Part 2: Packet Transmission

Total Page:16

File Type:pdf, Size:1020Kb

Part 2: Packet Transmission Mesh networks LAN technologies and network topology • Early local networks used dedicated links between each pair of computers LANs and shared media • Some useful properties Locality of reference – hardware and frame details can be tailored for Star, bus and ring topologies each link Medium access control protocols – easy to enforce security and privacy Disadvantages of meshes Links between rooms/buildings • Poor scalability • Many links would follow the same physical path Shared Communication Channels Locality of reference • Shared LANs invented in the 1960s • LANs now connect more computers than any other form of network • Rely on computers sharing a single medium • The reason LANs are so popular is due to • Computers coordinate their access the principle of locality of reference • Low cost – physical locality of reference - computers more • But not suitable for wide area - likely to communicate with those nearby communication delays inhibit coordination – temporal locality of reference - computer is more likely to communicate with the same computers repeatedly 1 LAN topologies • LANs may be categorised according to topology ring bus star Pros and cons Example bus network: Ethernet • Star is more robust but hub may be a • Single coaxial cable - the ether - to which bottleneck computers connect • Ring enables easy coordination but is • IEEE standard specifies details sensitive to a cable being cut – data rates • Bus requires less wiring but is also sensitive – maximum length and minimum separation to a cable being cut – frame formats – electrical and physical details Conceptual flow of Ethernet data Ethernet coordination • The computers can detect when a signal is on the Ether - carrier sense • Can only transmit when the Ether is free - carrier sense with multiple access (CSMA) • Prevents a computer interrupting an on- going transmission • Transmitter has exclusive use of the medium 2 Collision detection Collision recovery • Collisions can occur if computers decide to transmit at the same time • Computers must wait after collision before retransmission • Each computer also senses for garbled transmission - a collision • Choose random delay up to specified max • Ethernet mechanism is called - carrier • Double the delay for each subsequent sense multiple access with collision detect - collision - binary exponential backoff CSMA/CD • Difference between bandwidth and • Example of a medium access control (MAC) throughput protocol Throughput vs. offered traffic What to do if the medium is busy? • Non persistent CSMA (deferential) • More offered traffic results in more collisions, more backing-off and eventually – if medium is idle, transmit congestion and reduced throughput – if busy, wait a random time then try again • 1-persistent CSMA (selfish) – if idle, transmit – if busy, listen until idle then transmit • p-persistent (compromise) – if idle transmit with probability p and delay one time unit with probability (1-p) Wireless LANs and CSMA/CA Example bus network - • Collision detection does not work because a LocalTalk transmission from one computer may only be • LAN technology for Apple computers received by its immediate neighbours • Solution is collision avoidance • MAC protocol is CSMA/CA (collision – sender sends small request message to receiver avoidance) – receiver responds with a ‘clear to send’ message that • Each computer first sends a small message received by all adjacent computers to reserve the bus 3 • Special message called the token grants Example ring network - permission (needs bit stuffing) IBM Token Ring • Computer grabs token, removes it, sends one frame, checks for errors then replaces it • MAC protocol based on token passing • Computer must wait for permission before transmitting • Computer controls the ring until finished • Data flows right round the ring – receiver makes a copy – transmitter checks for errors and then removes Example ring network - FDDI Example star network - ATM • Overcomes token ring susceptibility to failure through two counter-rotating cables • Asynchronous Transfer Mode • Uses pairs of optical fibres to connect computers to a central hub Summary • Locality of reference • Shared medium • Star, bus and ring topologies • Medium access control protocols 4 .
Recommended publications
  • The Design of PROFIBUS-DP HUB Based on FPGA
    International Conference on Computer Science and Service System (CSSS 2014) The Design of PROFIBUS-DP HUB based on FPGA Jiao Ping Zhou Tong Lab. of Networked Control Systems Lab. of Networked Control Systems Shenyang Institute of Automation (SIA), Chinese Shenyang Institute of Automation (SIA), Chinese Academy of Sciences China, Shenyang Academy of Sciences China, Shenyang [email protected] [email protected] Abstract—This paper analyzes the PROFIBUS-DP and specified the standard EIA RS-485, and the traffic rate is physical layer signals states, DP time series and other from 9.6kbps to 12Mbps [2, 3, 6]. characteristics. In the past, PROFIBUS-DP HUB common IEC 1158-2 specified the station number of problems of poor universal apply, shape communication is PROFIBUS-DP is 126 (station address from 0 to 125 contain more time-consuming, required message analysis, Drop frame master and slave station) [4]. In the one segment of etc, this paper propose a new design of PROFIBUS-DP HUB PROFIBUS-DP, the maximum station is 32. DP HUB or DP which based on FPGA. The design contain a detector which Repeater device requires the use, if want to connect more used to monitor the physical layer signal state of the DP bus, stations or change the network topology. As figure shown, use of FPGA synthesis logic signal, could control the direction DP HUB or DP Repeater divided the DP network into many of data flow in the physical layer, and Unrelated with the subnet segments [7]. Each interface of DP HUB is a upper layer protocol, without message analysis, compliance the protocol which used the standard RS-485, and Repeater, which can independently drive a PROFIBUS baudrate-adaptive.
    [Show full text]
  • Field Networking Solutions
    Field Networking Solutions Courtesy of Steven Engineering, Inc. ! 230 Ryan Way, South San Francisco, CA 94080-6370 ! Main Office: (650) 588-9200 ! Outside Local Area: (800) 258-9200 ! www.stevenengineering.com TYPES OF FIELDBUS NETWORKS* Field Networking 101 Features and Benefits of Fieldbus Networks The combination of intelligent field devices, digital bus networks, and various open communications protocols Fieldbus networks provide an array of features and benefits that make them an excellent choice is producing extraordinary results at process plants in nearly all process control environments. around the world. Compared to conventional technology, fieldbus networks deliver the following benefits: Just as our ability to retrieve, share, and analyze data Reduced field wiring costs has increased tremendously by use of the Internet and - Two wires from the control room to many devices PC network technology in our homes and at our desk- Reduced commissioning costs tops, so has our ability to control and manage our - Less time and personnel needed to perform process plants improved. Digital connectivity in process I/O wiring checkouts - No time spent calibrating intermediate signals manufacturing plants provides an infrastructure for the (such as 4-20mA signals) - Digital values are delivered directly from field flow of real-time data from the process level, making it devices, increasing accuracy available throughout our enterprise networks. This data Reduced engineering/operating costs is being used at all levels of the enterprise to provide - Much smaller space required for panels, I/O racks, and connectivity boxes increased process monitoring and control, inventory and - Fewer I/O cards and termination panels for materials planning, advanced diagnostics, maintenance control system equipment - Lower power consumption by control system planning, and asset management.
    [Show full text]
  • Efficiently Triggering, Debugging and Decoding Low-Speed Serial Buses
    Efficiently Triggering, Debugging and Decoding Low-Speed Serial Buses Hello, my name is Jerry Mark, I am a Product Marketing Engineer at Tektronix. The following presentation discusses aspects of embedded design techniques for “Efficiently Triggering, Debugging, and Decoding Low-Speed Serial Buses”. 1 Agenda Introduction – Parallel Interconnects – Transition from Parallel to Serial Buses – High-Speed versus Low-Speed Serial Data Buses Low-Speed Serial Data Buses – Challenges – Technology Reviews – Measurement Solutions Summary 2 In this presentation we will begin by taking a glance at the transition from parallel-to-serial data and the challenges this presents to engineers. Then we will briefly review some of the most widely used low-speed serial buses in industry today and some of their key characteristics. We will turn our attention to the key measurements on these buses. Subsequently, we will present by example how the low-speed serial solution from Tektronix addresses these challenges. 2 Parallel Interconnects Traditional way to connect digital devices used parallel buses Advantages – Simple point-to-point connections – All signals are transmitted in parallel, simultaneously – Easy to capture state of bus (if you have enough channels!) – Decoding the bus is relatively easy Disadvantages – Occupies a lot of circuit board space – All high-speed connections must be the same length – Many connections limit reliability – Connectors may be very large 3 Parallel buses present all of the bits in parallel, as shown in the logic analyzer display. A parallel connection between two ICs can be as simple as point-to-point circuit board traces for each of the data lines. If you can physically probe these lines, it is easy to display the bus state on a logic analyzer or mixed signal oscilloscope.
    [Show full text]
  • Comparison of Network Topologies for Optical Fiber Communication
    International Journal of Engineering Research & Technology (IJERT) ISSN: 2278-0181 Vol. 1 Issue 10, December- 2012 Comparison Of Network Topologies For Optical Fiber Communication Mr. Bhupesh Bhatia Ms. Ashima Bhatnagar Bhatia Department of Electronics and Communication, Department of Computer Science, Guru Prem Sukh Memorial College of Engineering, Tecnia Institute of Advanced Studies, Delhi Delhi Ms. Rashmi Ishrawat Department of Computer Science, Tecnia Institute of Advanced Studies, Delhi Abstract advent of the Information age. Optical In this paper, the various network topologies technologies can cost effectively meet have been compared. The signal is analyzed as it corporate bandwidth needs today and passes through each node in each of the network tomorrow. Internet connections offering topology. There is no appreciable signal degradation in the ring network. Also there is bandwidth on demand, to fiber on the increase in Quality factor i.e. signal keeps on LAN. Fiber to the home can provide true improving as it passes through the successiveIJERT IJERTbroadband connectivity for nodes. For the bus topology, the quality of signal telecommuters as well as converged goes on decreasing with increase in the number multimedia offerings for consumers [2]. of nodes and the power penalty goes on increasing. For the star topology, it is observed These different communication networks that received power values of each node at a can be configured in a number of same distance from the hub are same and the topologies. These include a bus, with or performance is same. For the tree topology, it is without a backbone, a star network, a observed that the performance is almost identical ring network, which can be redundant to the performance of ring topology, as signal quality is improved as it passes through the and/ or self-healing, or some successive nodes of the hierarchy.
    [Show full text]
  • Real-Time Communication Protocols: an Overview∗
    Real-time communication protocols: an overview∗ Ferdy Hanssen and Pierre G. Jansen October 2003 Abstract This paper describes several existing data link layer protocols that provide real-time capabilities on wired networks, focusing on token-ring and Carrier Sense Multiple Access based networks. Existing modifications to provide better real-time capabilities and performance are also described. Finally the pros and cons regarding the At-Home Anywhere project are discussed. 1 Introduction In the past twenty-five years several different, wired networks have been designed and built. But not all of them are dependable, i.e. suitable for accomodating real-time traffic, or traffic with Quality of Service (QoS) requirements. Some were designed with QoS in mind, some had QoS added as an after-thought, and some do not support QoS requirements at all. The most popular wired network architecture used to date, IEEE 802.3 [46], pop- ularly called Ethernet1, does not provide any support for real-time traffic. There are no provisions to reserve bandwidth for a certain connection. Nodes access the network using the CSMA/CD (Carrier Sense Multiple Access with Collision Detect) technique [70]. The CSMA/CD algorithm does not define a collision resolvance protocol of its own. Ethernet uses the BEB (Binary Exponential Back-Off) algo- rithm. This algorithm resolves collisions in a non-deterministic manner, while the first requirement for a network to be called real-time is determinism. The most popular real-time network architecture, Asynchronous Transfer Mode (ATM), is used mostly for internetwork links these days. ATM provides high band- widths and QoS guarantees, but has proven to be too expensive for use as a lo- cal area network.
    [Show full text]
  • COSC460 Report: Medium Access Control Protocols for WDM Optical Networks
    COSC460 Report: Medium access control protocols for WDM optical networks November 6, 2001 Robert Mollard Associate Prof. K. Pawlikowski1 1Supervisor Abstract Wavelength-division multiplexing (WDM) has emerged as the most popular technology for utilising the huge bandwidth of optical fibre. This paper surveys medium access control protocols for the star, bus and ring WDM network topologies. The performance of two recently developed protocols, Pipelining Cyclic Scheduling Algorithm (PCSA) and Reservation/ACK/Transmission Protocol (RATP), is evaluated by stochastic simulation. It was found that RATP’s performance (measured by throughput and de- lay) degrades sharply with the increase in network size, making it impractical for use in metropolitan- or wide-area networks. PCSA does not suffer from this restriction, and can realise a throughput of 1. It also delivers short average packet delays, especially under light to moderate system loads. Keywords: Optical networks, wavelength division multiplexing, medium access control. Contents 1 Introduction 4 1.1Reportstructure........................... 5 2 Exploiting optical bandwidth 6 2.1 Time-division and Code-division multiplexing . 6 2.2 Wavelength-division multiplexing . 7 2.2.1 WDMnetworkclassification................. 7 3 Medium access control protocols 9 4 Previous Work 11 4.1 Indulska and Richards . 11 4.2Montgomery.............................. 11 4.3Li,MaodeandHamdi........................ 11 5 Star Topology 12 5.1Demonstrators............................ 13 5.2MACprotocols............................ 13 5.2.1 AlohaandSlottedAloha.................. 15 5.2.2 I-SA.............................. 15 5.2.3 I-SA*............................. 15 5.2.4 I-TDMA............................ 16 5.2.5 I-TDMA*........................... 16 5.2.6 TDMA-C........................... 16 5.2.7 DT-WDMA.......................... 16 5.2.8 Conflict-free DT-WDMA .
    [Show full text]
  • Comparison of Network Topology Types in Communication Systems and Computer Networks 1404703
    Alexandria University Institute of Graduate Studies and Research Department of Information Technology M.Sc. program in Information Technology 2020 Assignment (1) of Comparison of network topology types in Communication Systems and Computer Networks 1404703 Supervisor Prof. Shawkat K. Guirguis Name: Israa Faisal Jassam ID: 1404-3-160 1 1. Introduction 1.1 Network topologies: It is the schematic description of a network arrangement, connecting various nodes (sender and receiver) through lines of connection. There are two types of network topologies: physical and logical. Physical topology confirms the physical layout of the connected devices and nodes, while the logical topology focuses on the pattern of data transfer between network nodes. 1.1.1 Physical topology: refers to the interconnected structure of a local area network (LAN). The method employed to connect the physical devices on the network with the cables, and the type of cabling used, all constitute the physical topology. Physical topology is further divided into two sections, Point-to-point connections and Multipoint connections. point-to-point connection: a communication link is established between two devices with one wire. A simple example of point-to-point connection is talking over telephone between two persons where anyone else is not allowed to use the phone on either side (Fig.1). Fig.1: multipoint connection: is a connection established between more than two devices. In multipoint connection, a single link is shared by multiple devices. So, it can be said that the channel capacity is shared temporarily by every device connecting to the link. If devices are using the link turn by turn, then it is said to be time shared line configuration.
    [Show full text]
  • Media Access Control (MAC) (With Some IEEE 802 Standards)
    Department of Computer and IT Engineering University of Kurdistan Computer Networks I Media Access Control (MAC) (with some IEEE 802 standards) By: Dr. Alireza Abdollahpouri Media Access Control Multiple access links There is ‘ collision ’ if more than one node sends at the same time only one node can send successfully at a time 2 Media Access Control • When a "collision" occurs, the signals will get distorted and the frame will be lost the link bandwidth is wasted during collision • Question: How to coordinate the access of multiple sending and receiving nodes to the shared link ? • Solution: We need a protocol to determine how nodes share channel Medium Access control (MAC) protocol • The main task of a MAC protocol is to minimize collisions in order to utilize the bandwidth by: - Determining when a node can use the link (medium) - What a node should do when the link is busy - What the node should do when it is involved in collision 3 Ideal Multiple Access Protocol 1. When one node wants to transmit, it can send at rate R bps, where R is the channel rate. 2. When M nodes want to transmit, each can send at average rate R/M (fair) 3. fully decentralized: - No special node to coordinate transmissions - No synchronization of clocks, slots 4. Simple Does not exist!! 4 Three Ways to Share the Media Channel partitioning MAC protocols: • Share channel efficiently and fairly at high load • Inefficient at low load: delay in channel access, 1/N bandwidth allocated even if only 1 active node! “Taking turns” protocols • Eliminates empty slots without
    [Show full text]
  • Hardware Architectures
    Hardware Architectures Parallel Programming 2020-11-10 Jun.-Prof. Dr. Michael Kuhn [email protected] Parallel Computing and I/O Institute for Intelligent Cooperating Systems Faculty of Computer Science Otto von Guericke University Magdeburg https://parcio.ovgu.de Outline Review Hardware Architectures Review Introduction Classification Memory Access Models Network Summary Michael Kuhn Hardware Architectures 1/43 Performance Analysis and Optimization Review • Why should performance measurements be repeated? 1. Warm up the hardware 2. Eliminate random errors 3. Eliminate systematic errors 4. Increase measurement time Michael Kuhn Hardware Architectures 2/43 Performance Analysis and Optimization Review • What does memory-bound stand for? 1. Performance is limited by processor throughput 2. Application does not have enough main memory 3. Data cannot be moved in main memory 4. Performance is limited by memory throughput Michael Kuhn Hardware Architectures 2/43 Performance Analysis and Optimization Review • Why are caches important? 1. Decrease latency of memory accesses 2. Increase size of main memory 3. Reduce power consumption of memory accesses 4. Increase throughput of main memory Michael Kuhn Hardware Architectures 2/43 Performance Analysis and Optimization Review • Which is the best performance metric? 1. Runtime 2. Utilization 3. FLOPS 4. FLOPS per watt Michael Kuhn Hardware Architectures 2/43 Outline Introduction Hardware Architectures Review Introduction Classification Memory Access Models Network Summary Michael Kuhn Hardware Architectures
    [Show full text]
  • Network Topologies
    Application Notes NETWORK TOPOLOGIES Author John Peter & Timo Perttunen Issued June 2014 Abstract Network topology is the way various components of a network (like nodes, links, peripherals, etc) are arranged. Network topologies define the layout, virtual shape or structure of network, not only physically but also logically. The way in which different systems and nodes are connected and communicate with each other is determined by topology of the network. Topology can be physical or logical. Physical Topology is the physical layout of nodes, workstations and cables in the network; while logical topology is the way information flows between different components. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ between two networks, yet their topologies may be identical. Keywords Topology, P2P, Bus, Ring, Star, Mesh, Tree, PON, Ethernet. 1 Topology - General Network topology is usually a schematic description of the arrangement of a network, including its nodes and connecting lines. There are two ways of defining network geometry: the physical topology and the logical (or signal) topology. Physical topology describes where the network's various components like its devices and cables are placed and installed, while logical topology explains network's information (data) flow and transmission, apart from physical design. Distances between nodes, physical interconnections, transmission rates, and/or signal types may differ between two networks, yet their topologies may be identical. FTTH example: Nodes in FTTH has one or more physical links to other devices in the network and drawing links, network designing, between these nodes in a map gives the physical topology for the network.
    [Show full text]
  • A Survey of Computer Network Topology and Analysis Examples
    A Survey of Computer Network Topology and Analysis Examples A Survey of Computer Network Topology and Analysis Examples Brett Meador, [email protected] (A project report written under the guidance of Prof. Raj Jain) Download Abstract This paper presents an introduction to Computer Network Topology. Definitions of Physical and Logical Topologies are provided. Additionally common Computer Network realizations of Physical Topologies are reviewed. This is followed by a discussion of Graph Theory and its relation to topological analysis. A discussion of analysis examples follows with an emphasis on message routing issues, network sizing, and virus analysis. These examples are discussed to underscore the impotance of topological design when constructing a new computer network, or adding to an existing one. Keywords: Physical Network Topology, Logical Network Topology, Minimum Spanning Tree, Graph Theory, Bus Network Topology, Ring Network Topology, Star Network Topology, Tree Network Topology, Mesh Network Topology, Hybrid Topology. Directed Graph, Undirected Graph, Queueing Theory, Combinatorial Trials, Tree-Bus Topology Table of Contents 1. Introduction 2. Physical Network Topologies 2.1 Bus Network Topology 2.2 Ring Network Topology 2.3 Star Network Topology 2.4 Tree Network Topology 2.5 Mesh Network Topology 3. Graph Theory 4. Network Analysis Topics 4.1 Routing Analysis 4.2 Network Sizing 4.3 Network Corruption 5. Conclusion 6. Acronyms 7. References 1. Introduction 1 of 11 A Survey of Computer Network Topology and Analysis Examples The mathematical subject of Topology investigates objects whose characteristics are constant through distortion. Objects can be topologically equivalent while appearing physically different. As an example, any two objects formed with a simple rubber band are topologically equivalent so long as the band is not parted.
    [Show full text]
  • Analysis of Profibus Communication Using Process Automation and Decentralised Periphery Against Conventional (4-20Ma)
    ANALYSIS OF PROFIBUS COMMUNICATION USING PROCESS AUTOMATION AND DECENTRALISED PERIPHERY AGAINST CONVENTIONAL (4-20MA) BY BLESSING ZITHULELE TEFSA NTSHANGASE STUDENT NO: 4727 0411 SUBMITTED IN ACCORDANCE WITH THE REQUIREMENTS FOR THE PARTIAL FULFILMENT FOR THE DEGREE OF MASTER OF TECHNOLOGY IN ELECTRICAL ENGINEERING UNIVERSITY OF SOUTH AFRICA SUPERVISOR: PROF. MO OHANGA CO-SUPERVISOR: PROF. P NAIDOO 25 October 2016 DECLARATION I declare that this is my own, unaided work. It is being submitted for the Magister Technologiae in Electrical Engineering in the Department of Electrical Engineering at university of South Africa. It has not been submitted before for any degree, diploma or other examination at any other education institution. ______________ B.Z.T Ntshangase At___Durban_____ on this __25__day of __October___2016 1 ACKNOWLEDGEMENT I would like to thank Almighty God for providing me with the courage and endurance to complete my research study. Following, I would like to thank my family. Especially my wife Mpumelelo, the toughest pillar of my life without whom nothing would have been possible. Not to mention my beautiful daughter Anelisa and my Son Akwande who were responsible for injecting fresh energy every time I am feeling exhausted. I could not have been able to complete this thesis without the expert advice and support from my supervisors Prof Naidoo from Mangosuthu University of Technology and Prof. MO Ohanga from Vaal University of Technology. They have been there to help me and permanently given their best guidance to complete the study. I would like thank my co-supervisor: Prof. Naidoo Mangosuthu University of Technology (MUT) for his tremendous contribution with regards to the research, ensuring that the research lab facilities were available when required and adequate analysis on critical aspects for the analysis of PROFIBUS Communication using Process Automation and Decentralised Periphery against Conventional (4-20mA).
    [Show full text]