Unmodified Ethernet for Industrial Automation?

Total Page:16

File Type:pdf, Size:1020Kb

Unmodified Ethernet for Industrial Automation? Unmodified Ethernet for Industrial Automation? • Benefits of Ethernet for Automation • Ethernet Features – an Overview • Limiting Factors of Ethernet as Fieldbus Replacement SUE: Standard Unmodified Ethernet Fieldbus Foundation High Speed Ethernet (HSE): What are the benefits of HSE? ….Use of unmodified Ethernet and standard IP makes HSE systems more cost-effective than other Ethernet solutions and proprietary networks…. © EtherCAT Technology Group Benefits of Ethernet for Automation • Ethernet is in use for Controller/Controller communication since many years, as it saves money to use commodity technologies: Examples: • CAN (originally developed for automotive applications) • PC-based Controls • Windows + Linux • So Automation benefits from the much larger IT Communication • Thus low cost hard- and software • If also on Fieldbus ( I/O, Sensor and Drives) Level: just one communication technology remaining • Improvement also financed (and driven !) by others © EtherCAT Technology Group Ethernet Overview: CSMA/CD, TCP/IP & others • Architecture • Physical Layer: Signal, Cables + Wiring • Media Access Control • Name Resolution • Routing • IP, TCP + UDP This diagram was hand drawn by Robert M. Metcalfe and photographed by Dave R. Boggs in 1976 to produce a 35mm slide used to present Ethernet to the National Computer Conference in June of that year. © EtherCAT Technology Group Ethernet Definition (Wikipedia) Ethernet is a frame-based computer networking technology for local area networks (LANs). It defines wiring and signaling for the physical layer, and frame formats and protocols for the media access control (MAC)/data link layer and a common addressing format Ethernet is standardized as IEEE 802.3. It has become the most widespread LAN technology in use during the 1990s to the present, and has largely replaced all other LAN standards such as token ring, FDDI, and ARCNET. © EtherCAT Technology Group ISO/OSI, IEEE 802 and TCP/IP ISO/OSI - Model TCP/IP - Model 7 Application Layer 5 Application Layer: contains a variety of commonly used protocols, such as file HTTP, FTP, rlogin, Telnet, DHCP,... transfer, virtual terminal, and email 6 Presentation Layer manages the syntax and semantics of the information transmitted between two computers 5 Session Layer establishes and manages sessions, conversions, or dialogues between two computers 4 Transport Layer 4 Transport Layer: TCP + UDP splits data from the session layer into smaller packets for Handles communication among programs on a network. delivery on the network layer and ensures that the packets arrive correctly at the other end 3 Network Layer 3 Network Layer: IP (Internet Protocol), controls the operation of a packet transmitted from one network This layer is used for basic communication, addressing and routing. to another, such as how to route a packet. 2 Data Link Layer 1/2 Medium Access Control (MAC) transforms a stream of raw bits (0s and 1s) from the physical IEEE 802.3: CSMA/CD (Ethernet), 802.4 Token Bus (ARCnet), 802.5 Token layer into an error-free data frame (packets) for the network layer Ring, 802.11 Wireless, 1 Physical Layer Cables, cards and physical aspects: ISO/IEC 11801, parts also in IEEE 802.3 transmits signals across a communication medium © EtherCAT Technology Group Ethernet Transmission Media (IEEE802) 1BASE5 UTP 10GBASE-W W PCS/PMA overundefined PMD 10BASE2 Coax 10GBASE-EW W fibreover 1550nm optics 10BASE5 Coax 10GBASE-LW W fibreover 1310nm optics 10BROAD36 Coax 10GBASE-SW W fibreover 850nm optics 10BASE-T UTP, duplex mode unknown 10GBASE-KR Backplane Ethernet (802.3ap, 2007) 10BASE-THD UTP, half duplex mode 10GBASE-KX4 Backplane Ethernet (802.3ap, 2007) 10BASE-TFD UTP, fullduplex mode 10GBASE-LRM multimode Fibre (802.3aq, 2006) 10BASE-FP Passive fiber 10GBASE-T UTP (802.3an, 2006) 10BASE-FB Synchronous fiber 40GBASE-SR4 Multimode Fibre, 100m (802.3ba,2010) 10BASE-FL Asynchronous fiber 40GBASE-LR4 Singlemode Fibre, 10km (802.3ba,2010) 100BASE-T2 Two-pair Category 3 UTP 40GBASE-CR4 Copper Cable Assembly, 10m (802.3ba,2010) 100BASE-T4 Four-pair Category 3 UTP 40GBASE-KR4 Backplane Ethernet (802.3ba,2010) 100BASE-TX Two-pair Category5 UTP 100GBASE-SR10 Multimode Fibre, 100m (802.3ba,2010) 100BASE-FX Two-strand Multimode Fibre 100GBASE-LR4 Singlemode Fibre, 10km (802.3ba,2010) 100BASE-VG Four-Pair Category 3 UTP 100GBASE-ER4 Singlemode Fibre, 40km (802.3ba,2010) 1000BASE-T Four-pair Category 5 UTP PHY 100GBASE-CR10 Copper Cable Assembly, 10m (802.3ba,2010) 1000BASE-T X Four-pair Category 6 UTP PHY 1000BASE-LX Multimode Fibre 1000BASE-SX Multimode Fibreor Singlemode Fibre Large variety of physical layers 1000BASE-CX X copper over 150-Ohm balanced cable PMD 1000BASE-BX10 Bidirectional single strand Singlemode Fibre 1000BASE-LX10 Two-strand Singlemode Fibre 1000BASE-PX10 -D Singlemode Fibre, Downstream, 10km 1000BASE-PX10 -U Singlemode Fibre, Upstream, 10km 1000BASE-PX20 -D Singlemode Fibre, Downstream, 20km 1000BASE-PX20 -U Singlemode Fibre, Upstream, 20km 1000BASE-KX 1m overBackplane 10GBASE-X X PCS/PMA overundefined PMD 10GBASE-LX4 X fibreover 4 lane1310nm optics 10GBASE-CX4 X copper over 8 pair 100-Ohm balanced cable, 15m 10GBASE-R R PCS/PMA overundefined PMD 10GBASE-ER R fibre over 1550nm optics 10GBASE-LR R fibre over 1310nm optics 10GBASE-SR R fibreover 850nm optics © EtherCAT Technology Group Cabling Standards (Copper) 100 MHz 250 MHz 500 MHz 600 MHz 1000 MHz 1200 MHz TIA/EIA TIA/EIA TIA/EIA TIA/EIA TIA/EIA TIA/EIA 568 B.1/2 568 B.2-1 568 B.2-10 568 B.2 568 B.2 568 B.2 Cat. 5e Cat. 6 Cat. 6a Cat. 7 Cat. 7a Cat. 8 ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC ISO/IEC 11801: 11801: 11801: 11801: 11801: 11801: Class D Class E Class EA Class F Class FA Class G CENELEC CENELEC CENELEC CENELEC EN50173-1 EN50173-1 EN50173-1 EN50173-1 Class D Class E Class F Class G IEEE 802.3 IEEE 802.3 IEEE 802.3 100BASE-TX 10GBASE-T 10GBASE-T 1000BASE-T (55m) (100m) © EtherCAT Technology Group Two or Four Pairs? 100BASE-TX 1000BASE-T two pairs: four pairs: • one pair sends • all four pairs send and receive simultaneously • one pair receives • Encoding: PAM-5 – TCM • Encoding: 4B5B – MLT-3 5-level Pulse Amplitude (PAM-5) with Multilevel Transmission Encoding Trellis Coded Modulation (TCM) Tx Rx Rx/ Rx/ Tx Tx Rx/ Rx Tx Rx/ Tx Tx Rx/ Tx Rx Rx/ Tx Tx Rx/ Rx/ Rx Tx Tx Tx © EtherCAT Technology Group IEEE 802.3: Media Access Control CSMA/CD „Carrier-Sense Multiple-Access with Collision-Detection“ – The node that wants to send checks if the media is available „Carrier-Sense“ – All nodes are equal and may send autonomously „Multiple-Access“ – The sender checks after sending if there was a collision „Collision-Detection“ – maximum Ethernet propagation delay: 25,6µs (@10MBit/s) (determined by cable length & repeater delays) Start Transmission Carrier Sense undisturbed Transmission Collision Window © EtherCAT Technology Group Media Access Control CSMA/CD Node A Node B Carrier Signal Propagation Delay Sense Node A Node B Multiple A starts sending Access / Node A Node B Collision B starts sending Detection Node ACollision Node B © EtherCAT Technology Group Ethernet Collision Domain Hub B Hub • Hubs • half duplex • Hub Cascading & Length limited A © EtherCAT Technology Group Switched Ethernet Topology Switch B • Switches Switch • full duplex full duplex communication Switch sends Queues avoid single cast collisions communication only to the destination port A © EtherCAT Technology Group „Store and Forward“ vs. „Cut-Through“ Most Switches use the „Store and Forward“ principle: • Receive entire frame first, check FCS, then forward to destination port. • Advantage: only „healthy“ frames are forwarded. • Disadvantage: large and variable forwarding delay (ca. 10…125 µs, depending on frame length –the buffer delay comes on top) Preamble SFD DA SA LEN DATA Pad FCS Only very few Switches make use of the „Cut-Through“ principle: • Frames are forwarded shortly after receiving the destination address. • Advantage: shorter delay (ca. 5…7 µs) • Disadvantage: corrupted frames are forwarded as well Preamble SFD DA SA LEN DATA Pad FCS © EtherCAT Technology Group Ethernet Packet 7 1 6 6 2 46-1500 0-46 4 Byte Preamble SFD DA SA LEN DATA Pad FCS Length Data „Payload“ Frame Check Sequence (CRC) Sender Address Padding Field Destination Address Start Frame Delimiter „10101011“ Preamble „1010101010.....“ used for Bit Synchronisation • The Length Byte has two meanings: if it is >0x5DC then it describes the type of the „payload“ (Ethertype. e.g. IP 0x0800 or ARP 0x0806 or EtherCAT 0x88A4) • If the data length is <46 Byte, Padding Bytes are introduced to achieve a minimum length of 46 Bytes (for collision detection) © EtherCAT Technology Group Ethernet MAC-ID „Medium Access Control Address“ (MAC-ID) has to be unique • Two Fields of 3 Bytes: – 1. OUI (Organizationally Unique Identifier) – 2. Serial Number • The OUI is assigned by the IEEE Standards Department (USA) • e.g. Beckhoff OUI : 0x00 01 05 http://standards.ieee.org/ develop/regauth/oui/ public.html Result from http://standards.ieee.org/cgi-bin/ouisearch © EtherCAT Technology Group Addressing: MAC-ID, IP Address, Host Name • Structure allows one to exchange protocol layers Host Name Host (DNS/DHCP/ Resolution Name HTTP/FTP) „CX_001387“ TCP-Header (IP-Port) TCP Address 21 (FTP), 80 (HTTP) Resolution IP-Header Internet Protocol (IP) (IP-Address) PROT 169.254.254.88 Ethernet-Header (MAC-ID) Ethernet 08-00 00 01 05 00 13 87 © EtherCAT Technology Group Host Name Resolution: Domain Name Service Working Principle 1. Entry in Cache of the DNS Server? authorative 2.
Recommended publications
  • On IP Networking Over Tactical Links
    On IP Networking over Tactical Links Claude Bilodeau The work described in this document was sponsored by the Department of National Defence under Work Unit 5co. Defence R&D Canada √ Ottawa TECHNICAL REPORT DRDC Ottawa TR 2003-099 Communications Research Centre CRC-RP-2003-008 August 2003 On IP networking over tactical links Claude Bilodeau Communications Research Centre The work described in this document was sponsored by the Department of National Defence under Work Unit 5co. Defence R&D Canada - Ottawa Technical Report DRDC Ottawa TR 2003-099 Communications Research Centre CRC RP-2003-008 August 2003 © Her Majesty the Queen as represented by the Minister of National Defence, 2003 © Sa majesté la reine, représentée par le ministre de la Défense nationale, 2003 Abstract This report presents a cross section or potpourri of the numerous issues that surround the tech- nical development of military IP networking over disadvantaged network links. In the first sec- tion, multi-media services are discussed with regard to three aspects: applications, operational characteristics and service models. The second section focuses on subnetworks and bearers; mainly impairments caused by characteristics of the wireless environment. An overview of the Iris tactical bearers is provided as an example of a tactical IP environment. The last section looks at how IP can integrate these two elements i.e. multi-media services and impaired sub- network links. These three sections are unified by a common theme, quality of service, which runs in the background of the discussions. Résumé Ce rapport présente une coupe transversale ou pot-pourri de questions reliées au développe- ment technique des réseaux militaires IP pour des liaisons défavorisées.
    [Show full text]
  • Freenas® 11.0 User Guide
    FreeNAS® 11.0 User Guide June 2017 Edition FreeNAS® IS © 2011-2017 iXsystems FreeNAS® AND THE FreeNAS® LOGO ARE REGISTERED TRADEMARKS OF iXsystems FreeBSD® IS A REGISTERED TRADEMARK OF THE FreeBSD Foundation WRITTEN BY USERS OF THE FreeNAS® network-attached STORAGE OPERATING system. VERSION 11.0 CopYRIGHT © 2011-2017 iXsystems (https://www.ixsystems.com/) CONTENTS WELCOME....................................................1 TYPOGRAPHIC Conventions...........................................2 1 INTRODUCTION 3 1.1 NeW FeaturES IN 11.0..........................................3 1.2 HarDWARE Recommendations.....................................4 1.2.1 RAM...............................................5 1.2.2 The OperATING System DeVICE.................................5 1.2.3 StorAGE Disks AND ContrOLLERS.................................6 1.2.4 Network INTERFACES.......................................7 1.3 Getting Started WITH ZFS........................................8 2 INSTALLING AND UpgrADING 9 2.1 Getting FreeNAS® ............................................9 2.2 PrEPARING THE Media.......................................... 10 2.2.1 On FreeBSD OR Linux...................................... 10 2.2.2 On WindoWS.......................................... 11 2.2.3 On OS X............................................. 11 2.3 Performing THE INSTALLATION....................................... 12 2.4 INSTALLATION TROUBLESHOOTING...................................... 18 2.5 UpgrADING................................................ 19 2.5.1 Caveats:............................................
    [Show full text]
  • On Ttethernet for Integrated Fault-Tolerant Spacecraft Networks
    On TTEthernet for Integrated Fault-Tolerant Spacecraft Networks Andrew Loveless∗ NASA Johnson Space Center, Houston, TX, 77058 There has recently been a push for adopting integrated modular avionics (IMA) princi- ples in designing spacecraft architectures. This consolidation of multiple vehicle functions to shared computing platforms can significantly reduce spacecraft cost, weight, and de- sign complexity. Ethernet technology is attractive for inclusion in more integrated avionic systems due to its high speed, flexibility, and the availability of inexpensive commercial off-the-shelf (COTS) components. Furthermore, Ethernet can be augmented with a variety of quality of service (QoS) enhancements that enable its use for transmitting critical data. TTEthernet introduces a decentralized clock synchronization paradigm enabling the use of time-triggered Ethernet messaging appropriate for hard real-time applications. TTEther- net can also provide two forms of event-driven communication, therefore accommodating the full spectrum of traffic criticality levels required in IMA architectures. This paper explores the application of TTEthernet technology to future IMA spacecraft architectures as part of the Avionics and Software (A&S) project chartered by NASA's Advanced Ex- ploration Systems (AES) program. Nomenclature A&S = Avionics and Software Project AA2 = Ascent Abort 2 AES = Advanced Exploration Systems Program ANTARES = Advanced NASA Technology Architecture for Exploration Studies API = Application Program Interface ARM = Asteroid Redirect Mission
    [Show full text]
  • Uila Supported Apps
    Uila Supported Applications and Protocols updated Oct 2020 Application/Protocol Name Full Description 01net.com 01net website, a French high-tech news site. 050 plus is a Japanese embedded smartphone application dedicated to 050 plus audio-conferencing. 0zz0.com 0zz0 is an online solution to store, send and share files 10050.net China Railcom group web portal. This protocol plug-in classifies the http traffic to the host 10086.cn. It also 10086.cn classifies the ssl traffic to the Common Name 10086.cn. 104.com Web site dedicated to job research. 1111.com.tw Website dedicated to job research in Taiwan. 114la.com Chinese web portal operated by YLMF Computer Technology Co. Chinese cloud storing system of the 115 website. It is operated by YLMF 115.com Computer Technology Co. 118114.cn Chinese booking and reservation portal. 11st.co.kr Korean shopping website 11st. It is operated by SK Planet Co. 1337x.org Bittorrent tracker search engine 139mail 139mail is a chinese webmail powered by China Mobile. 15min.lt Lithuanian news portal Chinese web portal 163. It is operated by NetEase, a company which 163.com pioneered the development of Internet in China. 17173.com Website distributing Chinese games. 17u.com Chinese online travel booking website. 20 minutes is a free, daily newspaper available in France, Spain and 20minutes Switzerland. This plugin classifies websites. 24h.com.vn Vietnamese news portal 24ora.com Aruban news portal 24sata.hr Croatian news portal 24SevenOffice 24SevenOffice is a web-based Enterprise resource planning (ERP) systems. 24ur.com Slovenian news portal 2ch.net Japanese adult videos web site 2Shared 2shared is an online space for sharing and storage.
    [Show full text]
  • A Reliable Real-Time Transport Protocol for Networked Control
    AReliableReal-TimeTransportProtocolforNetworked Control Systems over Wireless Networks (Research Master) ATHESISSUBMITTEDTO THE SCHOOL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCE OF QUEENSLAND UNIVERSITY OF TECHNOLOGY IN FULFILMENT OF THE REQUIREMENTS FOR THE DEGREE OF MASTER OF INFORMATION TECHNOLOGY (RESEARCH) Xiaohan Shi School of Electrical Engineering and Computer Science Queensland University of Technology December 11, 2012 Copyright in Relation to This Thesis !c Copyright 2012 by Xiaohan Shi. All rights reserved. Statement of Original Authorship The work contained in this thesis has not been previously submitted to meet requirements for an award at this or any other higher education institution. To the best of my knowledge and belief, the thesis contains no material previously published or written by another person except where due reference is made. Signature: QUT Verified Signature Date: i ii To my family iii iv Abstract Deploying wireless networks in networked control systems (NCSs) has become more and more popular during the last few years. As a typical type of real-time control systems, an NCS is sensitive to long and nondeterministic time delay and packetlosses.However,thenatureof the wireless channel has the potential to degrade the performance of NCS networks in many aspects, particularly in time delay and packet losses. Transport layer protocols could play an important role in providing both reliable and fast transmission service to fulfill NCS’s real-time transmission requirements. Unfortunately, none of the existing transport protocols, including the Transport Control Protocol (TCP) and the User Datagram Protocol (UDP), was designed for real-time control applications. Moreover, periodic data and sporadic data are two types of real-time data traffic with different priorities in an NCS.Duetothelackofsupportfor prioritized transmission service, the real-time performance for periodic and sporadic data in an NCS network is often degraded significantly, particularly under congested network conditions.
    [Show full text]
  • Data Center Ethernet 2
    DataData CenterCenter EthernetEthernet Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 [email protected] These slides and audio/video recordings of this class lecture are at: http://www.cse.wustl.edu/~jain/cse570-15/ Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-15/ ©2015 Raj Jain 4-1 OverviewOverview 1. Residential vs. Data Center Ethernet 2. Review of Ethernet Addresses, devices, speeds, algorithms 3. Enhancements to Spanning Tree Protocol 4. Virtual LANs 5. Data Center Bridging Extensions Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-15/ ©2015 Raj Jain 4-2 Quiz:Quiz: TrueTrue oror False?False? Which of the following statements are generally true? T F p p Ethernet is a local area network (Local < 2km) p p Token ring, Token Bus, and CSMA/CD are the three most common LAN access methods. p p Ethernet uses CSMA/CD. p p Ethernet bridges use spanning tree for packet forwarding. p p Ethernet frames are 1518 bytes. p p Ethernet does not provide any delay guarantees. p p Ethernet has no congestion control. p p Ethernet has strict priorities. Washington University in St. Louis http://www.cse.wustl.edu/~jain/cse570-15/ ©2015 Raj Jain 4-3 ResidentialResidential vs.vs. DataData CenterCenter EthernetEthernet Residential Data Center Distance: up to 200m r No limit Scale: Few MAC addresses r Millions of MAC Addresses 4096 VLANs r Millions of VLANs Q-in-Q Protection: Spanning tree r Rapid spanning tree, … (Gives 1s, need 50ms) Path determined by r Traffic engineered path spanning tree Simple service r Service Level Agreement.
    [Show full text]
  • Qos: NBAR Protocol Library, Cisco IOS XE Release 3.8S
    QoS: NBAR Protocol Library, Cisco IOS XE Release 3.8S Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 C O N T E N T S 3COM-AMP3 through AYIYA-IPV6-TUNNELED 34 3COM-AMP3 35 3COM-TSMUX 36 3PC 37 9PFS 38 914C G 39 ACAP 40 ACAS 40 ACCESSBUILDER 41 ACCESSNETWORK 42 ACP 43 ACR-NEMA 44 ACTIVE-DIRECTORY 45 ACTIVESYNC 45 ADOBE-CONNECT 46 AED-512 47 AFPOVERTCP 48 AGENTX 49 ALPES 50 AMINET 50 AN 51 ANET 52 ANSANOTIFY 53 ANSATRADER 54 ANY-HOST-INTERNAL 54 AODV 55 AOL-MESSENGER 56 AOL-MESSENGER-AUDIO 57 AOL-MESSENGER-FT 58 QoS: NBAR Protocol Library, Cisco IOS XE Release 3.8S ii Contents AOL-MESSENGER-VIDEO 58 AOL-PROTOCOL 59 APC-POWERCHUTE 60 APERTUS-LDP 61 APPLEJUICE 62 APPLEQTC 63 APPLEQTCSRVR 63 APPLIX 64 ARCISDMS 65 ARGUS 66 ARIEL1 67 ARIEL2 67 ARIEL3 68 ARIS 69 ARNS 70 ARUBA-PAPI 71 ASA 71 ASA-APPL-PROTO 72 ASIPREGISTRY 73 ASIP-WEBADMIN 74 AS-SERVERMAP 75 AT-3 76 AT-5 76 AT-7 77 AT-8 78 AT-ECHO 79 AT-NBP 80 AT-RTMP 80 AT-ZIS 81 AUDIO-OVER-HTTP 82 AUDIT 83 AUDITD 84 AURORA-CMGR 85 AURP 85 AUTH 86 QoS: NBAR Protocol Library, Cisco IOS XE Release 3.8S iii Contents AVIAN 87 AVOCENT 88 AX25 89 AYIYA-IPV6-TUNNELED 89 BABELGUM through BR-SAT-MON 92 BABELGUM 93 BACNET 93 BAIDU-MOVIE 94 BANYAN-RPC 95 BANYAN-VIP 96 BB 97 BBNRCCMON 98 BDP 98 BFTP 99 BGMP 100 BGP 101 BGS-NSI 102 BHEVENT 103 BHFHS 103 BHMDS 104 BINARY-OVER-HTTP 105 BITTORRENT 106 BL-IDM 107 BLIZWOW 107 BLOGGER 108 BMPP 109 BNA 110 BNET 111 BORLAND-DSJ 112 BR-SAT-MON 112
    [Show full text]
  • Tigersharc DSP Hardware Specification, Revision 1.0.2, Direct Memory Access
    7 DIRECT MEMORY ACCESS Figure 7-0. Table 7-0. Listing 7-0. Overview Direct Memory Access (DMA) is a mechanism for transferring data with- out core being involved. The TigerSHARC® DSP’s on-chip DMA controller relieves the core processor of the burden of moving data between internal memory and an external device, external memory, or between link ports and internal or external memory. The fully-integrated DMA controller allows the TigerSHARC® DSP core processor, or an external device, to specify data transfer operations and return to normal processing while the DMA controller carries out the data transfers in the background. The TigerSHARC® DSP DMA competes with other masters for internal memory access. For more information, see “Architecture and Microarchi- tecture Overview” on page 6-7. This conflict is minimized due to the large internal memory bandwidth that is available. The DMA includes 14 DMA channels, four of which are dedicated to external memory devices, eight to link ports, and two to AutoDMA registers. TigerSHARC DSP Hardware Specification 7 - 1 Overview Figure 7-1 shows a block diagram of the TigerSHARC® DSP’s DMA controller. TRANSMITTER RECEIVER TCB TCB REGISTERS REGISTERS Internal DMA DMA CONTROLLER Bus Requests Interface Figure 7-1. DMA Block Diagram Data Transfers — General Information The DMA controller can perform several types of data transfers: • Internal memory ⇒ external memory and memory-mapped periph- erals • Internal memory ⇒ internal memory of other TigerSHARC® DSPs residing on the cluster bus • Internal memory ⇒ host processor • Internal memory ⇒ link port I/O • External memory ⇒ external peripherals 7 - 2 TigerSHARC DSP Hardware Specification Direct Memory Access • External memory ⇒ internal memory • External memory ⇒ link port I/O • Link port I/O ⇒ internal memory • Link port I/O ⇒ external memory • Cluster bus master via AutoDMA registers ⇒ internal memory Internal-to-internal memory transfers are not directly supported.
    [Show full text]
  • MAC Protocols for IEEE 802.11Ax: Avoiding Collisions on Dense Networks Rafael A
    MAC Protocols for IEEE 802.11ax: Avoiding Collisions on Dense Networks Rafael A. da Silva1 and Michele Nogueira1;2 1Department of Informatics, Federal University of Parana,´ Curitiba, PR, Brazil 2Electrical and Computer Engineering, Carnegie Mellon University, Pittsburgh, PA, USA E-mails: [email protected] and [email protected] Wireless networks have become the main form of Internet access. Statistics show that the global mobile Internet penetration should exceed 70% until 2019. Wi-Fi is an important player in this change. Founded on IEEE 802.11, this technology has a crucial impact in how we share broadband access both in domestic and corporate networks. However, recent works have indicated performance issues in Wi-Fi networks, mainly when they have been deployed without planning and under high user density. Hence, different collision avoidance techniques and Medium Access Control protocols have been designed in order to improve Wi-Fi performance. Analyzing the collision problem, this work strengthens the claims found in the literature about the low Wi-Fi performance under dense scenarios. Then, in particular, this article overviews the MAC protocols used in the IEEE 802.11 standard and discusses solutions to mitigate collisions. Finally, it contributes presenting future trends arXiv:1611.06609v1 [cs.NI] 20 Nov 2016 in MAC protocols. This assists in foreseeing expected improvements for the next generation of Wi-Fi devices. I. INTRODUCTION Statistics show that wireless networks have become the main form of Internet access with an expected global mobile Internet penetration exceeding 70% until 2019 [1]. Wi-Fi Notice: This work has been submitted to the IEEE for possible publication.
    [Show full text]
  • INTERNET-DRAFT M. Ackermann Intended Status: Informational BCBS Michigan N
    INTERNET-DRAFT M. Ackermann Intended Status: Informational BCBS Michigan N. Elkins W. Jouris Inside Products Expires: April 2014 October 3, 2013 Usage of NTP for the PDM DOH IPv6 Extension Header draft-ackermann-tictoc-pdm-ntp-usage-00 Abstract The Performance and Diagnostic Metrics (PDM) Destination Options Header (DOH) for IPv6 defines metrics which are critical for timely end-to-end problem resolution, without impacting an operational production network. These metrics and their derivations can be used for network diagnostics. The base metrics are: packet sequence number and packet timestamp. The timestamp fields require time synchronization at the two end points. This document provides implementation guidelines for implementing Network Time Protocol (NTP) to provide such synchronization. Status of this Memo This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/1id-abstracts.html The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html Ackermann Expires April, 2014 [Page 1] INTERNET DRAFT -ackermann-tictoc-pdm-ntp-usage-00 October 2013 Copyright and License Notice Copyright (c) 2013 IETF Trust and the persons identified as the document authors.
    [Show full text]
  • Migrating Backoff to the Frequency Domain
    No Time to Countdown: Migrating Backoff to the Frequency Domain Souvik Sen Romit Roy Choudhury Srihari Nelakuditi Duke University Duke University University of South Carolina Durham, NC, USA Durham, NC, USA Columbia, SC, USA [email protected] [email protected] [email protected] ABSTRACT 1. INTRODUCTION Conventional WiFi networks perform channel contention in Access control strategies are designed to arbitrate how mul- time domain. This is known to be wasteful because the chan- tiple entities access a shared resource. Several distributed nel is forced to remain idle while all contending nodes are protocols embrace randomization to achieve arbitration. In backing off for multiple time slots. This paper proposes to WiFi networks, for example, each participating node picks a break away from convention and recreate the backing off op- random number from a specified range and begins counting eration in the frequency domain. Our basic idea leverages the down. The node that finishes first, say N1, wins channel con- observation that OFDM subcarriers can be treated as integer tention and begins transmission. The other nodes freeze their numbers. Thus, instead of picking a random backoff duration countdown temporarily, and revive it only after N1’s trans- in time, a contending node can signal on a randomly cho- mission is complete. Since every node counts down at the sen subcarrier. By employing a second antenna to listen to same pace, this scheme produces an implicit ordering among all the subcarriers, each node can determine whether its cho- nodes. Put differently, the node that picks the smallest ran- sen integer (or subcarrier) is the smallest among all others.
    [Show full text]
  • Collision Detection
    Computer Networking Michaelmas/Lent Term M/W/F 11:00-12:00 LT1 in Gates Building Slide Set 3 Evangelia Kalyvianaki [email protected] 2017-2018 1 Topic 3: The Data Link Layer Our goals: • understand principles behind data link layer services: (these are methods & mechanisms in your networking toolbox) – error detection, correction – sharing a broadcast channel: multiple access – link layer addressing – reliable data transfer, flow control • instantiation and implementation of various link layer technologies – Wired Ethernet (aka 802.3) – Wireless Ethernet (aka 802.11 WiFi) • Algorithms – Binary Exponential Backoff – Spanning Tree 2 Link Layer: Introduction Some terminology: • hosts and routers are nodes • communication channels that connect adjacent nodes along communication path are links – wired links – wireless links – LANs • layer-2 packet is a frame, encapsulates datagram data-link layer has responsibility of transferring datagram from one node to adjacent node over a link 3 Link Layer (Channel) Services • framing, physical addressing: – encapsulate datagram into frame, adding header, trailer – channel access if shared medium – “MAC” addresses used in frame headers to identify source, dest • different from IP address! • reliable delivery between adjacent nodes – we see some of this again in the Transport Topic – seldom used on low bit-error link (fiber, some twisted pair) – wireless links: high error rates 4 Link Layer (Channel) Services - 2 • flow control: – pacing between adjacent sending and receiving nodes • error control: – error
    [Show full text]