Unit 1 Token Passing, Csma/Cd and Tcp/Ip Protocol

Total Page:16

File Type:pdf, Size:1020Kb

Unit 1 Token Passing, Csma/Cd and Tcp/Ip Protocol SNS COLLEGE OF TECHNOLOGY (Autonomous ) COIMBATORE-35 UNIT 1 TOKEN PASSING, CSMA/CD AND TCP/IP PROTOCOL BY SHANGKAVI G, AP/EIE TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 1/21 PROTOCOL TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 2/21 PROTOCOL TOKEN PASSING • On a local area network, token passing is a channel access method where a signal called a token is passed between nodes to authorize that node to communicate. In contrast to polling access methods, there is no pre-defined "master" node. • The most well-known examples are token ring and ARCNET, but there were a range of others, including FDDI (Fiber Distributed Data Interface), which was popular in the early to mid 1990s. TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 3/21 PROTOCOL • Token passing schemes degrade deterministically under load, which is a key reason why they were popular for industrial control LANs such as MAP, (Manufacturing Automation Protocol). • The advantage over contention based channel access (such as the CSMA/CD of early Ethernet), is that collisions are eliminated, and that the channel bandwidth can be fully utilized without idle time when demand is heavy. • The disadvantage is that even when demand is light, a station wishing to transmit must wait for the token, increasing latency. TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 4/21 PROTOCOL • Some types of token passing schemes do not need to explicitly send a token between systems because the process of "passing the token" is implicit. • An example is the channel access method used during "Contention Free Time Slots" in the ITU-T G.hn standard for high-speed local area networking using existing home wires (power lines, phone lines and coaxial cable). TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 5/21 PROTOCOL CSMA/CD • Carrier-sense multiple access with collision detection • Carrier-sense multiple access with collision detection (CSMA/CD) is a media access control method used most notably in early Ethernet technology for local area networking. It uses carrier-sensing to defer transmissions until no other stations are transmitting. TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 6/21 PROTOCOL • This is used in combination with collision detection in which a transmitting station detects collisions by sensing transmissions from other stations while it is transmitting a frame. • When this collision condition is detected, the station stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame. TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 7/21 PROTOCOL • CSMA/CD is a modification of pure carrier- sense multiple access (CSMA). CSMA/CD is used to improve CSMA performance by terminating transmission as soon as a collision is detected, thus shortening the time required before a retry can be attempted. TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 8/21 PROTOCOL TCP/IP (Transmission Control Protocol/Internet Protocol) • TCP/IP, or the Transmission Control Protocol/Internet Protocol, is a suite of communication protocols used to interconnect network devices on the internet. • TCP/IP can also be used as a communications protocol in a private network (an intranet or an extranet). TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 9/21 PROTOCOL • The entire internet protocol suite -- a set of rules and procedures -- is commonly referred to as TCP/IP, though others are included in the suite. • TCP/IP specifies how data is exchanged over the internet by providing end-to-end communications that identify how it should be broken into packets, addressed, transmitted, routed and received at the destination. • TCP/IP requires little central management, and it is designed to make networks reliable, with the ability to recover automatically from the failure of any device on the network. TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 10/21 PROTOCOL • The two main protocols in the internet protocol suite serve specific functions. TCP defines how applications can create channels of communication across a network. • It also manages how a message is assembled into smaller packets before they are then transmitted over the internet and reassembled in the right order at the destination address. TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 11/21 PROTOCOL • IP defines how to address and route each packet to make sure it reaches the right destination. • Each gateway computer on the network checks this IP address to determine where to forward the message. TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 12/21 PROTOCOL • The history of TCP/IP • The Defense Advanced Research Projects Agency (DARPA), the research branch of the U.S. Department of Defense, created the TCP/IP model in the 1970s for use in ARPANET, a wide area network that preceded the internet. • TCP/IP was originally designed for the Unix operating system, and it has been built into all of the operating systems that came after it. • The TCP/IP model and its related protocols are now maintained by the Internet Engineering Task Force. TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 13/21 PROTOCOL How TCP/IP works • TCP/IP uses the client/server model of communication in which a user or machine (a client) is provided a service (like sending a webpage) by another computer (a server) in the network. • Collectively, the TCP/IP suite of protocols is classified as stateless, which means each client request is considered new because it is unrelated to previous requests. Being stateless frees up network paths so they can be used continuously. TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 14/21 PROTOCOL • The transport layer itself, however, is stateful. It transmits a single message, and its connection remains in place until all the packets in a message have been received and reassembled at the destination. TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 15/21 PROTOCOL TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 16/21 PROTOCOL • The TCP/IP model differs slightly from the seven- layer Open Systems Interconnection (OSI) networking model designed after it, which defines how applications can communicate over a network. • TCP/IP model layers • TCP/IP functionality is divided into four layers, each of which include specific protocols. TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 17/21 PROTOCOL • The application layer provides applications with standardized data exchange. Its protocols include the Hypertext Transfer Protocol (HTTP), File Transfer Protocol (FTP), Post Office Protocol 3 (POP3), Simple Mail Transfer Protocol (SMTP) and Simple Network Management Protocol (SNMP). • The transport layer is responsible for maintaining end-to-end communications across the network. TCP handles communications between hosts and provides flow control, multiplexing and reliability. The transport protocols include TCP and User Datagram Protocol (UDP), which is sometimes used instead of TCP for special purposes. TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 18/21 PROTOCOL • The network layer, also called the internet layer, deals with packets and connects independent networks to transport the packets across network boundaries. The network layer protocols are the IP and the Internet Control Message Protocol (ICMP), which is used for error reporting. • The physical layer consists of protocols that operate only on a link -- the network component that interconnects nodes or hosts in the network. The protocols in this layer include Ethernet for local area networks (LANs) and the Address Resolution Protocol (ARP). TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 19/21 PROTOCOL Advantages of TCP/IP • TCP/IP is nonproprietary and, as a result, is not controlled by any single company. Therefore, the internet protocol suite can be modified easily. • It is compatible with all operating systems, so it can communicate with any other system. The internet protocol suite is also compatible with all types of computer hardware and networks. • TCP/IP is highly scalable and, as a routable protocol, can determine the most efficient path through the network. TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 20/21 PROTOCOL THANK YOU TOKEN PASSING, CSMA/CD AND TCP/IP 1/29/2019 21/21 PROTOCOL.
Recommended publications
  • A Simulation Analysis of Bacnet Local Area Networks
    NISTIR 7038 A Simulation Analysis of BACnet Local Area Networks Wong Seok Song Seung Ho Hong Steven T. Bushby NISTIR 7038 A Simulation Analysis of BACnet Local Area Networks Wong Seok Song Seung Ho Hong School of Electrical and Computer Engineering Hanyang University Ansan, Korea Steven T. Bushby Building and Fire Research Laboratory Gaithersburg, MD 20899 October 2003 U.S. DEPARTMENT OF COMMERCE Donald L. Evans, Secretary TECHNOLOGY ADMINISTRATION Phillip J. Bond, Under Secretary of Commerce for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arden L. Bement, Jr., Director Abstract BACnet is a standard data communication protocol for building automation and control systems. BACnet defines an object-based model of the information that is exchanged between components of the building automation system and an application layer protocol that is used to access and manipulate this information. It also provides a way to convey the information across a variety of local and wide-area networks that may be interconnected to form an internetwork. In this study, the performance of three BACnet local area networking options is investigated using simulation models developed using ARENA, a tool for simulating discrete event dynamic systems. This study evaluates the delay characteristics of Master-Slave/Token-Passing (MS/TP), Attached Resource Computer Network (ARCNET), and ISO-8802-3 (Ethernet) networks being used to deliver BACnet application services. Analysis of the simulation results was used to identify the network parameters that influence the performance of BACnet application services and to develop recommendations that should be considered when designing and operating BACnet systems. Key words: ANSI/ASHRAE Standard 135; BACnet; building automation and control; communication protocol; direct digital control; energy management systems; ARENA; discrete event dynamic systems Table of Contents 1 Introduction............................................................................................................................
    [Show full text]
  • Network Systems Technician (NST) Competency Requirements
    Network Systems Technician (NST) Competency Requirements This Competency listing serves to identify the major knowledge, skills, and standards areas which the Network Systems Technician needs in order to perform the professional networking concepts and practices required for modern wired and wireless information technology. Network Systems Technicians must be knowledgeable in the following technical areas: 1.0 Network Terminology 1.1 Define the functions of a computer network 1.2 Identify network types and terminology associated with: 1.2.1 Local Area Networks (LANs) 1.2.2 Virtual Local Area Networks (VLANs) to include: 1.2.2.1 Virtual Private Networks (VPN) 1.2.3 Wide Area Networks (WANs) to include: 1.2.3.1 Value Added Networks (VANs) and VPNs 1.2.3.2 Metropolitan Area Networks (MANs) 1.3 Describe the fundamental terms and nomenclature for network topologies to include: 1.3.1 Point-to-Point 1.3.2 Bus 1.3.3 Ring 1.3.4 Star 1.3.5 Hybrid 1.3.6 Mesh 1.3.7 Tree (Hierarchical) 1.4 Describe Network Services 1.4.1 Explain the differences between peer-to-peer versus server-based networks 1.4.2 Compare the different network infrastructures and services available: 1.4.2.1 File sharing and file management 1.4.2.2 Peripheral integration and sharing 1.4.2.3 Email 1.4.2.4 Remote Access Servers (RAS) 1.4.2.5 Application servers 1.5 Define the Open Systems Interconnection (OSI) model 1.5.1 List and describe the configuration of the seven OSI model layers to include: 1.5.1.1 Application Layer – layer 7 1.5.1.2 Presentation Layer – layer 6 1.5.1.3 Session
    [Show full text]
  • Performance Analysis of Token Bus Protocol with Maintenance Functions Joon-Nyun Kim Iowa State University
    Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1987 Performance analysis of token bus protocol with maintenance functions Joon-Nyun Kim Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Electrical and Electronics Commons, and the Transportation Commons Recommended Citation Kim, Joon-Nyun, "Performance analysis of token bus protocol with maintenance functions " (1987). Retrospective Theses and Dissertations. 8663. https://lib.dr.iastate.edu/rtd/8663 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. INFORMATION TO USERS The most advanced technology has been used to photo­ graph and reproduce this manuscript from the microfilm master. UMI films the original text directly from the copy submitted. Thus, some dissertation copies are in typewriter face, while others may be from a computer printer. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyrighted material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are re­ produced by sectioning the original, beginning at the upper left-hand comer and continuing from left to right in equal sections with small overlaps. Each oversize page is available as one exposure on a standard 35 mm slide or as a 17" x 23" black and white photographic print for an additional charge.
    [Show full text]
  • CS-32 Data Communication and Computer Networking Lecture Notes On
    CS-32 Data Communication and Computer Networking Lecture notes on (IEEE 802 STANDARDS) For MCA 3RD Semester Prepared by Mrs. Shakti Pandey Department of Computer Science J.D. Women’s college, Patna Token Bus (IEEE 802.4) Network Token Bus (IEEE 802.4) is a standard for implementing token ring over the virtual ring in LANs. The physical media has a bus or a tree topology and uses coaxial cables. A virtual ring is created with the nodes/stations and the token is passed from one node to the next in a sequence along this virtual ring. Each node knows the address of its preceding station and its succeeding station. A station can only transmit data when it has the token. The working principle of the token bus is similar to Token Ring. Token Passing Mechanism in Token Bus A token is a small message that circulates among the stations of a computer network providing permission to the stations for transmission. If a station has data to transmit when it receives a token, it sends the data and then passes the token to the next station; otherwise, it simply passes the token to the next station. This is depicted in the following diagram − Frame Format of Token Bus The frame format is given by the following diagram − The fields of a token bus frame are − Preamble: 1 byte for synchronization. Start Delimiter: 1 byte that marks the beginning of the frame. Frame Control: 1 byte that specifies whether this is a data frame or control frame. Destination Address: 2-6 bytes that specifies address of destination station.
    [Show full text]