Applied Data Communication Lecture 14
|
|
|
- Abel Patterson
- 10 years ago
- Views:
Transcription
1 Applied Data Communication Lecture 14 Character oriented Data Link Character-oriented data link control Asynchronous Synchronous Kristjan Sillmann reaalajasüsteemide õppetool TTÜ automaatikainstituut character-oriented Xmodem Zmodem Kermit Others bit-oriented character-oriented example: Binary Synchronous 1 2 Asynchronous File Transfer Used on: Point-to-point asynchronous circuits Typically over phone lines via modem (ex: Bulletin Board System) Computer to computer for transfer of data files Designed to provide error detection and correction facilities for reliable file transfer. Large amount of data to be transmitted i.e. makes sense to group data together into blocks to transmit at same time Asynchronous File Transfer Characteristics of async. file transfer : Group data (binary or text) into blocks to be transmitted (rather than sending character by character), Supply error detection (CRC) symbol(s) with each block Implement ARQ scheme for error correction (resend the blocks which had errors) Xmodem Takes data being transmitted and breaks into blocks Each block has: Start-of-header (SOH) character 1-byte block number 128 bytes of data 1-byte checksum for error checking 3 4
2 Start of Header Xmodem One of the oldest async file transfer Uses stop-and-wait ARQ. Advantages Universally available Copes well with noisy lines Disadvantages Small packet size = high overheads = low efficiency No batch facility SOH Block # Block # compl. (128 bytes) Checksum 5 Xmodem frame With asynchronous, characters are sent one after another, with variable gaps between them. SOH One character header Data: 128 bytes CRC 6 extensions of Xmodem extensions of Xmodem Xmodem-CRC improves error checking by using CRC-8 (instead of checksum) Xmodem-1K: Xmodem-CRC + increased efficiency by using 1024 bytes for data Zmodem: Newer protocol than Xmodem Incorporates features of several Uses CRC-32 with continuous ARQ (sliding window) Dynamically adjusts packet size according to communication circuit conditions Usually Zmodem is preferred to Xmodem. 7 ZModem Advantages Large packet size = low overheads = high efficiency Batch Transfers Auto receive Disadvantages Relatively susceptible to noisy lines Not available in all comms packages Kermit: Supports different packet data sizes and error detection methods Typically uses 1 KByte packets with CRC-24 size adjusted during transmission to optimize efficiency 8
3 Data Link Protocols Protocol Size Error Detection Retransmission Medium Access Asynchronous Transmission 1 Parity Continuous ARQ Full Duplex File Transfer Protocols XMODEM bit Checksum Stop-and-wait ARQ Controlled Access XMODEM-CRC bit CRC Stop-and-wait ARQ Controlled Access XMODEM-1K bit CRC Stop-and-wait ARQ Controlled Access ZMODEM * 32-bit CRC Continuous ARQ Controlled Access KERMIT * 24-bit CRC Continuous ARQ Controlled Access Synchronous Protocols SDLC * 16-bit CRC Continuous ARQ Controlled Access HDLC * 16-bit CRC Continuous ARQ Controlled Access Token Ring * 32-bit CRC Stop-and wait ARQ Controlled Access Ethernet * 32-bit CRC Stop-and wait ARQ Contention PPP * 16-bit CRC Continuous ARQ Full Duplex * Varies depending upon the message length. 9 Communications (BSC or BiSync): Supports EBCDIC, ASCII, and Transcode (rare 6-bit code) Uses Stop-and-Wait ARQ (- the major drawback of BSC) Error Checking A block check character (BCC) in data frame contains error checking information CRC is the most popular method for calculating the BCC The transmission is based on the sending of special characters to control the data link. 10 Control Function ASCII Code EBCDIC Code Character Hex * Character Hex ACK 0 DLE, 0 10, 30 DLE, '70' 10, 70 ACK 1 DLE, 1 10, 31 DLE, / 10, 61 DLE DLE 10 DLE 10 ENQ ENQ 05 ENQ 2D EOT EOT 04 EOT 37 ETB ETB 17 ETB 26 ETX ETX 03 ETX 03 ITB US 1F IUS 1F NAK NAK 15 NAK 3D PAD DEL FF 'FF' FF SOH SOH 01 SOH 01 STX STX 02 STX 02 SYN SYN 16 SYN 32 SYN (Synchronous Idle) Provides the hardware recognizable bit pattern rquired to establish character synchronization at the receiving adapter ENQ (Enquiry) Recognized as a request for a response, or a bid for line control. In some cases it may be used to signify an abnormal end of text or message 'abort'. SOH (Start of Header) Indicates the inclusion of auxiliary data preceding the message text. WACK DLE, ; 10, 3B DLE,, 10, 6B 11 12
4 STX (Start of Text) Indicates the beginning of data in a block. STX may be preceded by a header. Directly behind the STX is the first character of the data field. NAK (Negative Acknowledgement) Indicates that there was an error in a data block. Also used as a response to a bid for line control to indicate a 'Not Ready' condition. DLE (Data Link Escape) Multiple usage as a control character modifier. ETB (End of Transmission Block) Indicates an end of data block, but more will follow. Is used to instruct the receiving unit to perform error checking and acknowledge. ETX (End of Text) Same as ETB, only no more blocks will follow. ITB (End of Intermediate Transmission Block) Same as ETB, except that the receiving statio will not acknowledge after the error checking. EOT (End of Transmission) Indicates that a station has no data to transmit frame formats ACK0, ACK1 (positive Acknowledgements) ACK0 ackowledges 'even' numbered blocks (and as a positive response to a line bid) and ACK1 acknowledges 'odd' numbered blocks. DLE EOT (Mandatory Disconnect) Used on a dial-up line to indicate that the dialing unit is hangup and an instruction for the receiving unit to do the same. 15 Message blocks of BiSync have the following format: Control Frame Data Frame Every package that is transmitted is packed between an STX and an ETX character, followed by one (LRC-check) or two (CRC-check) BCCs (Block Check Character). After this (and the check on the receiving side) the receiver will send an ACK. 16
5 synchronization The beginning of a transmission can be started with a leading PAD ( ) character. What must follow are at least 2 SYN characters. For bit synchronization: uses PAD character before each block of characters (frame). For character synchronization: uses two or more SYN ( ) characters before each frame. 17 Receiver detects SYN character Direction of transmission SYN SYN SYN Receiver in character synchronization Time Receiver enters hunt mode STX Frame contents Once the receiver has obtained Bit synchronisation it enters what is known as the Hunt Mode. It starts to interpret the received bit stream in a window of eight bits as each new bit is received. In this way it checks whether the last eight bits were equal to a SYN character (to find the start of next byte) 18 synchronization transmission modes Once in Byte Synchronization, the receiver checks for a STX or SOH character, indicating start of text/header. Once synchronisation has been achieved, SYN ( ) characters will be continuously sent when data is not being transmitted to ensure that the sender and receiver remain synchronised at both bit and byte level. The trailing PAD character assures that the transmission is held long enough for the last critical character to have been received (usually an "FF all 1 s character). 19 The sending of Before information is send it might be necessary to send a couple of that sets the device in the right mode, like a printer. To indicate that this 'special' information is being send it is preceded by a SOH character. The sending of data Next to the sending of plain ASCII or EBCDIC text, there is also the possibility of sending binary data. To realize this, data is sent in a so called 'transparency-mode'. Which means that every transmission control character is preceded by a DLE character. 20
6 point to point control frames Control Frames Question: PAD SYN SYN ENQ PAD (can I send now?) Answer: PAD SYN SYN ACK0 PAD (if ready to receive) PAD SYN SYN NAK PAD (if not ready to receive) PAD SYN SYN WACK PAD (temporarily busy, try later). The requesting station will reply with another ENQ After data is sent, line is freed up by sender with PAD SYN SYN EOT PAD Three seconds later, either party can ENQ multipoint control frames Polling & Selecting: master sends PAD SYN SYN (addr) ENQ PAD addr is address of terminal or cluster controller The polled/selected station can respond several ways: If anything waiting to send to host: PAD SYN SYN SOH (Header) STX (Data) ETX BCC BCC PAD PAD SYN SYN EOT PAD (Finished sending) PAD SYN SYN STX ENQ PAD (give me 2 seconds to get ready and then I'll start sending, but don't give the line to someone else) multipoint control frames The polled/selected station can respond several ways: If no data waiting (in the station) to send to host: PAD SYN SYN ACK0 PAD (ready to receive) PAD SYN SYN NAK PAD (not ready to receive) PAD SYN SYN WACK PAD (temporarily busy, try again later) other transmission controls Receiver delay If the slave can't cope with the speed of the master is can send a WACK to delay the sending of data to prevent buffer overflows. Sender delay If the master station can't present it's data as fast as the receiving end can it uses a TTD (Temporary Text Delay) character to hold the line (to overcome the non-activity time-out of the slave). Actually a TTD is an illegal sequence of characters (STX, ENQ) on which the slave responds with a NAK
7 other transmission controls Abort To abort a block that is already partially sent, the master sends ENQ, on this 'block abort' the slave responds with a NAK and drops all already received data (from this block). If the master sends a EOT before a ETX is received by the station it means a 'station abort. The slave then has a possibility to become master, otherwise the connection is terminated. 25
PROPERTY MANAGEMENT SYSTEM
PROPERTY MANAGEMENT SYSTEM COMMUNICATION INTERFACE SPECIFICATION NEC America, Inc. NDA-305-00 Revision.0 June, 998 Stock # 24727 LIABILITY DISCLAIMER NEC America reserves the right to change the specifications,
ESPA 4.4.4 Nov 1984 PROPOSAL FOR SERIAL DATA INTERFACE FOR PAGING EQUIPMENT CONTENTS 1. INTRODUCTION 2. CHARACTER DESCRIPTION
PROPOSAL FOR SERIAL DATA INTERFACE FOR PAGING EQUIPMENT CONTENTS 1. INTRODUCTION 2. CHARACTER DESCRIPTION 2.1 CHARACTER STRUCTURE 2.2 THE CHARACTER SET 2.3 CONTROL CHARACTERS 2.3.1 Transmission control
Data Link Protocols. 5.4 Framing
Data Link Protocols A Packets Data link layer Physical layer Frames Packets Data link layer Physical layer B Data Links Services Framing Error control Flow control Multiplexing Link Maintenance Security:
plc numbers - 13.1 Encoded values; BCD and ASCII Error detection; parity, gray code and checksums
plc numbers - 3. Topics: Number bases; binary, octal, decimal, hexadecimal Binary calculations; s compliments, addition, subtraction and Boolean operations Encoded values; BCD and ASCII Error detection;
X 1 2 - D I A L U P. X12 (HIPAA) Dial-up Transmission System. Document Version 1.3 2013
X 1 2 - D X12 (HIPAA) Dial-up Transmission System Document Version 1.3 2013 I A L U P Table of Contents General... 3 Version and Release... 3 Purpose & Scope... 3 High Level Design... 4 Communications
Data Link Layer. Flow Control. Flow Control
Data Link Layer Flow Control 1 Flow Control Flow Control is a technique for speed-matching of transmitter and receiver. Flow control ensures that a transmitting station does not overflow a receiving station
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
Computer Networks. Data Link Layer
Computer Networks The Data Link Layer 1 Data Link Layer Application Transport Network DLL PHY 2 What does it do? What functions it performs? Typically: Handling transmission errors, a.k.a., error control.
TELOCATOR ALPHANUMERIC PROTOCOL (TAP)
TELOCATOR ALPHANUMERIC PROTOCOL (TAP) Version 1.8 February 4, 1997 TABLE OF CONTENTS 1.0 Introduction...1 2.0 TAP Operating Environment...1 3.0 Recommended Sequence Of Call Delivery From An Entry Device...2
Operating Systems and Computer Networks / Datenverarbeitung 2 / Data Processing 2
Computer Networks / Datenverarbeitung 2 / Data Processing 2 Exercise 7: Network Transmission & Code Efficiency Faculty of Question 7.1 Code Efficiency Block Length S S S Y Y O N N H 5 characters S T X
ASCII Code. Numerous codes were invented, including Émile Baudot's code (known as Baudot
ASCII Code Data coding Morse code was the first code used for long-distance communication. Samuel F.B. Morse invented it in 1844. This code is made up of dots and dashes (a sort of binary code). It was
High-Level Data Link Control
High-Level Data Link Control This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD)
Chapter 11 V.25 bis Autodialer
Chapter 11 V.25 bis Autodialer GENERAL V.25 bis is an option that allows dialing functions to be controlled using synchronous data. Select V.25 bis through the appropriate &M command in the AT command
V.25 bis Autodialer (External Modem Only)
V.25 bis allows dialing functions to be controlled using synchronous data. You select V.25 bis through the appropriate &M command. Note The modem must be configured as V.25 SDLC ASCII NRZ for use with
TAP Interface Specifications
TAP Interface Specifications This Document is for those who want to develop their own paging control software or add an interface for the WaveWare v9 Series Paging Encoder to their existing software applications.
File Transfer Protocols In Anzio
The New File Transfer Protocols in Anzio version 12.6 What s New in Version 12.6 With the release of Anzio Lite and AnzioWin version 12.6 we are introducing a new user interface and support for additional
Supporting File Transfers Using the ZMODEM Protocol - Serial Prog...
1 sur 13 03/11/2004 15:38 Supporting File Transfers Using the ZMODEM Protocol In this chapter you'll learn how to transfer files using the ZMODEM protocol. Previous Chapter - Building a Serial Communications
Memory is implemented as an array of electronic switches
Memory Structure Memory is implemented as an array of electronic switches Each switch can be in one of two states 0 or 1, on or off, true or false, purple or gold, sitting or standing BInary digits (bits)
DATA COMMUNICATION AND NETWORKS
DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone
Transport Layer. Chapter 3.4. Think about
Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is
URL encoding uses hex code prefixed by %. Quoted Printable encoding uses hex code prefixed by =.
ASCII = American National Standard Code for Information Interchange ANSI X3.4 1986 (R1997) (PDF), ANSI INCITS 4 1986 (R1997) (Printed Edition) Coded Character Set 7 Bit American National Standard Code
Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri
Chapter 3: Sample Questions, Problems and Solutions Bölüm 3: Örnek Sorular, Problemler ve Çözümleri Örnek Sorular (Sample Questions): What is an unacknowledged connectionless service? What is an acknowledged
Modicon Modbus Protocol Reference Guide. PI MBUS 300 Rev. J
Modicon Modbus Protocol Reference Guide PI MBUS 300 Rev. J 1 Modicon Modbus Protocol Reference Guide PI MBUS 300 Rev. J June 1996 MODICON, Inc., Industrial Automation Systems One High Street North Andover,
CSE331: Introduction to Networks and Security. Lecture 9 Fall 2006
CSE33: Introduction to Networks and Security Lecture 9 Fall 2006 Announcements Project Due TODAY HW Due on Friday Midterm I will be held next Friday, Oct. 6th. Will cover all course material up to next
Development of communication interface and GUI for Minec 3x
Development of communication interface and GUI for Minec 3x Authors: Carine Andersson Andreas Lång Master Thesis, 20p, 2004 Department of Computing Science Umeå University Internal Supervisor: Jan-Erik
Data Link Layer Overview
Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Process Control and Automation using Modbus Protocol
Process Control and Automation using Modbus Protocol Modbus is the fundamental network protocol used in most industrial applications today. It is universal, open and an easy to use protocol. Modbus has
Computer Networks. Chapter 5 Transport Protocols
Computer Networks Chapter 5 Transport Protocols Transport Protocol Provides end-to-end transport Hides the network details Transport protocol or service (TS) offers: Different types of services QoS Data
Communication Concepts
1 Communication Concepts Elements This first chapter deals with the fundamentals of data communications. We primarily probe and discuss the factors that affect all communications from a big picture perspective,
Appendix B RCS11 Remote Communications
Appendix B RCS11 Remote Communications B.1 Host Computer Remote Communications Control and status messages are conveyed between the RCS11 and the host computer using packetized message blocks in accordance
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
point to point and point to multi point calls over IP
Helsinki University of Technology Department of Electrical and Communications Engineering Jarkko Kneckt point to point and point to multi point calls over IP Helsinki 27.11.2001 Supervisor: Instructor:
Xi2000 Series Configuration Guide
U.S. Default Settings Sequence Reset Scanner Xi2000 Series Configuration Guide Auto-Sense Mode ON UPC-A Convert to EAN-13 OFF UPC-E Lead Zero ON Save Changes POS-X, Inc. 2130 Grant St. Bellingham, WA 98225
BARCODE READER V 2.1 EN USER MANUAL
BARCODE READER V 2.1 EN USER MANUAL INSTALLATION OF YOUR DEVICE PS-2 Connection RS-232 Connection (need 5Volts power supply) 1 INSTALLATION OF YOUR DEVICE USB Connection 2 USING THIS MANUAL TO SETUP YOUR
LLC: Frame Construction. Layer 2: Division into two Parts. Error-detecting and -correcting Codes. Error-correcting Codes
Sicherungsebene Layer 2: Division into two Parts Logical Link Control (LLC) (Layer 2b) Organization of the data to be sent into frames Guarantee (if possible) an error free transmission between neighboring
Ethernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
Data Link Protocols. TCP/IP Suite and OSI Reference Model
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
AN_2901CE_001 JULY 2005
73M2901CE V.22 bis Single Chip Modem A Maxim Integrated Products Brand APPLICATION NOTE AN_2901CE_001 JULY 2005 Introduction V.23 is a FSK modem standard that is defined by ITU regulations. V.23 has been
DATA COMMUNICATION (Basics of data communication, OSI layers.)
DATA COMMUNICATION (Basics of data communication, OSI layers.) K.K.DHUPAR SDE (NP-II) ALTTC ALTTC/NP/KKD/Data Communication 1 Data Communications History 1838: Samuel Morse & Alfred Veil Invent Morse Code
Local Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
Virtual Integrated Design Getting started with RS232 Hex Com Tool v6.0
Virtual Integrated Design Getting started with RS232 Hex Com Tool v6.0 Copyright, 1999-2007 Virtual Integrated Design, All rights reserved. 1 Contents: 1. The Main Window. 2. The Port Setup Window. 3.
PPP (Point-to-Point Protocol)
PPP (Point-to-Point Protocol) PPP (Point-to-Point Protocol) is the most widely used method for transporting IP packets over a serial link between the user and the Internet Service Provider (ISP). Although
SCADA System. Application Guide
SCADA System Application Guide Important User Information Solid state equipment has operational characteristics differing from those of electromechanical equipment. Safety Guidelines for the Application,
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
--.--- ---- - - - 9_ IBM 3270. 3271 Control Unit 3272 Control Unit 3275 Display Station. Information Dis'play System
GA23-0060-0 File No. 5360/5370/53/4300-09 BM 3270 nformation Dis'play System Systems 3271 Control Unit 3272 Control Unit 3275 Display Station Description and Programmer1s Guide - --.--- ---- - - - 9_ First
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Quectel Cellular Engine
Cellular Engine GSM Multiplexer Application Notes GSM_MUX_AN_V1.00 Document Title GSM Multiplexer Application Notes Version 1.00 Date 2009-06-27 Status Document Control ID Release GSM_MUX_AN_V1.00 General
A Transport Protocol for Multimedia Wireless Sensor Networks
A Transport Protocol for Multimedia Wireless Sensor Networks Duarte Meneses, António Grilo, Paulo Rogério Pereira 1 NGI'2011: A Transport Protocol for Multimedia Wireless Sensor Networks Introduction Wireless
Modbus Protocol. PDF format version of the MODBUS Protocol. http://www.http://www.modicon.com/techpubs/toc7.html. The original was found at:
Modbus Protocol PDF format version of the MODBUS Protocol The original was found at: http://www.http://www.modicon.com/techpubs/toc7.html (In case of any discrepancies, that version should be considered
MBP_MSTR: Modbus Plus Master 12
Unity Pro MBP_MSTR 33002527 07/2011 MBP_MSTR: Modbus Plus Master 12 Introduction This chapter describes the MBP_MSTR block. What s in this Chapter? This chapter contains the following topics: Topic Page
Based on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
EE4367 Telecom. Switching & Transmission. Prof. Murat Torlak
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
INTERNATIONAL TELECOMMUNICATION UNION. SERIES V: DATA COMMUNICATION OVER THE TELEPHONE NETWORK Interfaces and voiceband modems
INTERNATIONAL TELECOMMUNICATION UNION ITU-T V.24 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (02/2000) SERIES V: DATA COMMUNICATION OVER THE TELEPHONE NETWORK Interfaces and voiceband modems List of
Voyager 9520/40 Voyager GS9590 Eclipse 5145
Voyager 9520/40 Voyager GS9590 Eclipse 5145 Quick Start Guide Aller à www.honeywellaidc.com pour le français. Vai a www.honeywellaidc.com per l'italiano. Gehe zu www.honeywellaidc.com für Deutsch. Ir a
Ring Local Area Network. Ring LANs
Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving
flarq flarqhelp-main The main screen dialog for flarq is: Windows image - identical in Linux
help-main fast light automatic repeat request is a file transfer application that is based on the ARQ specification developed by Paul Schmidt, K9PS. It is capable of transmitting and receiving frames of
Model 200 / 250 / 260 Programming Guide
Model 200 / 250 / 260 Programming Guide E-SEEK Inc. R & D Center 9471 Ridgehaven Court #E San Diego, CA 92123 Tel: 858-495-1900 Fax: 858-495-1901 Sales & Marketing 245 Fischer Ave #D5 Costa Mesa, CA 92626
Stop And Wait. ACK received; transmit frame 2 CS 455 3
Data Link Layer, Part 5 Sliding Window Protocols These slides are created by Dr. Yih Huang of George Mason University. Students registered in Dr. Huang's courses at GMU can make a single machine-readable
Symbols in subject lines. An in-depth look at symbols
An in-depth look at symbols What is the advantage of using symbols in subject lines? The age of personal emails has changed significantly due to the social media boom, and instead, people are receving
Protocols and Architecture. Protocol Architecture.
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
COMPUTER NETWORKS REVIEW QUESTIONS AND PROBLEMS
COMPUTER NETWORKS REVIEW QUESTIONS AND PROBLEMS. INTRODUCTION TO COMPUTER NETWORKS. What is a computer network? Briefly define..2 Briefly define the client-server model..3 What is scalability? Briefly
Technical Support Bulletin Nr.18 Modbus Tips
Technical Support Bulletin Nr.18 Modbus Tips Contents! Definitions! Implemented commands! Examples of commands or frames! Calculating the logical area! Reading a signed variable! Example of commands supported
TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15
TOE2-IP FTP Server Demo Reference Design Manual Rev1.0 9-Jan-15 1 Introduction File Transfer Protocol (FTP) is the protocol designed for file sharing over internet. By using TCP/IP for lower layer, FTP
Chapter 1: Introduction to Communications What is Data Communications? Data Communication Networks Basic Components of a communications system
Dear Student Here is the list of chapter sections that we will be covering for this semester. For each chapter listed in pages below: Any Bold text is required (with all the details in that sections) Any
WAN Data Link Protocols
WAN Data Link Protocols In addition to Physical layer devices, WANs require Data Link layer protocols to establish the link across the communication line from the sending to the receiving device. 1 Data
DEBT COLLECTION SYSTEM ACCOUNT SUBMISSION FILE
CAPITAL RESOLVE LTD. DEBT COLLECTION SYSTEM ACCOUNT SUBMISSION FILE (DCS-ASF1107-7a) For further technical support, please contact Clive Hudson (IT Dept.), 01386 421995 13/02/2012 Account Submission File
(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
BI-300. Barcode configuration and commands Manual
BI-300 Barcode configuration and commands Manual 1. Introduction This instruction manual is designed to set-up bar code scanner particularly to optimize the function of BI-300 bar code scanner. Terminal
LIN (Local Interconnect Network):
LIN (Local Interconnect Network): History: LIN (Local Interconnect Network) was developed as cost-effective alternate to CAN protocol. In 1998 a group of companies including Volvo, Motorola, Audi, BMW,
CSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
BRMO 80 / ETH-IP. User Manual. Réf : MU-BRMO 80-ETH-IP-1.4-EN
User Manual Réf : MU-BRMO 80-ETH-IP-1.4-EN BALOGH SA 189, rue d Aubervilliers - C.P. 97 75886 PARIS Cedex 18 France Tél : 33 (0)1 44 65 65 00 Fax : 33 (0)1 44 65 65 10 e-mail : [email protected]
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES. Gene Robinson E.A.Robinsson Consulting 972 529-6395 [email protected]
COMMUNICATION NETWORKS WITH LAYERED ARCHITECTURES Gene Robinson E.A.Robinsson Consulting 972 529-6395 [email protected] 9 March 1999 IEEE802 N-WEST STANDARDS MEETING FOR BROADBAND WIRELESS ACCESS SYSTEMS
[Prof. Rupesh G Vaishnav] Page 1
Basics The function of transport layer is to provide a reliable end-to-end communications service. It also provides data transfer service for the user layers above and shield the upper layers from the
Single channel data transceiver module WIZ2-434
Single channel data transceiver module WIZ2-434 Available models: WIZ2-434-RS: data input by RS232 (±12V) logic, 9-15V supply WIZ2-434-RSB: same as above, but in a plastic shell. The WIZ2-434-x modules
2 Basic Concepts. Contents
2. Basic Concepts Contents 2 Basic Concepts a. Link configuration b. Topology c. Transmission mode d. Classes of networks 1 a. Link Configuration Data links A direct data link is one that establishes a
ASCII CODES WITH GREEK CHARACTERS
ASCII CODES WITH GREEK CHARACTERS Dec Hex Char Description 0 0 NUL (Null) 1 1 SOH (Start of Header) 2 2 STX (Start of Text) 3 3 ETX (End of Text) 4 4 EOT (End of Transmission) 5 5 ENQ (Enquiry) 6 6 ACK
Signalling Control System Serial Train Information Interface
Specification Signalling Control System Serial Train Information Interface Issued Date: 04 April 2014 Important Warning This document is one of a set of standards developed solely and specifically for
Meridian 1 Option 11C and 11C Mini Customer Configuration Backup and Restore Guide
Meridian 1 Customer Configuration Backup and Restore Guide Document Number: 553-3011-330 Document Release: Standard 6.00 Date: April 2000 Year Publish FCC TM Copyright 1992 2000 Nortel Networks All Rights
The ASCII Character Set
The ASCII Character Set The American Standard Code for Information Interchange or ASCII assigns values between 0 and 255 for upper and lower case letters, numeric digits, punctuation marks and other symbols.
CONTROL MICROSYSTEMS DNP3. User and Reference Manual
DNP3 User and Reference Manual CONTROL MICROSYSTEMS SCADA products... for the distance 48 Steacie Drive Telephone: 613-591-1943 Kanata, Ontario Facsimile: 613-591-1022 K2K 2A9 Technical Support: 888-226-6876
CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
This is great when speed is important and relatively few words are necessary, but Max would be a terrible language for writing a text editor.
Dealing With ASCII ASCII, of course, is the numeric representation of letters used in most computers. In ASCII, there is a number for each character in a message. Max does not use ACSII very much. In the
BAR CODE 39 ELFRING FONTS INC.
ELFRING FONTS INC. BAR CODE 39 This package includes 18 versions of a bar code 39 font in scalable TrueType and PostScript formats, a Windows utility, Bar39.exe, that helps you make bar codes, and Visual
A short description to the VABus protocol
A short description to the VABus protocol The VABus-protocol can be used with the CM-232 or the CM-485. 1. connectors...2 2. Baudrate...3 3. Node-Adress...3 4. Serial Port Defines...4 5. Control Characters...4
Basic Networking Concepts. 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Review of Error Detection of Data Link Layer in Computer Network
Middle-East Journal of Scientific Research 18 (8): 1105-1110, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.18.8.11835 Review of Error Detection of Data Link Layer in Computer
Data Link Protocols. Link Layer Services. Framing, Addressing, link access: Error Detection:
Data Link Protocols Link Layer Services Framing, Addressing, link access: encapsulate datagram into frame, adding header, trailer channel access if shared medium MAC addresses used in frame headers to
Voice and Delivery Data Networks
Voice and Delivery Data Networks Chapter 11 Learning Objectives After reading this chapter, you should be able to: Identify the basic elements of a telephone system Describe the composition of the telephone
11/22/2013 1. komwut@siit
11/22/2013 1 Week3-4 Point-to-Point, LAN, WAN Review 11/22/2013 2 What will you learn? Representatives for Point-to-Point Network LAN Wired Ethernet Wireless Ethernet WAN ATM (Asynchronous Transfer Mode)
Introduction to Networking and the OSI Model
ch01.qxd 1/3/2001 9:44 AM Page 1 O N E Introduction to Networking and the OSI Model In This Chapter Local Area Networks Wide Area Networks Internetworking The Seven Layers of the OSI Model In this chapter,
Concept XXMIT / RTXMIT Transmit (Receive) Function Block
Concept XXMIT / RTXMIT Transmit (Receive) Function Block 840 USE 499 00 eng 2002 Schneider Electric All Rights Reserved 33002196.01 2 Table of Contents About the Book.......................................5
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer. By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 UPRM
ICOM 5026-090: Computer Networks Chapter 6: The Transport Layer By Dr Yi Qian Department of Electronic and Computer Engineering Fall 2006 Outline The transport service Elements of transport protocols A
B-2 Analyzing TCP/IP Networks with Wireshark. Ray Tompkins Founder of Gearbit www.gearbit.com
B-2 Analyzing TCP/IP Networks with Wireshark June 15, 2010 Ray Tompkins Founder of Gearbit www.gearbit.com SHARKFEST 10 Stanford University June 14-17, 2010 TCP In this session we will examine the details
ECE 358: Computer Networks. Homework #3. Chapter 5 and 6 Review Questions 1
ECE 358: Computer Networks Homework #3 Chapter 5 and 6 Review Questions 1 Chapter 5: The Link Layer P26. Let's consider the operation of a learning switch in the context of a network in which 6 nodes labeled
CSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets
COMPUTER NETWORKS HANDOUTS LECTURERS # 01 45 PREPARED BY: HAMMAD KHALID KHAN. Copyright Virtual University of Pakistan
COMPUTER NETWORKS (CS610) HANDOUTS LECTURERS # 01 45 PREPARED BY: HAMMAD KHALID KHAN 1 Table of contents Lecture No. 1...4 INTRODUCTION...4 Lecture No. 2...9 Motivation and Tools...9 Lecture No. 3...13
Turquoise Equities. TQ401 - Level 2 MITCH UDP Market Data. Issue 3.3 19 November 2015
Turquoise Equities TQ401 - Level 2 MITCH UDP Market Data Issue 3.3 19 November 2015 Contents 1.0 Introduction 4 1.1 Purpose 4 1.2 Readership 4 1.3 Document Series 4 1.4 Document History 5 1.5 Enquiries
