Chapter 4. Medium Access Control. IN2P3 Octobre 2002 Jean-Pierre Thomesse
|
|
- Cuthbert Byrd
- 8 years ago
- Views:
Transcription
1 Chapter 4 Medium Access Control 1
2 Introduction Objectives To manage the access to the medium or channel To take into account the time constraints To schedule the traffics Different solutions History Different contexts Difficulty : knowledge of the needs abstraction of the MAC by upper layers (OSI model) 2
3 Summary Introduction General Model Taxonomy CSMA and variants TDMA Controlled access Token Passing Centralized Access 3
4 General model-1 MAC : manages the access to the medium Waits for a condition before sending a frame Controls the transmission Might select the frame to be sent according to time constraints according to the state of the system statically or dynamically The MAC protocols differ on the wait condition the selection of the frame 4
5 General model-2 Principle-1 Frame selection Y Sending Cond N Transmission N Success Y 5
6 General model-3 Principle-2 Frame selection?? Y Sending Cond N Transmission N Success Y 6
7 General model-4 General principle on receipt At the physical layer A frame arrival : physical signal for the physical layer Decoding OK or not (if not, lost frame) At the MAC layer 1-Verification of the frame correctness 2-Verification of the destination address 3-Transmission to the LLC by a MAC-Data-Indication except if it s a MAC service frame 4-If service frame, performing of internal task 7
8 General model-5 General principle on receipt In case of broadcasting network All the stations perform the same algorithm until the stage 3 If a group addressing is used, all the designated stations perform the same algorithm 8
9 General model-6 Addressing Two main addressing types Addressing of the station Usual addressing as in ISO 8802 Addressing of object CAN IEC 1158 WorldFIP 9
10 Summary Introduction General Model Taxonomy CSMA and variants TDMA Controlled access Token Passing Centralized Access 10
11 Taxonomy-1 Condition for sending Autonomy of each node State of the medium, free or busy Detected or foreseen CSMA and TDMA Cooperation by messages exchanges Explicit right to send Centralized or not Polling/Selecting and Token 11
12 Taxonomy-2 MAC protocols Autonomous Controlled CSMA Aloha CSMA-CD CSMA-DCR CSMA-CA / BA TDMA Polling Token TDMA centralized clock TDMA distributed clock Token bus Token ring 12
13 Taxonomy-3 MAC protocols Contention TDMA Controlled CSMA Aloha CSMA-CD CSMA-DCR CSMA-CA/BA TDMA centralized clock TDMA distributed clock Polling / Selecting Token Token bus Token ring 13
14 Taxonomy-4 Networks classification by MAC protocols CSMA Ethernet, CAN, DeviceNet, SDS, EHS, Batibus, EiBus, LON TDMA Sercos, Arinc, TTP-A and C Controlled access Polling WorldFIP, Interbus, HART, FF, IEC 1158, P-NET Token Bus Profibus, IEC
15 Summary Introduction General Model Taxonomy CSMA and variants TDMA Controlled access Token Passing Centralized Access 15
16 CSMA and variants-1 Carrier Sense Multiple Access Aloha, 1970 Transmission and listening Ethernet Listening and transmission Collision detection CSMA-CD Variants CSMA-CA / BA CSMA-DCR 16
17 CSMA and variants-2 CSMA-CD Autonomous protocol Based on the detection of a free bus (no signal) Transmission and listening Collision detection if collision : stop the transmission and recovery if no collision : transmission OK 17
18 CSMA and variants-3 CSMA-CD Station 1 Distance d Station N Tt bus free collision 18
19 CSMA and variants-4 CSMA-CD Station 1 Distance d Tt bus free collision 19
20 CSMA and variants-5 CSMA-CD To detect a collision being transmitting when the collision signal arrives Tt > 2 * Tp + detection time Ethernet : d max = 2 km B = 10 Mbps Tp = 10 us Tt > 30 us Minimal frame length = 512 bits 20
21 CSMA and variants-6 CSMA-CD Recovery after collision Wait for a random delay Listen If bus free during Interframe delay then transmit Listen 21
22 CSMA and variants-7 CSMA-CD, transmission algorithm frame to be sent transmit Y BF N Postpone N C? Y stop and wait BF : bus free C? : collision 22
23 CSMA and variants-8 CSMA-CD, Wait state N : number of the frame transmissions L = min (N, 10) R = random (0, 2 L ) Tb = basic time = 51,2 us Wait-time = R*Tb 23
24 CSMA and variants-12 CSMA-CA (collision avoidance) CSMA-BA (Bitwise arbitration) like CSMA-CD but : one bit is transmitted collision is possibly detected the second bit is transmitted and so on The collision are detected bit by bit and not frame by frame 24
25 CSMA and variants-13 CSMA-BA Station 1 Distance d Tt 1 bit bus free collision collision detection 25
26 CSMA and variants-14 CSMA-BA Station 1 Station 2 Station 3 Network Station 1 continues 26
27 CSMA and variants-15 CSMA-DCR (Deterministic Collision Resolution) Idea : In case of collision with CSMA-CD, Determine a station which might transmit without collision Autonomous algorithm Algorithm according to the binary tree 27
28 CSMA and variants-26 CSMA-DCR Allows a bounded delay for all the frames involved in the collision Delays possibly a more important frame Implemented just over CSMA-CD integrated circuits 28
29 Summary Introduction General Model Taxonomy CSMA and variants TDMA Controlled access Token Passing Centralized Access 29
30 TDMA-1 TDMA (Time Division Multiple Access) Classical method for resource sharing CPU Time Telecommunication time mpx shared line 30
31 TDMA-2 Allows a time interval periodically at each station Independently of their needs Each station detects the beginning of the time interval by its clock Data rate of the shared line > Station loads time 31
32 TDMA-3 Clocks must be synchronized Two solutions classes Centralized control of the clocks A station is in charge of synchronisation Distributed control of the clocks All the stations applied an algorithm Centralized SERCOS, TTP-A Distributed TTP-C 32
33 Summary Introduction General Model Taxonomy CSMA and variants TDMA Controlled access Token Passing Centralized Access 33
34 Controlled Access Basic condition to transmit A station may transmit only if it has received a special message Special message Poll indication Token Special messages transmitted on the same channel Other technique, control channel to transmit the special messages 34
35 Polling / Selecting-1 Polling : operation triggered by a master which allows a slave to transmit Transmission between a slave and the master Selecting : operation triggered by a master which allows a slave to receive Transmission between the master and a slave With or without transmission between slaves 35
36 Polling / Selecting-2 Schema Slave1 Slave2 Slave3 Master Slave4 Slave5 36
37 Polling / Selecting-3 Variants Transmission from a slave S1 to another one S2 Recovery of the token by the master Explicitely (how?) Implicitely (how?) Failure detection (how?) 37
38 Polling / Selecting-4 Explicitely by a message from S2 by a message from S1 Implicitely After a delay detected by the master Failure detection After a delay detected by the master Delay to answer to a poll frame allowed to each slave 38
39 Polling / Selecting-5 Frame format SOF EOF Poll SOF EOF Poll Sel 39
40 Conclusion Medium Access Control Centralized Most of the fieldbuses, WorldFIP, FF, Profibus-PA, ASI,... CSMA/BA CAN and derived networks as DeviceNet, SDS, TokenBus Profibus FMS, P-Net Token ring INTERBUS TDMA TTP, SERCOS 40
Fieldbuses and Real time distributed systems
Fieldbuses and Real time distributed systems Architectures 1 Who s who Hart ISO 8802.5 TTP Unitelway Ethernet SNMP Profibus-PA Batibus WorldFIP IEC 61158 P-NET CiA Sercos BacNET SDS ICCP CSMA-BA EHS CSMA-DCR
More informationLocal Area Networks transmission system private speedy and secure kilometres shared transmission medium hardware & software
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
More informationLANs. Local Area Networks. via the Media Access Control (MAC) SubLayer. Networks: Local Area Networks
LANs Local Area Networks via the Media Access Control (MAC) SubLayer 1 Local Area Networks Aloha Slotted Aloha CSMA (non-persistent, 1-persistent, p-persistent) CSMA/CD Ethernet Token Ring 2 Network Layer
More informationTCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL
1. Local Area Networks TCOM 370 NOTES 99-12 LOCAL AREA NETWORKS AND THE ALOHA PROTOCOL These are networks spanning relatively short distances (e.g. within one building) for local point-to-point and point-to-multipoint
More informationEECS 122: Introduction to Computer Networks Multiaccess Protocols. ISO OSI Reference Model for Layers
EECS 122: Introduction to Computer Networks Multiaccess Protocols Computer Science Division Department of Electrical Engineering and Computer Sciences University of California, Berkeley Berkeley, CA 94720-1776
More informationRandom Access Protocols
Lecture Today slotted vs unslotted ALOHA Carrier sensing multiple access Ethernet DataLink Layer 1 Random Access Protocols When node has packet to send transmit at full channel data rate R. no a priori
More informationECE 333: Introduction to Communication Networks Fall 2002
ECE 333: Introduction to Communication Networks Fall 2002 Lecture 14: Medium Access Control II Dynamic Channel Allocation Pure Aloha In the last lecture we began discussing medium access control protocols
More informationVorlesung Kommunikationsnetze Fieldbus Systems
Vorlesung Kommunikationsnetze Fieldbus Systems Prof. Dr. H. P. Großmann mit B. Wiegel sowie A. Schmeiser und M. Rabel Sommersemester 2009 Institut für Organisation und Management von Informationssystemen
More informationReal-Time (Paradigms) (51)
Real-Time (Paradigms) (51) 5. Real-Time Communication Data flow (communication) in embedded systems : Sensor --> Controller Controller --> Actor Controller --> Display Controller Controller Major
More informationUnit of Learning # 2 The Physical Layer. Sergio Guíñez Molinos sguinez@utalca.cl 2-2009
Unit of Learning # 2 The Physical Layer Sergio Guíñez Molinos sguinez@utalca.cl 2-2009 Local Area Network (LAN) Redes de Computadores 2 Historic topologies more used in LAN Ethernet Logical Bus and Physical
More informationCollision of wireless signals. The MAC layer in wireless networks. Wireless MAC protocols classification. Evolutionary perspective of distributed MAC
The MAC layer in wireless networks The wireless MAC layer roles Access control to shared channel(s) Natural broadcast of wireless transmission Collision of signal: a /space problem Who transmits when?
More informationCommunication Networks
Technical Information Communication Networks 1 LOGICAL TOKEN t 0 t 1 t 2 t 3 network Part 1 Fundamentals Technical Information Part 1: Fundamentals Part 2: Self-operated Regulators Part 3: Control Valves
More informationGeneric term for using the Ethernet standard in automation / industrial applications
Seite 24 Industrial Ethernet Generic term for using the Ethernet standard in automation / industrial applications Specific Quality of Service requirements Real-time Cycle time (e.g. < 1 ms for motion control
More informationReal-Time Systems Hermann Härtig Real-Time Communication (following Kopetz, Liu, Schönberg, Löser)
Real-Time Systems Hermann Härtig Real-Time Communication (following Kopetz, Liu, Schönberg, Löser) 05/02/15 Contents Overview IO Busses: PCI Networks as schedulable resources: Priority / Time-Driven /
More informationCSE331: Introduction to Networks and Security. Lecture 6 Fall 2006
CSE331: Introduction to Networks and Security Lecture 6 Fall 2006 Open Systems Interconnection (OSI) End Host Application Reference model not actual implementation. Transmits messages (e.g. FTP or HTTP)
More informationEPL 657 Wireless Networks
EPL 657 Wireless Networks Some fundamentals: Multiplexing / Multiple Access / Duplex Infrastructure vs Infrastructureless Panayiotis Kolios Recall: The big picture... Modulations: some basics 2 Multiplexing
More informationCS263: Wireless Communications and Sensor Networks
CS263: Wireless Communications and Sensor Networks Matt Welsh Lecture 4: Medium Access Control October 5, 2004 2004 Matt Welsh Harvard University 1 Today's Lecture Medium Access Control Schemes: FDMA TDMA
More informationReal-Time (Paradigms) (70)
Real-Time (Paradigms) (70) Taxonomy of Medium Access Control - Protocols: MAC-protocols Collision avoidance Collision resolution Reservation-based Token-based Master- Time-based Priority-based Slave static
More informationControlled Random Access Methods
Helsinki University of Technology S-72.333 Postgraduate Seminar on Radio Communications Controlled Random Access Methods Er Liu liuer@cc.hut.fi Communications Laboratory 09.03.2004 Content of Presentation
More informationData Link Layer. Page 1. Ethernet
Sicherungsebene Network Categories Local Area Networks (LAN): 10m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few
More informationComputer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
More informationModule 15: Network Structures
Module 15: Network Structures Background Topology Network Types Communication Communication Protocol Robustness Design Strategies 15.1 A Distributed System 15.2 Motivation Resource sharing sharing and
More informationCSE 123A Computer Networks
CSE 123A Computer Networks Winter 2005 Lecture 5: Data-Link II: Media Access Some portions courtesy Srini Seshan or David Wetherall Last Time Framing: How to translate a bitstream into separate packets
More informationa. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol.
CHAPTER 12 PRACTICE SET Questions Q12-1. The answer is CSM/CD. a. CSMA/CD is a random-access protocol. b. Polling is a controlled-access protocol. c. TDMA is a channelization protocol. Q12-3. The answer
More informationOperating System Concepts. Operating System 資 訊 工 程 學 系 袁 賢 銘 老 師
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
More informationChapter 7 Low-Speed Wireless Local Area Networks
Wireless# Guide to Wireless Communications 7-1 Chapter 7 Low-Speed Wireless Local Area Networks At a Glance Instructor s Manual Table of Contents Overview Objectives s Quick Quizzes Class Discussion Topics
More informationLecture 7 Multiple Access Protocols and Wireless
Lecture 7 Multiple Access Protocols and Wireless Networks and Security Jacob Aae Mikkelsen IMADA November 11, 2013 November 11, 2013 1 / 57 Lecture 6 Review What is the responsibility of the link layer?
More informationECE/CS 372 introduction to computer networks. Lecture 13
ECE/CS 372 introduction to computer networks Lecture 13 Announcements: HW #4 hard copy due today Lab #5 posted is due Tuesday June 4 th HW #5 posted is due Thursday June 6 th Pickup midterms Acknowledgement:
More informationRing Local Area Network. Ring LANs
Ring Local Area Network Ring interface (1-bit buffer) Ring interface To station From station Ring LANs The ring is a series of bit repeaters, each connected by a unidirectional transmission link All arriving
More informationChapter 14: Distributed Operating Systems
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
More informationEthernet. Ethernet Frame Structure. Ethernet Frame Structure (more) Ethernet: uses CSMA/CD
Ethernet dominant LAN technology: cheap -- $20 for 100Mbs! first widely used LAN technology Simpler, cheaper than token rings and ATM Kept up with speed race: 10, 100, 1000 Mbps Metcalfe s Etheret sketch
More informationIndustrial Networks & Databases
Industrial Networks & Databases LONWORKS KNX 1 HVAC and BEMS HVAC - Heating, Ventilation & Air Conditioning BEMS - Building & Energy Management Systems 2 3 4 LONWORKS (Local Operating Networks) Open solution
More informationBased on Computer Networking, 4 th Edition by Kurose and Ross
Computer Networks Ethernet Hubs and Switches Based on Computer Networking, 4 th Edition by Kurose and Ross Ethernet dominant wired LAN technology: cheap $20 for NIC first widely used LAN technology Simpler,
More informationEthernet, VLAN, Ethernet Carrier Grade
Ethernet, VLAN, Ethernet Carrier Grade Dr. Rami Langar LIP6/PHARE UPMC - University of Paris 6 Rami.langar@lip6.fr www-phare.lip6.fr/~langar RTEL 1 Point-to-Point vs. Broadcast Media Point-to-point PPP
More informationChapter 16: Distributed Operating Systems
Module 16: Distributed ib System Structure, Silberschatz, Galvin and Gagne 2009 Chapter 16: Distributed Operating Systems Motivation Types of Network-Based Operating Systems Network Structure Network Topology
More informationComputer Networks Vs. Distributed Systems
Computer Networks Vs. Distributed Systems Computer Networks: A computer network is an interconnected collection of autonomous computers able to exchange information. A computer network usually require
More informationTutorial. www.ccontrols.com
Tutorial 1 Tutorial CONTROLLER AREA NETWORK CAN was designed by Bosch and is currently described by ISO 11898 1. In terms of the Open Systems Interconnection model (OSI), CAN partially defines the services
More informationAttenuation (amplitude of the wave loses strength thereby the signal power) Refraction Reflection Shadowing Scattering Diffraction
Wireless Physical Layer Q1. Is it possible to transmit a digital signal, e.g., coded as square wave as used inside a computer, using radio transmission without any loss? Why? It is not possible to transmit
More informationEXAMPLES AND PROBLEMS. Competence Based Education Internet Protocols
EXAMPLES AND PROBLEMS Competence Based Education Internet Protocols Example 1 In following figure frames are generated at node A and sent to node C through node B. Determine the minimum transmission rate
More informationNetwork Categories. Network Types for the Local Range. Ethernet. Carrier Sense Multiple Access
Sicherungsebene Network Categories Local Area Networks (LAN): 0m - few km, simple connection structure Ethernet/Fast Ethernet/Gigabit Ethernet Token Bus, Token Ring LAN Wireless LAN (WLAN, up to a few
More informationOverview of Network Hardware and Software. CS158a Chris Pollett Jan 29, 2007.
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
More informationComputer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
More informationPerformance Evaluation of Wired and Wireless Local Area Networks
International Journal of Engineering Research and Development ISSN: 2278-067X, Volume 1, Issue 11 (July 2012), PP.43-48 www.ijerd.com Performance Evaluation of Wired and Wireless Local Area Networks Prof.
More informationFrom Fieldbus to toreal Time Ethernet
Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation
More informationHow To Communicate With A Token Ring Network (Dihon)
Token us Token -procedure: Only someone who possesses a certain ken (= bit sequence), may send. One example for a ken network: IEEE 80. Token us All stations should be treated equally, i.e. they have pass
More informationLocal Area Networks. Guest Instructor Elaine Wong. Elaine_06_I-1
Local Area Networks Guest Instructor Elaine Wong Elaine_06_I-1 Outline Introduction to Local Area Networks (LANs) Network architecture Geographical area LAN applications LAN Technologies Ethernet Fiber
More informationHow To Make A Multi-User Communication Efficient
Multiple Access Techniques PROF. MICHAEL TSAI 2011/12/8 Multiple Access Scheme Allow many users to share simultaneously a finite amount of radio spectrum Need to be done without severe degradation of the
More informationA research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication systems
Workshop on Quality of Service in Geographically Distributed Systems A research perspective on the adaptive protocols' architectures and system infrastructures to support QoS in wireless communication
More informationChapter 1 Introduction to Fieldbus Systems
Chapter 1 Introduction to Fieldbus Systems In this chapter we will present an introduction to the Distributed Computer Controlled Systems (DCCS) communications that are used to connect various industrial
More informationNetwork Categories. Network Types for the Local Range. Ethernet
Sicherungsebene Network Categories Chapter 2: Computer Networks 2.1: Physical Layer: representation of digital signals 2.2: Data Link Layer: error protection and access control 2.3: Network infrastructure
More informationCSMA/CA. Information Networks p. 1
Information Networks p. 1 CSMA/CA IEEE 802.11 standard for WLAN defines a distributed coordination function (DCF) for sharing access to the medium based on the CSMA/CA protocol Collision detection is not
More informationLAN Switching. 15-441 Computer Networking. Switched Network Advantages. Hubs (more) Hubs. Bridges/Switches, 802.11, PPP. Interconnecting LANs
LAN Switching 15-441 Computer Networking Bridges/Switches, 802.11, PPP Extend reach of a single shared medium Connect two or more segments by copying data frames between them Switches only copy data when
More informationAgenda. Distributed System Structures. Why Distributed Systems? Motivation
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
More informationAdaptive DCF of MAC for VoIP services using IEEE 802.11 networks
Adaptive DCF of MAC for VoIP services using IEEE 802.11 networks 1 Mr. Praveen S Patil, 2 Mr. Rabinarayan Panda, 3 Mr. Sunil Kumar R D 1,2,3 Asst. Professor, Department of MCA, The Oxford College of Engineering,
More informationESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
More informationMedium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III
Medium Access Control (MAC) Protocols for Ad hoc Wireless Networks - III CS: 647 Advanced Topics in Wireless Networks Drs. Baruch Awerbuch & Amitabh Mishra Department of Computer Science Johns Hopkins
More informationLocal Interconnect Network Training. Local Interconnect Network Training. Overview
Overview Local Interconnect Network Training History and introduction Technical features The ISO/OSI reference model and LIN Frames Message Frames Communication concept of LIN Command Frames and Extended
More informationLecture 17: 802.11 Wireless Networking"
Lecture 17: 802.11 Wireless Networking" CSE 222A: Computer Communication Networks Alex C. Snoeren Thanks: Lili Qiu, Nitin Vaidya Lecture 17 Overview" Project discussion Intro to 802.11 WiFi Jigsaw discussion
More informationCS6956: Wireless and Mobile Networks Lecture Notes: 2/11/2015. IEEE 802.11 Wireless Local Area Networks (WLANs)
CS6956: Wireless and Mobile Networks Lecture Notes: //05 IEEE 80. Wireless Local Area Networks (WLANs) CSMA/CD Carrier Sense Multi Access/Collision Detection detects collision and retransmits, no acknowledgement,
More informationComparison of FlexRay and CAN-bus for Real-Time Communication
Comparison of FlexRay and CAN-bus for Real-Time Communication Andreas Forsberg Mälardalen University Högskoleplan 1 721 23 Västerås +46 768011236 afg05001@student.mdh.se Johan Hedberg Mälardalen University
More informationMAC Algorithms in Wireless Networks
Department of Computing Science Master Thesis MAC Algorithms in Wireless Networks Applications, Issues and Comparisons Shoaib Tariq Supervisor: Dr. Jerry Eriksson Examiner: Dr. Per Lindström Dedicated
More informationLLC: Frame Construction. Layer 2: Division into two Parts. Error-detecting and -correcting Codes. Error-correcting Codes
Sicherungsebene Layer 2: Division into two Parts Logical Link Control (LLC) (Layer 2b) Organization of the data to be sent into frames Guarantee (if possible) an error free transmission between neighboring
More information2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 D. None of the above
1. How many bits are in an IP address? A. 16 B. 32 C. 64 2. What is the maximum value of each octet in an IP address? A. 128 B. 255 C. 256 3. The network number plays what part in an IP address? A. It
More informationComplete Power-Line Narrow Band System for Urban- Wide Communication
Complete Power-Line Narrow Band System for Urban- Wide Communication Gerd Bumiller, Markus Sebeck GmbH Unterschlauersbacher-Hauptstr. 10, D-90613 Großhabersdorf, Germany Phone: +49 9105 9960-51, Fax: +49
More informationLocal Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: bhu261@gmail.com Local Area Network LANs connect computers and peripheral
More information... neither PCF nor CA used in practice
IEEE 802.11 MAC CSMA/CA with exponential backoff almost like CSMA/CD drop CD CSMA with explicit ACK frame added optional feature: CA (collision avoidance) Two modes for MAC operation: Distributed coordination
More informationCSCI 362 Computer and Network Security
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
More informationGigabit Ethernet: Architectural Design and Issues
Gigabit Ethernet: Architectural Design and Issues Professor of Computer and Information Sciences Columbus, OH 43210 http://www.cis.ohio-state.edu/~jain/ 9-1 Overview Distance-Bandwidth Principle 10 Mbps
More informationCS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012
CS 5480/6480: Computer Networks Spring 2012 Homework 4 Solutions Due by 1:25 PM on April 11 th 2012 Important: The solutions to the homework problems from the course book have been provided by the authors.
More informationECE 428 Computer Networks and Security
ECE 428 Computer Networks and Security 1 Instructor: Sagar Naik About the Instructor Office: EIT 4174, ECE Dept. Other courses that I teach ECE 355: Software Engineering ECE 453/CS 447/ SE 465: Software
More informationHow To Solve A Network Problem In An Ipa 2.2.1 (Ipa 2) (Ipam) (Networking) (For Acedo) (Ipta) (Powerline) (Network) (Nem
Lund University ETSN01 Advanced Telecommunication Tutorial 7 : Link layer part I Author: Antonio Franco Course Teacher: Emma Fitzgerald February 12, 2015 Contents I Before you start 3 II Exercises 3 1
More informationLatency on a Switched Ethernet Network
Application Note 8 Latency on a Switched Ethernet Network Introduction: This document serves to explain the sources of latency on a switched Ethernet network and describe how to calculate cumulative latency
More informationIEEE 802.11 Wireless LAN Standard. Updated: 5/10/2011
IEEE 802.11 Wireless LAN Standard Updated: 5/10/2011 IEEE 802.11 History and Enhancements o 802.11 is dedicated to WLAN o The group started in 1990 o First standard that received industry support was 802.11b
More informationLecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN
Lecture 6 Types of Computer Networks and their Topologies Three important groups of computer networks: LAN, MAN, WAN LAN (Local Area Networks) 10/28/2008 Vasile Dadarlat - Computer Networks 1 MAN (Metropolitan
More informationLIN (Local Interconnect Network):
LIN (Local Interconnect Network): History: LIN (Local Interconnect Network) was developed as cost-effective alternate to CAN protocol. In 1998 a group of companies including Volvo, Motorola, Audi, BMW,
More informationHow To Understand The Layered Architecture Of A Network
COMPUTER NETWORKS NETWORK ARCHITECTURE AND PROTOCOLS The Need for Standards Computers have different architectures, store data in different formats and communicate at different rates Agreeing on a particular
More informationCOMPUTER NETWORKS SECOND EDITION. ANDREW S.fjANENBAUM. Vrije Universiteit Amsterdam, The Netherlands. Nachrichtentechnische Bib'iothek THD Inv.
COMPUTER NETWORKS SECOND EDITION ANDREW S.fjANENBAUM Vrije Universiteit Amsterdam, The Netherlands Nachrichtentechnische Bib'iothek THD Inv.-Ni,: tq(s ULB Darmstadt iiiiiir 17800787 =3JE Prentice-Hall
More informationTABLE OF CONTENTS. Dedication. Table of Contents. Preface. Overview of Wireless Networks. vii 1.1 1.2 1.3 1.4 1.5 1.6 1.7. xvii
TABLE OF CONTENTS Dedication Table of Contents Preface v vii xvii Chapter 1 Overview of Wireless Networks 1.1 1.2 1.3 1.4 1.5 1.6 1.7 Signal Coverage Propagation Mechanisms 1.2.1 Multipath 1.2.2 Delay
More informationChapter 6: Medium Access Control Layer
Chapter 6: Medium Access Control Layer Chapter 6: Roadmap Overview! Wireless MAC protocols! Carrier Sense Multiple Access! Multiple Access with Collision Avoidance (MACA) and MACAW! MACA By Invitation!
More informationMac Protocols for Wireless Sensor Networks
Mac Protocols for Wireless Sensor Networks Hans-Christian Halfbrodt Advisor: Pardeep Kumar Institute of Computer Science Freie Universität Berlin, Germany halfbrodt@inf.fu-berlin.de January 2010 Contents
More informationFrame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet
Frame Burst Adjusting for Transmitting Video Conference in Gigabit Ethernet Han-Chieh Chao and Yao-Chung Chang Institute of Electrical Engineering National Dong Hwa University Hualien, Taiwan E-mail: hcc@cc.ndhu.edu.tw
More informationWelcome to the Introduction to Controller Area Network web seminar My name is William Stuart, and I am a Applications Engineer for the Automotive
Welcome to the Introduction to Controller Area Network web seminar My name is William Stuart, and I am a Applications Engineer for the Automotive Products Group within Microchip. This web seminar today
More information1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
More informationEthernet Passive Optical Networks EPON
Ethernet Passive Optical Networks EPON IEEE 802.3 Ethernet in the First Mile Study Group January 8-9, 2001, Irvine, CA Gerry Pesavento Alloptic, Inc. Tel 925-245-7647 Email gerry.pesavento@alloptic.com
More informationWhat is it all about? Some simple solutions. Multiple Access. Contexts for the multiple access problem. Outline. Contexts
Multiple Access An Engineering Approach to Computer Networking What is it all about? ider an audioconference where if one person speaks, all can hear if more than one person speaks at the same time, both
More informationWireless Personal Area Networks (WPANs)
Wireless Personal Area Networks (WPANs) Bluetooth, ZigBee Contents Introduction to the IEEE 802 specification family Concept of ISM frequency band Comparison between different wireless technologies ( and
More information19 Comparison of Ethernet Systems
Frithjof Klasen Ever since the end of the 90 s, the usage of industrial Ethernet in automation has been a pursued target. Along with this, the desire emerged to have a universal and standard communication
More informationWireless Networks. Reading: Sec5on 2.8. COS 461: Computer Networks Spring 2011. Mike Freedman
1 Wireless Networks Reading: Sec5on 2.8 COS 461: Computer Networks Spring 2011 Mike Freedman hep://www.cs.princeton.edu/courses/archive/spring11/cos461/ 2 Widespread Deployment Worldwide cellular subscribers
More informationFast Ethernet and Gigabit Ethernet. Networks: Fast Ethernet 1
Fast Ethernet and Gigabit Ethernet Networks: Fast Ethernet 1 Fast Ethernet (100BASE-T) How to achieve 100 Mbps capacity? MII LLC MAC Convergence Sublayer Media Independent Interface Media Dependent Sublayer
More informationDATA COMMUNICATIONS AND NETWORKING. Solved Examples
Page 1 of 10 DATA COMMUNICATIONS AND NETWORKING Solved Examples References: STA: Stallings, Data and Computer Communications, 6 th ed. TAN: Tannenbaum, Computer Networks, 4 th ed.) 1. Given the following
More informationRTT 60.5 msec receiver window size: 32 KB
Real-World ARQ Performance: TCP Ex.: Purdue UCSD Purdue (NSL): web server UCSD: web client traceroute to planetlab3.ucsd.edu (132.239.17.226), 30 hops max, 40 byte packets 1 switch-lwsn2133-z1r11 (128.10.27.250)
More information2. What is the maximum value of each octet in an IP address? A. 28 B. 255 C. 256 D. None of the above
CCNA1 V3.0 Mod 10 (Ch 8) 1. How many bits are in an IP C. 64 2. What is the maximum value of each octet in an IP A. 28 55 C. 256 3. The network number plays what part in an IP A. It specifies the network
More informationGigabit Ethernet MAC. (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF
Gigabit Ethernet MAC (1000 Mbps Ethernet MAC core with FIFO interface) PRODUCT BRIEF 1. INTRODUCTION This document serves as a product info for the Gigabit Ethernet MAC from Hitek Systems. The core supports
More informationComputer Networking: A Survey
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
More informationElettronica dei Sistemi Digitali Costantino Giaconia SERIAL I/O COMMON PROTOCOLS
SERIAL I/O COMMON PROTOCOLS RS-232 Fundamentals What is RS-232 RS-232 is a popular communications interface for connecting modems and data acquisition devices (i.e. GPS receivers, electronic balances,
More informationFinal Exam. Route Computation: One reason why link state routing is preferable to distance vector style routing.
UCSD CSE CS 123 Final Exam Computer Networks Directions: Write your name on the exam. Write something for every question. You will get some points if you attempt a solution but nothing for a blank sheet
More informationRedes de Comunicação em Ambientes Industriais Aula 7
Redes de Comunicação em Ambientes Industriais Aula 7 Luís Almeida Paulo Pedreiras lda@det.ua.pt pedreiras@det.ua.pt Electronic Systems Lab-IEETA / DET Universidade de Aveiro Aveiro, Portugal RCAI 2005/2006
More informationHigh Speed Industrial Ethernet for Semiconductor Equipment
High Speed Industrial Ethernet for Semiconductor Equipment Martin Rostan EtherCAT Technology Group Ostendstr. 196, 90482 Nuremberg, Germany m.rostan@ethercat.org Presented at the SEMI Technology Symposium:
More informationPhilippe Klein. avb-phkl-802-11-qos-overview-0811-1
802.11 QoS Overview Philippe Klein IEEE Plenary Meeting Nov 08 Dallas, TX avb-phkl-802-11-qos-overview-0811-1 Disclaimer This presentation is not a highly detailed technical presentation but a crash course
More informationWireless LAN Services for Hot-Spot
Wireless LAN Services for Hot-Spot Woo-Yong Choi Electronics and Telecommunications Research Institute wychoi53@etri.re.kr ETRI Contents Overview Wireless LAN Services Current IEEE 802.11 MAC Protocol
More information