Unit 1 Token Passing, Csma/Cd and Tcp/Ip Protocol
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
A Simulation Analysis of Bacnet Local Area Networks
NISTIR 7038 A Simulation Analysis of BACnet Local Area Networks Wong Seok Song Seung Ho Hong Steven T. Bushby NISTIR 7038 A Simulation Analysis of BACnet Local Area Networks Wong Seok Song Seung Ho Hong School of Electrical and Computer Engineering Hanyang University Ansan, Korea Steven T. Bushby Building and Fire Research Laboratory Gaithersburg, MD 20899 October 2003 U.S. DEPARTMENT OF COMMERCE Donald L. Evans, Secretary TECHNOLOGY ADMINISTRATION Phillip J. Bond, Under Secretary of Commerce for Technology NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY Arden L. Bement, Jr., Director Abstract BACnet is a standard data communication protocol for building automation and control systems. BACnet defines an object-based model of the information that is exchanged between components of the building automation system and an application layer protocol that is used to access and manipulate this information. It also provides a way to convey the information across a variety of local and wide-area networks that may be interconnected to form an internetwork. In this study, the performance of three BACnet local area networking options is investigated using simulation models developed using ARENA, a tool for simulating discrete event dynamic systems. This study evaluates the delay characteristics of Master-Slave/Token-Passing (MS/TP), Attached Resource Computer Network (ARCNET), and ISO-8802-3 (Ethernet) networks being used to deliver BACnet application services. Analysis of the simulation results was used to identify the network parameters that influence the performance of BACnet application services and to develop recommendations that should be considered when designing and operating BACnet systems. Key words: ANSI/ASHRAE Standard 135; BACnet; building automation and control; communication protocol; direct digital control; energy management systems; ARENA; discrete event dynamic systems Table of Contents 1 Introduction............................................................................................................................ -
Network Systems Technician (NST) Competency Requirements
Network Systems Technician (NST) Competency Requirements This Competency listing serves to identify the major knowledge, skills, and standards areas which the Network Systems Technician needs in order to perform the professional networking concepts and practices required for modern wired and wireless information technology. Network Systems Technicians must be knowledgeable in the following technical areas: 1.0 Network Terminology 1.1 Define the functions of a computer network 1.2 Identify network types and terminology associated with: 1.2.1 Local Area Networks (LANs) 1.2.2 Virtual Local Area Networks (VLANs) to include: 1.2.2.1 Virtual Private Networks (VPN) 1.2.3 Wide Area Networks (WANs) to include: 1.2.3.1 Value Added Networks (VANs) and VPNs 1.2.3.2 Metropolitan Area Networks (MANs) 1.3 Describe the fundamental terms and nomenclature for network topologies to include: 1.3.1 Point-to-Point 1.3.2 Bus 1.3.3 Ring 1.3.4 Star 1.3.5 Hybrid 1.3.6 Mesh 1.3.7 Tree (Hierarchical) 1.4 Describe Network Services 1.4.1 Explain the differences between peer-to-peer versus server-based networks 1.4.2 Compare the different network infrastructures and services available: 1.4.2.1 File sharing and file management 1.4.2.2 Peripheral integration and sharing 1.4.2.3 Email 1.4.2.4 Remote Access Servers (RAS) 1.4.2.5 Application servers 1.5 Define the Open Systems Interconnection (OSI) model 1.5.1 List and describe the configuration of the seven OSI model layers to include: 1.5.1.1 Application Layer – layer 7 1.5.1.2 Presentation Layer – layer 6 1.5.1.3 Session -
Performance Analysis of Token Bus Protocol with Maintenance Functions Joon-Nyun Kim Iowa State University
Iowa State University Capstones, Theses and Retrospective Theses and Dissertations Dissertations 1987 Performance analysis of token bus protocol with maintenance functions Joon-Nyun Kim Iowa State University Follow this and additional works at: https://lib.dr.iastate.edu/rtd Part of the Electrical and Electronics Commons, and the Transportation Commons Recommended Citation Kim, Joon-Nyun, "Performance analysis of token bus protocol with maintenance functions " (1987). Retrospective Theses and Dissertations. 8663. https://lib.dr.iastate.edu/rtd/8663 This Dissertation is brought to you for free and open access by the Iowa State University Capstones, Theses and Dissertations at Iowa State University Digital Repository. It has been accepted for inclusion in Retrospective Theses and Dissertations by an authorized administrator of Iowa State University Digital Repository. For more information, please contact [email protected]. INFORMATION TO USERS The most advanced technology has been used to photo graph and reproduce this manuscript from the microfilm master. UMI films the original text directly from the copy submitted. Thus, some dissertation copies are in typewriter face, while others may be from a computer printer. In the unlikely event that the author did not send UMI a complete manuscript and there are missing pages, these will be noted. Also, if unauthorized copyrighted material had to be removed, a note will indicate the deletion. Oversize materials (e.g., maps, drawings, charts) are re produced by sectioning the original, beginning at the upper left-hand comer and continuing from left to right in equal sections with small overlaps. Each oversize page is available as one exposure on a standard 35 mm slide or as a 17" x 23" black and white photographic print for an additional charge. -
CS-32 Data Communication and Computer Networking Lecture Notes On
CS-32 Data Communication and Computer Networking Lecture notes on (IEEE 802 STANDARDS) For MCA 3RD Semester Prepared by Mrs. Shakti Pandey Department of Computer Science J.D. Women’s college, Patna Token Bus (IEEE 802.4) Network Token Bus (IEEE 802.4) is a standard for implementing token ring over the virtual ring in LANs. The physical media has a bus or a tree topology and uses coaxial cables. A virtual ring is created with the nodes/stations and the token is passed from one node to the next in a sequence along this virtual ring. Each node knows the address of its preceding station and its succeeding station. A station can only transmit data when it has the token. The working principle of the token bus is similar to Token Ring. Token Passing Mechanism in Token Bus A token is a small message that circulates among the stations of a computer network providing permission to the stations for transmission. If a station has data to transmit when it receives a token, it sends the data and then passes the token to the next station; otherwise, it simply passes the token to the next station. This is depicted in the following diagram − Frame Format of Token Bus The frame format is given by the following diagram − The fields of a token bus frame are − Preamble: 1 byte for synchronization. Start Delimiter: 1 byte that marks the beginning of the frame. Frame Control: 1 byte that specifies whether this is a data frame or control frame. Destination Address: 2-6 bytes that specifies address of destination station.