IE200 Series Data Sheet

Total Page:16

File Type:pdf, Size:1020Kb

IE200 Series Data Sheet Industrial Switches | Product Information IE200 Series Industrial Ethernet Layer 2 Switches Our ruggedized IE200 Industrial Ethernet switches provide enduring performance in harsh environments, such as those found in manufacturing, transportation and physical security. Offering high throughput, rich functionality and advanced security features, IE200 switches deliver the performance and reliability demanded by industrial deployments in the age of the Internet of Things (IoT). Overview Gigabit and fast Ethernet support The IE200 Series wirespeed The IE200 Series SFP ports support Key Features Layer 2 switches are ideal for industrial both gigabit and Fast Ethernet Small Ethernet applications. With a wide Form-Factor Pluggables (SFPs). This operating temperature range of makes the IE200 Series ideal for AlliedWare Plus™ functionalities ۼ between -40°C and 75°C, they tolerate environments where gigabit fiber Allied Telesis Autonomous ۼ .harsh and demanding environments, switches will be phased in over time such as those found in industrial and This allows for connectivity to the Management Framework™ outdoor deployment. legacy 100FX hardware until it is (AMF) node upgraded to gigabit Ethernet. Industry-leading QoS ۼ Device management is provided (Active Fiber Monitoring (AFM ۼ via an Industry-standard CLI, Support for both speeds of SFPs allows SNMP, Telnet, SSH, and the Allied organizations to stay within budget as Ethernet Protection Switched Ring ۼ .Telesis Autonomous Management they migrate to faster technologies Framework™ (AMF). AMF is unique to (EPSRing™) Ethernet Ring Protection Switching ۼ Allied Telesis managed devices, offering High network resiliency simplified device provisioning, recovery, The IE200 Series supports highly stable (ITU-T G.8032) and firmware upgrade management. and reliable network switching with a (IEEE 802.3at PoE+ sourcing (30W ۼ .recovery time of less than 50ms Continuous PoE ۼ Performance You can customize the IE200 with the These high-performing, cost- most appropriate mechanism and Enhanced Thermal Shutdown ۼ effective switches meet the stringent protocol to prevent network connection Dual power inputs with voltage boost ۼ requirements of today’s industrial failure. Choices include Allied Telesis networks. The robust IE200 series Ethernet Protection Switched Ring converter provides network managers with (EPSRing™), and the standard Alarm input/output ۼ .several key features—including port- ITU-T G.8032 USB port for image/configuration ۼ ,based VLANs, IEEE 802.1p, QoS port trunking/link aggregation, port Dual power inputs backup, restore, and upgrade mirroring, priority queues, and IEEE The IE200 Series provides redundant Web-based GUI for easy management ۼ 802.1x security support. power inputs for higher system reliability; the power inputs are With support for up to 2K MAC protected against reverse polarity and addresses, the IE200 Series is the ideal over-current. option for integrating management into any network solution. The integrated voltage regulator allows a wide input voltage range and ensures Securing the network edge the PoE output voltage always stays relationship between the power the real Ensuring data protection means at the rated value, regardless the capabilities of the external Power controlling network access. Protocols fluctuation on input voltage. Supply Unit (PSU).* such as IEEE 802.1X port-based authentication guarantee that only Configurable power budget known users are connected to On the IE200-6FP and IE200-6GP, you the network. Unknown users who can configure both the overall power * Power supply must be compliant with local/national safety physically connect can be segregated budget and the power feeding limit on and electrical code requirements. Select the supply with into a pre-determined part of the a per-port basis, to establish a close the most appropriated output power derating curve. network. This offers network guests Internet access, while ensuring the integrity of private network data. 617-000512 RevZB IE200 Series | Industrial Ethernet, Layer 2 Switches Key Features Allied Telesis Autonomous Link Layer Discovery Protocol – 25.50W available to the powered device Management FrameworkTM (AMF) Media Endpoint Discovery (IEEE802.3at Type 2). Practical use is to AMF is a sophisticated suite of management tools (LLDP – MED) support PTZ cameras with heater/blowers for ۼ ,LLDP-MED extends LLDP basic network endpoint outdoor application, enhanced infrared lighting ۼ that provide a simplified approach to network management. Common tasks are automated or discovery and management functions. LLDP-MED lighting controller and LED lighting fixtures, made so simple that the every-day running of a allows for media endpoint specific messages, remote Point of Sale (POS) kiosks, network network can be achieved without the need for providing detailed information on power switches, and many other devices. IE200 allows the configuration of the overall ۼ highly-trained, and expensive, network engineers. equipment, network policy, location discovery (for Powerful features like centralized management, Emergency Call Services) and inventory. power budget as well as the power feeding limit auto-backup, auto-upgrade, auto-provisioning on a per-port basis. This establishes a close and auto-recovery enable plug-and-play Voice VLAN relationship between the power sourcing feature networking and zero-touch management. and the real capabilities of the external PSU. Voice VLAN automatically separates voice ۼ AMF secure mode encrypts all AMF traffic, and data traffic into two different VLANs. This ۼ provides unit and user authorization, and automatic separation places delay-sensitive traffic Continuous PoE ,Enabling the unique Continuous PoE feature ۼ monitors network access to greatly enhance into a voice-dedicated VLAN, which simplifies network security. QoS configurations. the switch retains PoE sourcing during restart events, such as those due to operator High Availability Security (Tri-Authentication) command, software exception, watchdog timeout or diagnostic failures. Authentication options on the IE200 Series also ۼ EPSRing™ and ITU-T G.8032 enable a protected ۼ The restart event is not propagated to the end ۼ ring capable of recovery within as little as 50ms. include alternatives to IEEE 802.1X port-based These features are perfect for high performance authentication, such as web authentication to devices, and camera operation is not affected. and high availability. enable guest access, and MAC authentication Spanning Tree Protocol-compatible, RSTP; MSTP; for endpoints that do not have an IEEE 802.1X Alarm Input/Output ۼ Alarm Input/Output are useful for security ۼ —static Link Aggregation Group (LAG), and dynamic supplicant. All three authentication methods Link Aggregation Control Protocol (LACP) support. IEEE 802.1X, MAC-based and Web-based—can integration solution. They respond to events be enabled simultaneously on the same port for instantly and automatically using a pre-defined Industry-leading Quality of Service tri-authentication. event scheme, and send alert messages to the (QoS) monitoring control center. The two-pin terminal Access Control Lists (ACLs) Comprehensive low-latency wirespeed QoS blocks may be connected to sensors and ۼ AlliedWare Plus delivers industry-standard access actuator relays. Alarm Input receives signals ۼ provides flow-based traffic management with full classification, prioritization, traffic shaping control functionality through ACLs. ACLs filter from external devices, like motion sensors or and min/max bandwidth profiles. Enjoy boosted network traffic to control whether routed packets magnets, and these will trigger subsequent network performance and guaranteed delivery are forwarded or blocked at the port interface. actions if something changes. Alarm output of business-critical Ethernet services and This provides a powerful network security controls external devices in the case of an event applications. Time-critical services such as voice mechanism to select the types of traffic to be for example sirens, strobes, and Pan-Tilt-Zoom and video take precedence over non-essential analyzed, forwarded, or influenced in some way. (PTZ) cameras. services such as file downloads, maintaining responsiveness of your applications. Dynamic Host Configuration Protocol Enhanced Thermal Shutdown The Enhanced Thermal Shutdown feature acts ۼ DHCP) Snooping) DHCP servers allocate IP addresses to clients, when the switch exceeds the safe operating ۼ Active Fiber Monitoring Active Fiber Monitoring prevents eavesdropping and the switch keeps a record of addresses temperature. It functions in a set of stages to ۼ on fiber communications by monitoring received issued on each port. IP source guard checks preserve services and prevent damage. If the operating temperature reaches critical ۼ optical power. If an intrusion is detected, the link against this DHCP snooping database to ensure can be automatically shut down, or an operator only clients with specific IP and/or MAC address levels, the system cuts the PoE sourcing to alert can be sent. can access the network. DHCP Snooping can non-critical interfaces first, then to critical be combined with other features, like dynamic interfaces. If the temperature continues to rise, UniDirectional Link Detection (UDLD) ARP inspection, to increase security in Layer all services are disabled and the system enters 2 switched environments. It also provides a UDLD is useful for monitoring fiber-optic links standby mode. The system
Recommended publications
  • Logical Link Control and Channel Scheduling for Multichannel Underwater Sensor Networks
    ICST Transactions on Mobile Communications and Applications Research Article Logical Link Control and Channel Scheduling for Multichannel Underwater Sensor Networks Jun Li ∗, Mylene` Toulgoat, Yifeng Zhou, and Louise Lamont Communications Research Centre Canada, 3701 Carling Avenue, Ottawa, ON. K2H 8S2 Canada Abstract With recent developments in terrestrial wireless networks and advances in acoustic communications, multichannel technologies have been proposed to be used in underwater networks to increase data transmission rate over bandwidth-limited underwater channels. Due to high bit error rates in underwater networks, an efficient error control technique is critical in the logical link control (LLC) sublayer to establish reliable data communications over intrinsically unreliable underwater channels. In this paper, we propose a novel protocol stack architecture featuring cross-layer design of LLC sublayer and more efficient packet- to-channel scheduling for multichannel underwater sensor networks. In the proposed stack architecture, a selective-repeat automatic repeat request (SR-ARQ) based error control protocol is combined with a dynamic channel scheduling policy at the LLC sublayer. The dynamic channel scheduling policy uses the channel state information provided via cross-layer design. It is demonstrated that the proposed protocol stack architecture leads to more efficient transmission of multiple packets over parallel channels. Simulation studies are conducted to evaluate the packet delay performance of the proposed cross-layer protocol stack architecture with two different scheduling policies: the proposed dynamic channel scheduling and a static channel scheduling. Simulation results show that the dynamic channel scheduling used in the cross-layer protocol stack outperforms the static channel scheduling. It is observed that, when the dynamic channel scheduling is used, the number of parallel channels has only an insignificant impact on the average packet delay.
    [Show full text]
  • Medium Access Control Layer
    Telematics Chapter 5: Medium Access Control Sublayer User Server watching with video Beispielbildvideo clip clips Application Layer Application Layer Presentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller Data Link Layer Data Link Layer Data Link Layer Computer Systems and Telematics (CST) Physical Layer Physical Layer Physical Layer Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Metropolitan Area Networks ● Network Topologies (MAN) ● The Channel Allocation Problem ● Wide Area Networks (WAN) ● Multiple Access Protocols ● Frame Relay (historical) ● Ethernet ● ATM ● IEEE 802.2 – Logical Link Control ● SDH ● Token Bus (historical) ● Network Infrastructure ● Token Ring (historical) ● Virtual LANs ● Fiber Distributed Data Interface ● Structured Cabling Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.2 Design Issues Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.3 Design Issues ● Two kinds of connections in networks ● Point-to-point connections OSI Reference Model ● Broadcast (Multi-access channel, Application Layer Random access channel) Presentation Layer ● In a network with broadcast Session Layer connections ● Who gets the channel? Transport Layer Network Layer ● Protocols used to determine who gets next access to the channel Data Link Layer ● Medium Access Control (MAC) sublayer Physical Layer Univ.-Prof. Dr.-Ing. Jochen H. Schiller ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 5: Medium Access Control Sublayer 5.4 Network Types for the Local Range ● LLC layer: uniform interface and same frame format to upper layers ● MAC layer: defines medium access ..
    [Show full text]
  • GS970M Datasheet
    Switches | Product Information CentreCOM® GS970M Series Managed Gigabit Ethernet Switches The Allied Telesis CentreCOM GS970M Series of Layer 3 Gigabit switches offer an impressive set of features in a compact design, making them ideal for applications at the network edge. STP root guard ۼۼ Overview Management (UniDirectional Link Detection (UDLD ۼۼ Allied Telesis Autonomous Management ۼۼ Allied Telesis CentreCOM GS970M Series switches provide an excellent Framework™ (AMF) enables powerful centralized management and zerotouch device installation and Security Features access solution for today’s networks, recovery Access Control Lists (ACLs) based on Layer 2, 3 ۼۼ supporting Gigabit to the desktop for Console management port on the front panel for and 4 headers ۼۼ maximum performance. The Power ease of access Configurable auth-fail and guest VLANs ۼۼ Eco-friendly mode allows ports and LEDs to be ۼۼ over Ethernet Plus (PoE+) models Authentication, Authorization, and Accounting ۼۼ provide an ideal solution for connecting disabled to save power (AAA) Industry-standard CLI with context-sensitive help ۼ and remotely powering wireless access ۼ ۼ Bootloader can be password protected for device ۼ ,points, IP video surveillance cameras Powerful CLI scripting engine security ۼۼ ۼ and IP phones. The GS970M models BPDU protection ۼۼ -Comprehensive SNMP MIB support for standards ۼ feature 8, 16 or 24 Gigabit ports, based device management ۼ DHCP snooping, IP source guard and Dynamic ARP ۼ and 2 or 4 SFP uplinks, for secure (Built-in text editor Inspection
    [Show full text]
  • Communications Programming Concepts
    AIX Version 7.1 Communications Programming Concepts IBM Note Before using this information and the product it supports, read the information in “Notices” on page 323 . This edition applies to AIX Version 7.1 and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2010, 2014. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents About this document............................................................................................vii How to use this document..........................................................................................................................vii Highlighting.................................................................................................................................................vii Case-sensitivity in AIX................................................................................................................................vii ISO 9000.....................................................................................................................................................vii Communication Programming Concepts................................................................. 1 Data Link Control..........................................................................................................................................1 Generic Data Link Control Environment Overview...............................................................................
    [Show full text]
  • Tutorial on Network Communications and Security
    Lecture Notes Introduction to Digital Networks and Security Raj Bridgelall, PhD © Raj Bridgelall, PhD (North Dakota State University, College of Business) Page 1/23 Table of Contents PART I – NETWORKING CONCEPTS.....................................................................................4 1 INTRODUCTION..................................................................................................................4 2 DATA COMMUNICATIONS ..............................................................................................4 2.1 THE OSI MODEL ...............................................................................................................4 2.2 NETWORKING DEVICES .....................................................................................................5 2.3 TCP/IP ..............................................................................................................................6 3 MOBILE IP ............................................................................................................................7 3.1 FIREWALLS........................................................................................................................9 3.2 DHCP AND DNS ..............................................................................................................9 3.3 IPV6 ................................................................................................................................10 PART II – CRYPTOGRAPHY AND NETWORK SECURITY .............................................12
    [Show full text]
  • 1.2. OSI Model
    1.2. OSI Model The OSI model classifies and organizes the tasks that hosts perform to prepare data for transport across the network. You should be familiar with the OSI model because it is the most widely used method for understanding and talking about network communications. However, remember that it is only a theoretical model that defines standards for programmers and network administrators, not a model of actual physical layers. Using the OSI model to discuss networking concepts has the following advantages: Provides a common language or reference point between network professionals Divides networking tasks into logical layers for easier comprehension Allows specialization of features at different levels Aids in troubleshooting Promotes standards interoperability between networks and devices Provides modularity in networking features (developers can change features without changing the entire approach) However, you must remember the following limitations of the OSI model: OSI layers are theoretical and do not actually perform real functions. Industry implementations rarely have a layer‐to‐layer correspondence with the OSI layers. Different protocols within the stack perform different functions that help send or receive the overall message. A particular protocol implementation may not represent every OSI layer (or may spread across multiple layers). To help remember the layer names of the OSI model, try the following mnemonic devices: Mnemonic Mnemonic Layer Name (Bottom to top) (Top to bottom) Layer 7 Application Away All Layer 6 Presentation Pizza People Layer 5 Session Sausage Seem Layer 4 Transport Throw To Layer 3 Network Not Need Layer 2 Data Link Do Data Layer 1 Physical Please Processing Have some fun and come up with your own mnemonic for the OSI model, but stick to just one so you don't get confused.
    [Show full text]
  • High-Level Data Link Control
    ELEC3030 (EL336) Computer Networks S Chen High-Level Data Link Control • This class of data link layer protocols includes High-level Data Link Control (HDLC), Link Access Procedure Balanced (LAPB) for X.25, Link Access Procedure for D-channel (LAPD) for ISDN, and Logic Link Control (LLC) for FDDI • The frame format is: Flag Address Control Data FCS Flag Note that address and control bits 8 8 8 variable 16 8 can be extended to 16 bits, so bit position 12 3 4 5 6 7 8 N(S)=send sequence number N(R)=receive sequence number that sequence number is 7-bit Information: 0 N(S) P/F N(R) S=supervisory function bits P/F • Frame flag: 01111110, so bit Supervisory: 1 0 S N(R) M=unumbered function bits stuffing is used Unumbered: 1 1 M P/F M P/F=poll/final bit • Address: For multipoint operation, it is used to identify the terminal that transmits or receives the frame and, in point-to-point link, it is used to distinguish Commands from Responses (2nd bit for C/R: 0/1). The address is now extended to 16 bits (1st bit indicates long/short 16/8 bits) • Checksum: FCS contains the remainder of a 16-bit CRC calculation of the frame. It may be extended to 32 bits, using a 32-bit CRC • Control: Three types of frames, I, S and U frames. The old protocol uses a sliding window with 3-bit sequence number and the maximum window size is N = 7. The control field is now extended to 16 bits with 7-bit sequence number 60 ELEC3030 (EL336) Computer Networks S Chen HDLC (continue) • I-frames: carry user data.
    [Show full text]
  • Etsi En 301 192 V1.7.1 (2021-08)
    ETSI EN 301 192 V1.7.1 (2021-08) EUROPEAN STANDARD Digital Video Broadcasting (DVB); DVB specification for data broadcasting 2 ETSI EN 301 192 V1.7.1 (2021-08) Reference REN/JTC-DVB-367 Keywords broadcasting, data, digital, DVB, MPEG, video ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - APE 7112B Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° w061004871 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI deliverable is the one made publicly available in PDF format at www.etsi.org/deliver. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Notice of disclaimer & limitation of liability The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of experience to understand and interpret its content in accordance with generally accepted engineering or other professional standard and applicable regulations.
    [Show full text]
  • Chapter 3: Datalink Layer
    Chapter 3: Data Link Layer Raj Jain Professor of CIS The Ohio State University Columbus, OH 43210 [email protected] http://www.cis.ohio-state.edu/~jain/ The Ohio State University Raj Jain 1 Overview ❑ Datalink layer design issues ❑ Error detection and correction ❑ Simple datalink protocols ❑ Sliding window protocols ❑ Example datalink protocols The Ohio State University Raj Jain 2 1 Data Link Layer Design Issues ❑ Services provided to the Network Layer ❑ Framing ❑ Error Control ❑ Flow Control The Ohio State University Raj Jain 3 Datalink Layer Services ❑ Unacknowledged connectionless service ❑ No acks, no connection ❑ Error recovery up to higher layers ❑ For low error-rate links or voice traffic ❑ Acknowledged connectionless service ❑ Acks improve reliability ❑ For unreliable channels. E.g.: Wireless Systems The Ohio State University Raj Jain 4 2 Datalink Services (Cont) ❑ Acknowledged connection-oriented service ❑ Equivalent of reliable bit-stream ❑ Connection establishment ❑ Packets Delivered In-Order ❑ Connection Release ❑ Inter-Router Traffic The Ohio State University Raj Jain 5 Framing ❑ Framing = How to break a bit-stream into frames ❑ Need for framing: Error Detection/Control work on chunks and not on bit streams of data ❑ Framing methods: ❑ Timing : risky. No network guarantees. ❑ Character count: may be garbled by errors ❑ Character stuffing: Delimit frame with special characters ❑ Bit stuffing: delimit frame with bit pattern ❑ Physical layer coding violations The Ohio State University Raj Jain 6 3 Character Stuffing ❑
    [Show full text]
  • Chapter 6: Medium Access Control Layer
    Chapter 6: Medium Access Control Layer Chapter 6: Roadmap " Overview! " Wireless MAC protocols! " Carrier Sense Multiple Access! " Multiple Access with Collision Avoidance (MACA) and MACAW! " MACA By Invitation! " IEEE 802.11! " IEEE 802.15.4 and ZigBee! " Characteristics of MAC Protocols in Sensor Networks! " Energy Efficiency! " Scalability! " Adaptability! " Low Latency and Predictability! " Reliability! " Contention-Free MAC Protocols! " Contention-Based MAC Protocols! " Hybrid MAC Protocols! Fundamentals of Wireless Sensor Networks: Theory and Practice Waltenegus Dargie and Christian Poellabauer © 2010 John Wiley & Sons Ltd. 2! Medium Access Control " In most networks, multiple nodes share a communication medium for transmitting their data packets! " The medium access control (MAC) protocol is primarily responsible for regulating access to the shared medium! " The choice of MAC protocol has a direct bearing on the reliability and efficiency of network transmissions! " due to errors and interferences in wireless communications and to other challenges! " Energy efficiency also affects the design of the MAC protocol! " trade energy efficiency for increased latency or a reduction in throughput or fairness! Fundamentals of Wireless Sensor Networks: Theory and Practice Waltenegus Dargie and Christian Poellabauer © 2010 John Wiley & Sons Ltd. 3! 1! Overview " Responsibilities of MAC layer include:! " decide when a node accesses a shared medium! " resolve any potential conflicts between competing nodes! " correct communication errors occurring at the physical layer! " perform other activities such as framing, addressing, and flow control! " Second layer of the OSI reference model (data link layer) or the IEEE 802 reference model (which divides data link layer into logical link control and medium access control layer)! Fundamentals of Wireless Sensor Networks: Theory and Practice Waltenegus Dargie and Christian Poellabauer © 2010 John Wiley & Sons Ltd.
    [Show full text]
  • Etsi Ts 144 064 V15.0.0 (2018-07)
    ETSI TS 144 064 V15.0.0 (2018-07) TECHNICAL SPECIFICATION Digital cellular telecommunications system (Phase 2+) (GSM); Mobile Station - Serving GPRS Support Node (MS-SGSN); Logical Link Control (LLC) Layer Specification (3GPP TS 44.064 version 15.0.0 Release 15) R GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS 3GPP TS 44.064 version 15.0.0 Release 15 1 ETSI TS 144 064 V15.0.0 (2018-07) Reference RTS/TSGC-0144064vf00 Keywords GSM ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N° 348 623 562 00017 - NAF 742 C Association à but non lucratif enregistrée à la Sous-Préfecture de Grasse (06) N° 7803/88 Important notice The present document can be downloaded from: http://www.etsi.org/standards-search The present document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https://portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI.
    [Show full text]
  • Telematics Chapter 4: Data Link Layer
    User Server Telematics watching with video video clip clips Chapter 4: Data Link Layer Application Layer Application Layer BeispielbildPresentation Layer Presentation Layer Session Layer Session Layer Transport Layer Transport Layer Network Layer Network Layer Network Layer Data Link Layer Data Link Layer Data Link Layer Physical Layer Physical Layer Physical Layer Prof. Dr. Mesut Güneş Computer Systems and Telematics (CST) Distributed, embedded Systems Institute of Computer Science Freie Universität Berlin http://cst.mi.fu-berlin.de Contents ● Design Issues ● Error Detection and Correction ● Elementary Data Link Protocols ● Sliding Window Protocols ● High Level Data Link Control (HDLC) ● Point-to-Point Protocol (PPP) ● Protocol Verification Prof. Dr. Mesut Güneş ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 4: Data Link Layer 4.2 Design Issues Prof. Dr. Mesut Güneş ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 4: Data Link Layer 4.3 Design Issues ● The data link layer has a number of spp,ecific functions, for this it OSI Reference Model ● provides a well-defined service Application Layer interface to the network layer ● deals with transmission errors Presentation Layer ● regulates the flow of data Session Layer ● access to the medium ● prevent a slow receiver being not Transport Layer swamped by a fast sender Network Layer Data Link Layer Phy sical Laye r Prof. Dr. Mesut Güneş ▪ cst.mi.fu-berlin.de ▪ Telematics ▪ Chapter 4: Data Link Layer 4.4 Layer 2: Division into two Parts Logical Link Control (LLC) (Layer 2b) − Organization of the data to be sent into frames − Guarantee (if possible) an error free transmission between neighboring nodes through: • Detection (and recovery) of transfer errors • Flow Control (avoidance of overloading the receiver) • Buffer Management Medium Access Control (MAC) (Layer 2a) − Control of the access to the communication channel in broadcast networks - LLC IEEE 802.2 Logical Link Control ..
    [Show full text]