND CORPORATION Contents What is Dante?............................................. 2 Outline.................................................. 2 Fundamental............................................ 3 Required Network

More information

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering

CH.1. Lecture # 2. Computer Networks and the Internet. Eng. Wafaa Audah. Islamic University of Gaza. Faculty of Engineering Islamic University of Gaza Faculty of Engineering Computer Engineering Department Networks Discussion ECOM 4021 Lecture # 2 CH1 Computer Networks and the Internet By Feb 2013 (Theoretical material: page

More information

Networking Test 4 Study Guide

Networking Test 4 Study Guide Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.

More information

Network Performance: Networks must be fast. What are the essential network performance metrics: bandwidth and latency

Network Performance: Networks must be fast. What are the essential network performance metrics: bandwidth and latency Network Performance: Networks must be fast What are the essential network performance metrics: bandwidth and latency Transmission media AS systems Input'signal'f(t) Has'bandwidth'B System'with'H(-) Output'signal'g(t)

More information

Ajay Gummalla-July 2001

Ajay Gummalla-July 2001 DOCSIS Overview Ajay Gummalla Ethernet in the First Mile Study Group July 2001 Ajay Gummalla-July 2001 1 HFC Plant Topology VIDEO combiner Fiber TX Fiber Fiber RX Tap CMTS Fiber RX Fiber Fiber TX 2way

More information

REMOTE MONITORING MATRIX

REMOTE MONITORING MATRIX 802.1ag/Y.1731 BASIC ADVANCED 802.3ah Link 802.1ag/Y.1731 RFC 2544 REMOTE MONITORING MATRIX Featuring a matrix of different features that will help you identify and select which Transition products best

More information

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF

High Speed Ethernet. Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF High Speed Ethernet Dr. Sanjay P. Ahuja, Ph.D. Professor School of Computing, UNF Hubs and Switches Hubs and Switches Shared Medium Hub The total capacity in the shared medium hub configuration (figure

More information

Raj Jain. The Ohio State University Columbus, OH 43210 Jain@CIS.Ohio-State.Edu These slides are available on-line at:

Raj Jain. The Ohio State University Columbus, OH 43210 Jain@CIS.Ohio-State.Edu These slides are available on-line at: IP Over SONET The Ohio State University Columbus, OH 43210 Jain@CIS.Ohio-State.Edu These slides are available on-line at: http://www.cis.ohio-state.edu/~jain/cis788-99/h_bipsn.htm 1 Overview IP over SONET:

More information

EKSAMEN / EXAM TTM4100 18 05 2007

EKSAMEN / EXAM TTM4100 18 05 2007 1.1 1.1.1...... 1.1.2...... 1.1.3...... 1.1.4...... 1.1.5...... 1.1.6...... 1.1.7...... 1.1.8...... 1.1.9...... 1.1.10.... 1.1.11... 1.1.16.... 1.1.12... 1.1.17.... 1.1.13... 1.1.18.... 1.1.14... 1.1.19....

More information

Overview of Computer Networks

Overview of Computer Networks Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource

More information

Region 10 Videoconference Network (R10VN)

Region 10 Videoconference Network (R10VN) Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits

More information

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions

More information

Channel Bonding in DOCSIS 3.0. Greg White Lead Architect Broadband Access CableLabs

Channel Bonding in DOCSIS 3.0. Greg White Lead Architect Broadband Access CableLabs Channel Bonding in DOCSIS 3.0 Greg White Lead Architect Broadband Access CableLabs Agenda DS Channel Bonding Protocol Receive Channel Profiles US Channel Bonding Protocol HFC Plant Topologies & Resolution

More information

www.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark.

www.careercert.info Please purchase PDF Split-Merge on www.verypdf.com to remove this watermark. 2007 Cisco Systems, Inc. All rights reserved. DESGN v2.0 3-11 Enterprise Campus and Data Center Design Review Analyze organizational requirements: Type of applications, traffic volume, and traffic pattern

More information

Chapter 5. Data Communication And Internet Technology

Chapter 5. Data Communication And Internet Technology Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN

More information

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP)

TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) Internet Protocol (IP) TCP over Multi-hop Wireless Networks * Overview of Transmission Control Protocol / Internet Protocol (TCP/IP) *Slides adapted from a talk given by Nitin Vaidya. Wireless Computing and Network Systems Page

More information

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities)

QoS Switching. Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p (GARP/Priorities) QoS Switching H. T. Kung Division of Engineering and Applied Sciences Harvard University November 4, 1998 1of40 Two Related Areas to Cover (1) Switched IP Forwarding (2) 802.1Q (Virtual LANs) and 802.1p

More information

Process Control and Automation using Modbus Protocol

Process Control and Automation using Modbus Protocol Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has

More information

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks

Network+ Guide to Networks 6 th Edition. Chapter 7 Wide Area Networks Network+ Guide to Networks 6 th Edition Chapter 7 Wide Area Networks Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages and disadvantages Compare

More information

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network

1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server

More information

Throughput Analysis of WEP Security in Ad Hoc Sensor Networks

Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Throughput Analysis of WEP Security in Ad Hoc Sensor Networks Mohammad Saleh and Iyad Al Khatib iitc Stockholm, Sweden {mohsaleh, iyad}@iitc.se ABSTRACT This paper presents a performance investigation

More information