8 n t k8. networks · anetworks are complex aid ll th id hihideally, they provide high-ll i...
TRANSCRIPT
![Page 1: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/1.jpg)
8 N t k8. Networks
Used to build distributed embedded tsystems
Processing elements (PEs) are connected g ( )by a networkThe application is distributed over the PEsThe application is distributed over the PEs
Computers as Components 1
![Page 2: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/2.jpg)
Network-based embedded systems
Physically distributed activities---time constants may not allow transmission to central site.may not allow transmission to central site.
Engine control: short time delays required for the task
Data reduction is another important reason for distributed processing.distributed processing.Modularity is another motivation for network-based designbased design.
A large system is assembled out of existing components
Computers as Components 2
components.
![Page 3: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/3.jpg)
Network-based embedded systems
Improved debugging---use one CPU in network to debug othersnetwork to debug others.In some cases, networks are used to build f lt t l i t tfault tolerance into systems.Distributed embedded system design is aDistributed embedded system design is a good example of hardware/software co-design since we must design the networkdesign since we must design the network topology as well as the software running
th t k dComputers as Components 3
on the network node.
![Page 4: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/4.jpg)
Networks in embedded tsystems
initial processingmore processing
PEPE sensor
PE
PE actuator
It is necessary to put some PEs near where the events occur.
Computers as Components 4
![Page 5: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/5.jpg)
N t k l tNetwork elements
distributed computing platform:
PEPE
communication link
network
PEPEs may be CPUs or ASICs
Computers as Components 5
PEs may be CPUs or ASICs.
![Page 6: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/6.jpg)
H d l tfHardware platform
Network of the PEsUnlike the system bus, the distributed embedded system does not have memoryembedded system does not have memory on the bus
fPEs do not fetch instruction over the network as they do on the microprocessor y pbus.
Computers as Components 6
![Page 7: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/7.jpg)
Wh di t ib t d?Why distributed?
Network-based embedded systemMore complicatedMore complicated
Physically separated & deadline is shortRather than building high-speed network to carry the data to a distant, fast PE.y ,
Advantage of a distributed system with several CPUseveral CPU
A part of the system can be used to debug h
Computers as Components 7
another part.
![Page 8: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/8.jpg)
D b i lti tDebugging a multi-core system
i 1risc1 risc2 risc3
To diagnose risc 2, we can use risc1 to generate inputsand risc3 to watch output
Computers as Components 8
and risc3 to watch output.
![Page 9: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/9.jpg)
N t k b t tiNetwork abstractions
Networks are complexId ll th id hi h l l i hilIdeally, they provide high-level services while hiding details of data transmissionInternational Standards Organization (ISO) developed the Open Systems Interconnection(OSI) model to help us to understnad networks:
7-layer model.
Provides a standard way to classify network components and operations.
Computers as Components 9
p p
![Page 10: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/10.jpg)
OSI f d lOSI reference model
7. application end-use interface
6. presentation data format7. application
4. transport connections5. session application dialog control
2 data link reliable data transport3. network end-to-end service
1. physical mechanical, electrical
2. data link reliable data transport
Computers as Components 10
![Page 11: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/11.jpg)
OSI f d lOSI reference model
Computers as Components 11
![Page 12: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/12.jpg)
OSI lOSI layers
Physical: connectors, bit formats, etc.Data link: error detection and control across a single link g
(single hop).Network: end-to-end multi-hop data communication.T id i i i kTransport: provides connections; may optimize network
resources.Session: services for end-user applications: data groupingSession: services for end-user applications: data grouping,
checkpointing, etc.Presentation: data formats, transformation services.,Application: interface between network and end-user
programs.
Computers as Components 12
![Page 13: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/13.jpg)
LAN - Local Area Network
connects computers that are physically l t th ( 1 il )close together ( < 1 mile).
high speedmulti-access
Technologies:Technologies:Ethernet 10 Mbps, 100MbpsToken Ring 16 MbpsFDDI 100 Mbps
Computers as Components 13
p
![Page 14: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/14.jpg)
WAN Wid A N t kWAN - Wide Area Network
connects computers that are physically far t “l h l t k”apart. “long-haul network”.
typically slower than a LAN.typically less reliable than a LAN.point-to-pointpoint to point
Technologies:telephone linesSatellite communications
Computers as Components 14
![Page 15: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/15.jpg)
MAN - Metropolitan Area Network
Larger than a LAN and smaller than a gWAN- example: campus-wide networkexample: campus wide network- multi-access network
Technologies:coaxial cable microwave
Computers as Components 15
![Page 16: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/16.jpg)
I t t kInternetwork
Connection of 2 or more distinct (possibly dissimilar) networks.)Requires some kind of network device to facilitate the connection.facilitate the connection.
Net A Net BNet A Net B
Computers as Components 16
![Page 17: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/17.jpg)
Ph i l LPhysical Layerdeals with the physical characteristics of thedeals with the physical characteristics of the transmission medium.
defines the electrical mechanical procedural anddefines the electrical, mechanical, procedural, and functional specifications for activating, maintaining and deactivating the physical linkmaintaining, and deactivating the physical link between end systems.
defines such characteristics as voltage levels, timing of voltage changes, physical data rates, maximum transmission distances, physical connectors, and other similar attributes
Computers as Components 17Examples : EIA/TIA-232, RJ45, NRZ.
![Page 18: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/18.jpg)
Ph i l LPhysical Layer
Responsibility:transmission of raw bits over a t a s ss o o a b ts o e acommunication channel.
Issues:Issues:mechanical and electrical interfacestime per bitdistances
Computers as Components 18
![Page 19: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/19.jpg)
Data Link Layerprovides access to the media and physical transmission across the media, which enables the data to locate its intended destinationdata to locate its intended destination provides reliable transit of data across a physical link by using the MAC addresses which define alink by using the MAC addresses, which define a hardware or data link address in order for multiple stations to share the same medium and still
i l id tif h thuniquely identify each other.Concerned with network topology, network access error notification ordered delivery ofaccess, error notification, ordered delivery of frames, and flow control.Examples: Ethernet Frame Relay FDDI
Computers as Components 19
Examples: Ethernet, Frame Relay, FDDI.
![Page 20: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/20.jpg)
Data Link LayerData Link Layer
Two sublayersData link control which provide an error freeData link control, which provide an error-free communication link⌧framing (dividing data into chunks)⌧framing (dividing data into chunks)
• header & trailer bits⌧addressinggMAC, which is needed by multiaccess networks.⌧MAC provides DLC with “virtual wires” on
multiaccess networks.
Computers as Components 20
![Page 21: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/21.jpg)
N t k LNetwork Layer
defines end-to-end delivery of packetsend to end delivery of packets. logical addressing so that any endpoint can be identifiedidentified. how routing works and how routes are learned
h h k b d li dso that the packets can be delivered. how to fragment a packet into smaller packets to accommodate different media.
Routers operate at Layer 3.
Computers as Components 21
p y
![Page 22: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/22.jpg)
N t k LNetwork Layer
Examples: IP, IPX, AppleTalk.Responsibilities:Responsibilities:
path selection between end-systems (routing).b fl lsubnet flow control.
fragmentation & reassemblytranslation between different network types.
Issues:Issues:packet headersi t l i it
Computers as Components 22
virtual circuits
![Page 23: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/23.jpg)
Transport Layer
regulates information flow to ensure end-to-end connectivity between hostto end connectivity between host applications reliably and accurately.segments data f om the sende andsegments data from the sender and reassembles the data into a data stream on the receiver. the lower four layers are concerned withthe lower four layers are concerned with data transport issues.
Computers as Components 23
![Page 24: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/24.jpg)
Transport LayerL 4 t l i l dLayer 4 protocols include
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol).
Responsibilities:provides virtual end-to-end links between peer processes.end-to-end flow control
Issues:headerserror detection
Computers as Components 24reliable communication
![Page 25: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/25.jpg)
Session Layer
defines how to start, control and end sessions between applications.includes the control and management of multiple bi-directional messages using dialogue control.synchronizes dialogue between two hosts' presentation layers and manages their data exchange.The upper three layers (the application, presentation, and session layers) are concerned
ith li ti iComputers as Components 25
with application issues.
![Page 26: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/26.jpg)
Session Layer
The session layer offers provisions for efficient data transfer.Examples: SQL, ASP(AppleTalk Session Protocol)Protocol).Responsibilities:
establishes, manages, and terminates sessions between applications.service location lookup
Many protocol suites do not include a
Computers as Components 26
y psession layer.
![Page 27: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/27.jpg)
Presentation Layer
The information that the application layer of one system sends out is ensured to beof one system sends out is ensured to be read by the application layer of another system.If necessary translates between multipleIf necessary, translates between multiple data formats by using a common format.
provides encryption and compression of data.
Computers as Components 27
![Page 28: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/28.jpg)
Presentation Layer
Examples: JPEG, MPEG, ASCII, EBCDIC, HTMLHTML.Responsibilities:p
data encryptiondata compressiondata compressiondata conversion
Many protocol suites do not include a Presentation Layer.
Computers as Components 28
y
![Page 29: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/29.jpg)
Application Layer
provides network services to the user’s applications.applications. does not provide services to any other OSI l b h l li iOSI layer, but rather, only to applications outside the OSI model. Examples of such applications: spreadsheet programs word processingspreadsheet programs, word processing programs, and bank terminal programs.
Computers as Components 29
![Page 30: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/30.jpg)
Application Layer
establishes the availability of intended communication partners, synchronizes and p yestablishes agreement on procedures for error recovery and control of data integrity.
Responsibilities:anything not provided by any of the other layersanything not provided by any of the other layers
Issues:li ti l l t lapplication level protocols
appropriate selection of “type of service”
Computers as Components 30
![Page 31: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/31.jpg)
TCP/IP protocols
Application layer (telnet, ssh, http, ftp, etc)Main functionality: run application protocols
Transport layer (TCP, UDP)Main functionality: reliability
Network layer (IPv4, IPv6)et o aye ( , 6)Main functionality: routing/fragmentation/internetworkingg/ g / g
Host to Network layer (Ethernet)Main functionality: medium access encoding
Computers as Components 31
Main functionality: medium access, encoding
![Page 32: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/32.jpg)
Layering & Headers
Each layer needs to add some control yinformation to the data in order to do its job. This information is typically appended to theThis information is typically appended to the data before being given to the lower layer.Once the lower layers deliver the the dataOnce the lower layers deliver the the data and control information - the peer layer uses the control informationthe control information.
Computers as Components 32
![Page 33: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/33.jpg)
H dHeaders
P PDATAProcess ProcessDATA
Transport TransportDATAH
Network NetworkDATAHH
Data Link Data LinkDATAHHH
Computers as Components 33
![Page 34: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/34.jpg)
Wh t th h d ?What are the headers?
Physical: no header - just a bunch of bits.
Data Link:Data Link:address of the receiving endpointsdd f h di d iaddress of the sending endpoint
length of the datachecksum.
Computers as Components 34
![Page 35: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/35.jpg)
Network layer header -yexamples
protocol suite version protocolprotocolprotocol suite versiontype of service
protocolprotocol
header checksumheader checksum
length of the datapacket identifier
source network source network addressaddresspacket identifier
fragment number destination destination network addressnetwork addresstime to live network addressnetwork address
Computers as Components 35
![Page 36: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/36.jpg)
Important Summary
Data-Link: communication between machines on the same networkmachines on the same network.Network: communication between
hi ibl diff t t kmachines on possibly different networks.Transport: communication between pprocesses (running on machines on possibly different networks).p y )
Computers as Components 36
![Page 37: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/37.jpg)
Connecting Networks
Repeater: physical layer
Bridge: data link layer
Router: network layer
Gateway: network layer and above.
Computers as Components 37
![Page 38: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/38.jpg)
R tRepeater
Copies bits from one network to anotherDoes not look at any bitsAllows the extension of a network beyondAllows the extension of a network beyond physical length limitations
REPEATER
Computers as Components 38
![Page 39: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/39.jpg)
B idBridge
Copies frames from one network to anotherpCan operate selectively - does not copy all frames (must look at data-link headers).frames (must look at data link headers).Extends the network beyond physical length limitationslimitations.
BRIDGE
Computers as Components 39
![Page 40: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/40.jpg)
Router
Copies packets from one network to another.Makes decisions about what route a packet shouldMakes decisions about what route a packet should take (looks at network headers).
ROUTER
Computers as Components 40
![Page 41: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/41.jpg)
Gateway
Operates as a routerData conversions above the network layer.yConversions:
l ti i t di t t kencapsulation - use an intermediate network translation - connect different application
protocolsencrpyption - could be done by a gateway
Computers as Components 41
pyp y g y
![Page 42: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/42.jpg)
Encapsulation Example
Gateway Gateway
Provides service connectivity evenProvides service connectivity even though intermediate network does
t t t lComputers as Components 42
not support protocols.
![Page 43: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/43.jpg)
Translation
GatewayGateway
Translate from green protocol to brown protocol
Computers as Components 43
![Page 44: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/44.jpg)
E ti tEncryption gateway
Encryption/DecryptionSecureN t k
Secure N t kEncryption/Decryption
GatewaysNetwork Network
GWGW ? GWGW ? ??
I N t kComputers as Components 44
Insecure Network
![Page 45: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/45.jpg)
H d S ftHardware vs. Software
Repeaters are typically hardware devices.Repeaters are typically hardware devices.Bridges can be implemented in hardware or soft a esoftware.Routers & Gateways are typically y yp yimplemented in software so that they can be extended to handle new protocolsextended to handle new protocols.Many workstations can operate as routers or
Computers as Components 45
gateways.
![Page 46: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/46.jpg)
Byte OrderingDifferent computer architectures use different byte ordering to represent y g pmultibyte values.16 bit integer:16 bit integer:
Low Byte High ByteAddress AAddress ALow Byte
High Byte
High Byte
Low Byte
Address AAddress AAddress A+1Address A+1
Computers as Components 46little-endian big-endian
![Page 47: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/47.jpg)
Byte Ordering
Big-EndianLittleLittle--EndianEndian
Low ByteHigh Byte
Add A Add A+1
High ByteLow Byte
Add A Add A+1 Addr A Addr A+1Addr A Addr A+1
IBM 370Motorola 68000
IBM 80x86IBM 80x86DEC VAXDEC VAX Motorola 68000
SunDEC PDPDEC PDP--1111IntelIntel
Computers as Components 47
IntelIntel
![Page 48: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/48.jpg)
Byte Order and Networking
Suppose a Big Endian machine sends a 16 bit i t ith th l 2bit integer with the value 2:
0000000000000010
A Li l E di hi ill hi k i
0000000000000010
A Little Endian machine will think it got the number 512:
0000001000000000
Computers as Components 48
![Page 49: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/49.jpg)
N t k B t O dNetwork Byte Order
Conversion of application-level data is left t th t ti lup to the presentation layer.
But , How do lower level layers , ycommunicate if they all represent values differently ? (data length fields indifferently ? (data length fields in headers)A fixed byte order is used (called network byte order) for all control data.
Computers as Components 49
y )
![Page 50: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/50.jpg)
Multiplexing
“.. to combine many into one”. Many processes sharing a single network interface.A single process could use multiple protocolsprotocols.More on this when we look at TCP/IP.
Computers as Components 50
![Page 51: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/51.jpg)
Modes of Service
connection-oriented vs. connectionlesssequencingerror-controlerror controlflow-controlbyte stream vs. message basedfull-duplex vs half-duplexfull-duplex vs. half-duplex.
Computers as Components 51
![Page 52: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/52.jpg)
Connection-Oriented vs. Connectionless Service
A connection-oriented service includes the t bli h t f l i l tiestablishment of a logical connection
between 2 processes.establish logical connectiontransfer datatransfer dataterminate connection.
C i l i i l di fConnectionless services involve sending of independent messages.
Computers as Components 52
p g
![Page 53: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/53.jpg)
Sequencing
Sequencing provides support for an order t i tito communications.A service that includes sequencing q grequires that messages (or bytes) are received in the same order they are sentreceived in the same order they are sent.
Computers as Components 53
![Page 54: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/54.jpg)
Error Control
Some services require error detection (it i i t t t k h t i iis important to know when a transmission error has occured).Checksums provide a simple error detection mechanismdetection mechanism.Error control sometimes involves notification and retransmission.
Computers as Components 54
![Page 55: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/55.jpg)
Flow Control
Flow control prevents the sending process f h l i th i ifrom overwhelming the receiving process.Flow control can be handled a variety of yways - this is one of the major research issues in the development of the nextissues in the development of the next generation of networks (ATM).
Computers as Components 55
![Page 56: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/56.jpg)
Byte Stream vs. Message
Byte stream implies an ordered sequence f b t ith b d iof bytes with no message boundaries.
Message oriented services provide g pcommunication service to chunks of data called datagramscalled datagrams.
Computers as Components 56
![Page 57: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/57.jpg)
Full- vs. Half-Duplex
Full-Duplex services support the transfer f d t i b th di tiof data in both directions.
H lf D l i h fHalf-Duplex services support the transfer of data in a single direction.g
Computers as Components 57
![Page 58: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/58.jpg)
End-to-End vs. Hop-to-Hop
Many service modes/features such as flow t l d t l b dcontrol and error control can be done
either:between endpoints of the communication.
-or-orbetween every 2 nodes on the path between
the endpointsthe endpoints.
Computers as Components 58
![Page 59: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/59.jpg)
End-to-End
Process AProcess A
Process B
Computers as Components 59
![Page 60: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/60.jpg)
H b HHop-by-Hop
Process A
Process B
Computers as Components 60
![Page 61: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/61.jpg)
Buffering
Buffering can provide more efficient communicationscommunications. Buffering is most useful for byte stream
iservices.
Process A Process BSendBuffer
Recv.Buffer
Computers as Components 61
![Page 62: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/62.jpg)
Addresses
Each communication endpoint must have ddan address.
Consider 2 processes communicating over p gan internet:
the network must be specifiedthe network must be specifiedthe host (end-system) must be specifiedthe process must be specified.
Computers as Components 62
![Page 63: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/63.jpg)
Add t LAddresses at Layers
Physical Layer: no address necessary
Data Link Layer - address must be able to select any host on the networkselect any host on the network.
Network Layer - address must be able to provide information to enable routing.
Transport Layer address must identifyTransport Layer - address must identify the destination process.
Computers as Components 63
![Page 64: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/64.jpg)
Broadcasts
Many networks support the notion of di f h t t llsending a message from one host to all
other hosts on the network.A special address called the “broadcast address” is often usedaddress is often used.Some popular network services are based on broadcasting (YP/NIS, rup, rusers)
Computers as Components 64
![Page 65: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/65.jpg)
H d hit tHardware architectures
Many different types of networks:topology;scheduling of communication;g ;routing.
Computers as Components 65
![Page 66: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/66.jpg)
P i t t i t t kPoint-to-point networks
One source, one or more destinations, no d t it hi ( i l t)data switching (serial port):
PE 1 PE 2 PE 3PE 1 PE 2 PE 3
link 1 link 2
Computers as Components 66
![Page 67: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/67.jpg)
B t kBus networks
Common physical connection:
PE 1 PE 2 PE 3 PE 4
header address data ECC packet format
Computers as Components 67
![Page 68: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/68.jpg)
B bit tiBus arbitration
Fixed: Same order of resolution every titime.Fair: every PE has same access over long y gperiods.
round robin: rotate top priority among PEsround-robin: rotate top priority among PEs.fixed A B C A B C
A B C
round-robinA B C AB C
Computers as Components 68
A,B,C A,B,C
![Page 69: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/69.jpg)
C bCrossbar
out4
out3
out2
in1 in2 in3 in4
out1
Computers as Components 69
![Page 70: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/70.jpg)
C b h t i tiCrossbar characteristics
Non-blocking (?)Can handle multiple multi-cast combinations.Size proportional to n2.
Computers as Components 70
![Page 71: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/71.jpg)
M lti t t kMulti-stage networks
Use several stages of switching elements.Often blocking.Often smaller than crossbarOften smaller than crossbar.
Computers as Components 71
![Page 72: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/72.jpg)
M b d iMessage-based programming
Transport layer provides message-based i i t fprogramming interface:
send_msg(adrs,data1);
Data must be broken into packets at source reassembled at destinationsource, reassembled at destination.Message passing: blockingNonblocking network interface requires a queue of data to be sent
Computers as Components 72
queue of data to be sent
![Page 73: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/73.jpg)
M b d iMessage-based programming
Data-push programming: make things h i t k b d d thappen in network based on data transfers.Data-push programming makes sense for periodic data which reduces data trafficperiodic data, which reduces data traffic on the network by automatically sending it when it is neededit when it is needed.
Computers as Components 73
![Page 74: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/74.jpg)
D t h t kData-push network
Computers as Components 74
![Page 75: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/75.jpg)
S t bSystem buses
Multibus [Intel] &VME [Motorola]: multi-d t tcard computer system
ISA bus: I/O cards for PC-based systems/ yPCI bus: high-speed interfaces for PC-based applications; replace ISAbased applications; replace ISA
Computers as Components 75
![Page 76: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/76.jpg)
I t ti t kInterconnection networks
For embedded systemsI2C bus: microcontroller-based systemsCAN bus: for automotive electronicsCAN bus: for automotive electronicsEchelon LON network: for home and i d i l iindustrial automation
Computers as Components 76
![Page 77: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/77.jpg)
I2C bI2C bus
Designed for low-cost, medium data rate applicationsapplications.Command interface in a MPEG2 video chipCharacteristics:
serial;;multiple-master;fixed-priority arbitrationfixed-priority arbitration.
Several microcontrollers come with built-in I2C t ll
Computers as Components 77
controllers.
![Page 78: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/78.jpg)
I2C bI2C bus
~ up to 100 kbps (standard) ~up to 400 bps (extended)(extended)Two lines
SDL: serial data lineSCL: serial clock line
Computers as Components 78
![Page 79: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/79.jpg)
I2C h i l lI2C physical layer
master 1 master 2SDL
data line
SCL
Sclock line
slave 1 slave 2
Computers as Components 79
![Page 80: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/80.jpg)
I2C d t f tI2C data format
SCL ......
SDL ...
MSBstart ack stop
Computers as Components 80
![Page 81: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/81.jpg)
I2C l t i l i t fI2C electrical interface
+Open collector interface:
SDL+
SCL
Computers as Components 81
![Page 82: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/82.jpg)
I2C i liI2C signaling
Sender pulls down bus for 0.Sender listens to bus---if it tried to send a 1 and heard a 0, someone else is ,simultaneously transmitting.Transmissions occur in 8 bit bytesTransmissions occur in 8-bit bytes.
Computers as Components 82
![Page 83: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/83.jpg)
I2C d t li k lI2C data link layer
Every device has an address (7 bits in t d d 10 bit i t i )standard, 10 bits in extension).
Bit 8 of address signals read or write.
General call address allows broadcast.
Computers as Components 83
![Page 84: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/84.jpg)
I2C b bit tiI2C bus arbitration
Sender listens while sending address.When sender hears a conflict, if its address is higher, it stops signaling.g , p g gLow-priority senders relinquish control early enough in clock cycle to allow bit toearly enough in clock cycle to allow bit to be transmitted reliably.
Computers as Components 84
![Page 85: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/85.jpg)
I2C t i iI2C transmissions
multi-byte write
d f l
S adrs 0 data data P
read from slave
S adrs 1 data P
write, then read
S adrs 1 data P
,S adrs 0 data S adrs 1 data P
Computers as Components 85
![Page 86: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/86.jpg)
B t ti th I2CBus transactins on the I2C
Multi-byte write
Read from slave
Read after write
Computers as Components 86
![Page 87: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/87.jpg)
Eth tEthernet
Dominant non-telephone LAN.HistoryHistory
Developed by Bob Metcalfe and others at Xerox PARC in mid-1970sRoots in Aloha packet-radio networkStandardized by Xerox, DEC, and Intel in 1978LAN standards define MAC and physical layerLAN standards define MAC and physical layer connectivity⌧IEEE 802.3 (CSMA/CD - Ethernet) standard – originally
2Mbps2Mbps⌧IEEE 802.3u standard for 100Mbps Ethernet⌧IEEE 802.3z standard for 1,000Mbps Ethernet
Computers as Components 87
![Page 88: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/88.jpg)
O i f Eth tOverview of Ethernet
Ethernet is the most popular network architecture Advantages: easy to install scalable broad mediaAdvantages: easy to install, scalable, broad media support, and low costSupported transmission speeds: 10 Mbps to 10 GbpsSupported transmission speeds: 10 Mbps to 10 GbpsUses the NIC’s MAC address to address framesEthernet variations are compatible with one anotherEthernet variations are compatible with one another⌧Basic operation and frame formatting is the same⌧Cabling speed of transmission and method by⌧Cabling, speed of transmission, and method by
which bits are encoded on the medium differ
Computers as Components 88
![Page 89: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/89.jpg)
Eth t O tiEthernet Operation
Ethernet is a best-effort delivery systemIt works at the Data Link layer of the OSI modelIt works at the Data Link layer of the OSI model⌧Relies on the upper-layer protocols to ensure
reliable delivery of datareliable delivery of dataUnderstanding the following concepts is important:
How Ethernet accesses network mediaHow Ethernet accesses network mediaCollisions and collision domainsHow Ethernet handles errorsHow Ethernet handles errorsHalf-duplex and full-duplex communications
Computers as Components 89
![Page 90: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/90.jpg)
A i N t k M diAccessing Network Media
Ethernet uses CSMA/CD in a shared-di i t ( l i l b )media environment (a logical bus)Ethernet device listens for a signal or carrier (carrier sense) on the medium firstIf no signal is present, no other device is o s g a s p ese t, o ot e de ce susing the medium, so a frame can be sentEthernet devices have circuitry that detectsEthernet devices have circuitry that detects collisions and automatically resends the frame that was involved in the collision
Computers as Components 90
that was involved in the collision
![Page 91: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/91.jpg)
Eth t t lEthernet topology
Bus-based system, several possible h i l lphysical layers:
A B C
Computers as Components 91
![Page 92: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/92.jpg)
C lli i D iCollision Domains
Computers as Components 92
![Page 93: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/93.jpg)
Eth t E H dliEthernet Error Handling
Collisions are the only type of error for which Ethernet automatically attempts to resend the dataErrors can occur when data is altered in medium
Usually caused by noise or faulty media connectionsWhen the destination computer receives a frame, the CRC is recalculated and compared against the CRC
l hvalue in the FCS If values match, the data is assumed to be okayIf values don’t match, the data was corrupted⌧Destination computer discards the frame
Computers as Components 93
⌧No notice is given to the sender
![Page 94: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/94.jpg)
Half-Duplex Versus Full-D l C i tiDuplex Communications
When half-duplex communication is used with Ethernet CSMA/CD must also be usedwith Ethernet, CSMA/CD must also be usedWhen using a switched topology, a computer
d d i d t i lt l (f llcan send and receive data simultaneously (full-duplex communication)
The collision detection circuitry is turned off because collisions aren’t possibleResults in a considerable performance advantage
Computers as Components 94
g
![Page 95: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/95.jpg)
Eth t St d dEthernet Standards
Each Ethernet variation is associated with an IEEE standardIEEE standardThe following sections discuss many of the t d d f hi h b l t h dstandards, some of which are obsolete or had
limited useKeep in mind that Ethernet over UTP cabling has been the dominant technology since the early 1990s, and will likely to continue to be for the foreseeable future
Computers as Components 95
![Page 96: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/96.jpg)
Physical Layer Configurations f 802 3for 802.3
Physical layer configurations are specified in threePhysical layer configurations are specified in three partsData rate (10, 100, 1,000)a a a e ( 0, 00, ,000)
10, 100, 1,000MbpsSignaling method (base, broad)
Baseband⌧Digital signaling
Broadband (Obsolete?)Broadband (Obsolete?)⌧Analog signaling
Cabling (2, 5, T, F, S, L)5 Thi k ( i i l E h bli )5 - Thick coax (original Ethernet cabling)F – Optical fiberS – Short wave laser over multimode fiber
Computers as Components 96L – Long wave laser over single mode fiber
![Page 97: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/97.jpg)
100 Mb IEEE St d d100 Mbps IEEE Standards
The most widely accepted Ethernet standard today is 100BaseT, which is also called fast yEthernet
The current IEEE standard for 100BaseT is 802.3u⌧Subcategories:
• 100BaseTX: Two-pair Category 5 or higher UTP100BaseT4: Four pair Category 3 or higher UTP• 100BaseT4: Four-pair Category 3 or higher UTP
• 100BaseFX: Two-strand fiber-optic cableBecause of its widespread use, the cable and equipment in fastBecause of its widespread use, the cable and equipment in fast Ethernet are inexpensiveArchitecture of choice for all but heavily used servers and multimedia applications
Computers as Components 97
multimedia applications
![Page 98: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/98.jpg)
100BaseT Design C id tiConsiderations
Computers as Components 98
![Page 99: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/99.jpg)
100BaseT Design C id ti ( ti d)Considerations (continued)
Computers as Components 99
![Page 100: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/100.jpg)
10 Mb IEEE St d d10 Mbps IEEE Standards
Four major implementations of 10 Mbps EthernetEthernet
10Base5: Ethernet using thicknet coaxial cable10B 2 Eth t i thi t i l bl10Base2: Ethernet using thinnet coaxial cable10BaseT: Ethernet over UTP cable
h f b bl10BaseF: Ethernet over fiber-optic cable
Of these 10 Mbps standards, only 10BaseT and 10BaseF are seen today10Base2 and 10Base5 are essentially obsolete
Computers as Components 100
y
![Page 101: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/101.jpg)
10B T10BaseT
Computers as Components 101
![Page 102: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/102.jpg)
Gigabit Ethernet
Gigabit Ethernet implementations802.3z-1998 covers 1000BaseX specifications, including the L (long wavelength laser/fiber-optic), S (short wavelength laser/fiber-optic), and C (copper jumper cables)802.3ab-1999 covers 1000BaseT specifications, which require four pairs of 100 ohm Category 5 or higher cable
Computers as Components 102
g y g
![Page 103: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/103.jpg)
1000B T1000BaseT
Computers as Components 103
![Page 104: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/104.jpg)
10 Gi bit Eth t10 Gigabit Ethernet
Defined to run only on fiber-optic cabling, both SMF and MMF on a maximum distance of 40 kmMMF, on a maximum distance of 40 km
Provides bandwidth that can transform how WAN speeds are thought ofspeeds are thought of
Runs in full-duplex mode onlyCSMA/CD is not necessaryCSMA/CD is not necessary
Primary use: as network backboneIt also has its place in storage area networks (SANs)It also has its place in storage area networks (SANs) Will be the interface for enterprise-level servers
Computers as Components 104
![Page 105: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/105.jpg)
Wh t’ N t f Eth t?What’s Next for Ethernet?
Implementations of 40 Gbps Ethernet are underwayEthernet could increase tenfold every 4 6 yearsEthernet could increase tenfold every 4-6 years
100 Gbps Ethernet available by 2006 to 2008, terabit Ethernet by 2011 and 10 terabit Ethernet by 2015Ethernet by 2011, and 10 terabit Ethernet by 2015
In October 2005, Lucent Technologies demonstrated for the first time the transmission of Ethernet over fiber-the first time the transmission of Ethernet over fiberoptic cable at 100 Gbps
It will be able to transfer data across the city faster ythan today’s CPUs can transfer data to memoryThis level of speed has major implications for the
Computers as Components 105
entertainment industry and many other areas
![Page 106: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/106.jpg)
Eth t F TEthernet Frame Types
Ethernet supports four non-compatible frame typesEthernet 802 3: used by IPX/SPX on Novell NetWareEthernet 802.3: used by IPX/SPX on Novell NetWare 2.x and 3.x networksEthernet 802.2: used by IPX/SPX on Novell NetWare 3.12 and 4.x networks⌧Supported by default in Microsoft NWLink
Eth t SNAP d i Eth T lk d i fEthernet SNAP: used in EtherTalk and mainframesEthernet II is used by TCP/IP
All Ethernet frame types support a packet size betweenAll Ethernet frame types support a packet size between 64 and 1518 bytes, and can be used by all network architectures mentioned previously
Computers as Components 106
p y
![Page 107: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/107.jpg)
Eth t 802 3Ethernet 802.3
Computers as Components 107
![Page 108: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/108.jpg)
Eth t IIEthernet II
Computers as Components 108
![Page 109: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/109.jpg)
Wireless Ethernet: IEEE 802 11b d 802.11b, a, and g
AP serves as the center of a star topology networkStations can’t send and receive at the same time
CSMA/CA is used instead of CSMA/CD802.11b/a/g use handshaking before transmission
Station sends AP an RTS and it responds with CTSStandards define a maximum transmission rate, but speeds might be dropped to increase reliabilityNo fixed segment length
Maximum of 300 feet without obstructions⌧Can be extended with large, high-quality
Computers as Components 109
antennas
![Page 110: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/110.jpg)
Ethernet OverviewEthernet by definition is a broadcast protocol
Any signal can be received by all hostsAny signal can be received by all hostsSwitching enables individual hosts to communicatecommunicate
Network layer packets are transmitted over an Ethernet by encapsulatingan Ethernet by encapsulatingFrame Format
Destaddr
64 48 32
CRCPreamble Srcaddr Type Body
1648
Computers as Components 110
addr addr
![Page 111: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/111.jpg)
Eth t k t f tEthernet packet format
preamble startframe
sourceadrs
destadrs
datapayloadlength padding CRC
Computers as Components 111
![Page 112: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/112.jpg)
Eth t FEthernet Frames
Preamble is a sequence of 7 bytes, each set to “10101010”Used to synchronize receiver before actual data is senty
Addressesunique, 48-bit unicast address assigned to each adapter⌧example: 8:0:e4:b1:2⌧Each manufacturer gets their own address range
broadcast: all 1smulticast: first bit is 1
T fi ld i d l i l i k d d i hi hType field is a demultiplexing key used to determine which higher level protocol the frame should be delivered toBody can contain up to 1500 bytes of data
Computers as Components 112
Body can contain up to 1500 bytes of data
![Page 113: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/113.jpg)
C t R d d t Ch kConcept: Redundant Check
Send a message M and a “check” word CSimple function on <M C> to determine if bothSimple function on <M,C> to determine if both received correctly (with high probability)E l XOR ll h b i M d d hExample: XOR all the bytes in M and append the “checksum” byte, C, at the end
Receiver XORs <M,C> What should result be?What errors are caught? ***
Computers as Components 113
bit i is XOR of ith bit of each byte
![Page 114: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/114.jpg)
E l TCP Ch kExample: TCP ChecksumTCP Packet Format
Application(HTTP,FTP, DNS)7
TCP Packet Format
Transport(TCP, UDP)Network
4
Network(IP)
Data Link2
3
(Ethernet, 802.11b)
Physical1
2
• TCP Checksum a 16-bit checksum, consisting of the one's complement of the one's complement sum of the contents of the TCP segment header and data iscontents of the TCP segment header and data, is computed by a sender, and included in a segment transmission. (note end-around carry)
• Summing all the words including the checksum word
Computers as Components 114
• Summing all the words, including the checksum word, should yield zero
![Page 115: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/115.jpg)
Wh t i thi ‘ k t h k ’?What is this ‘packet checksum’?
According to the Intel documentation, the packet checksum is “the unadjusted 16 bit onespacket checksum is the unadjusted 16-bit ones complement of the packet”N h t tl d th t ?Now what exactly does that mean?And why did Intel’s hardware designers believe that device-driver software would need this value to be available for every ethernet packet that the NIC receives?
Computers as Components 115
![Page 116: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/116.jpg)
‘ d d ’‘end-around-carry’
When you want to add two binary numbers using the one’s complement system, you can dousing the one s complement system, you can do it by first performing ordinary binary addition, and then adding in the carry-bit:g y
10101010 (-85)+ 11110000 (-15)
---------------------1 10011010 (9-bits in the normal total)1 10011010 (9 bits in the normal total)
+ 1 (apply ‘end-around carry’)---------------------
10011011 ( 100 8 bit i th l t t t l)
Computers as Components 116
10011011 (-100: 8-bits in the ones-complement total)
![Page 117: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/117.jpg)
NIC ‘ ’ l t’NIC uses ‘one’s complement’
For network programming nowadays it is common practice for ‘one’s complement’ to becommon practice for one s complement to be used when computing checksumsIt i l ti f lti b tIt is also common practice for multi-byte integers to be ‘sent out over the wire’ in so
ll d ‘bi di ’ b t d (i th tcalled ‘big-endian’ byte-order (i.e., the most significant byte goes out ahead of the bytes h i l i ifi )having lesser significance)
Computers as Components 117
![Page 118: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/118.jpg)
I t l ‘littl di ’Intel uses ‘little endian’
Whenever our x86 processor ‘stores’ a multi-byte value into a series of cells in memory itbyte value into a series of cells in memory, it puts the least significant byte first (i.e., at the earliest memory address) followed by theearliest memory address), followed by the remaining bytes having greater significance)
0x3456AX = 0x3456AX
0x56buf: 0x34
mov %ax, buf
Computers as Components 118
0x56buf: 0x34
![Page 119: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/119.jpg)
E l Eth t CRC 32Example: Ethernet CRC-32
Application(HTTP FTP DNS)7 (HTTP,FTP, DNS)
Transport(TCP, UDP)4 ( , )Network
(IP)3
Data Link
(Ethernet, 802.11b)
Physical
2
Physical1
Computers as Components 119
![Page 120: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/120.jpg)
CRC t CRC concept A msg polynomial M(x) of degree mA msg polynomial M(x) of degree mA generator poly G(x) of degree mLet r(x) = remainder of M(x) xn / G(x)( ) ( ) / ( )
M(x) xn = G(x)p(x) + r(x)r(x) is of degree n
Wh i (M( ) ( )) / G( ) ?n bits of zero at the end
What is (M(x) xn – r(x)) / G(x) ?
Send M(x) xn r(x)Send M(x) xn – r(x) m+n degree polynomialDivide by G(x) to checky ( )M(x) is just the m most signficant coefficients, r(x) the lower m
n bit Message is viewed as coefficients of n degreeComputers as Components 120
n-bit Message is viewed as coefficients of n-degree polynomial over binary numbers
![Page 121: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/121.jpg)
CSMA/CDCSMA/CD
CSMA/CD: Ethernet’s Media Access Control (MAC) policy
CS = carrier sense⌧Send only if medium is idle
MA = multiple accessMA = multiple accessCD = collision detection⌧Stop sending immediately if collision is detected⌧Stop sending immediately if collision is detected
Carrier sense multiple access with collision detection:
sense collisions;exponentially back off in time;retransmit
Computers as Components 121
retransmit.
![Page 122: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/122.jpg)
E ti l b k ff tiExponential back-off times
time
Computers as Components 122
![Page 123: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/123.jpg)
CollisionsCollisions
Collisions are caused when two adaptors transmit at the same time (adaptors sense collision based on voltage differences)
• Both found line to be idle• Both had been waiting to for a busy line to become idle
A BA starts attime 0
A BMessage almost there at time T whenB starts – collision!B starts collision!
How can we be sure A knows about the collision?
Computers as Components 123
![Page 124: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/124.jpg)
Collision Detection contdCollision Detection contd.
A BA Btime = 0
A B
time = T
A B
time = 2T
Computers as Components 124
![Page 125: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/125.jpg)
C lli i D t ti Collision Detection H A k th t lli i h t k l ?How can A know that a collision has taken place?
There must be a mechanism to insure retransmission on collisionA’s message reaches B at time TA s message reaches B at time TB’s message reaches A at time 2TSo, A must still be transmitting at 2T
f l f bIEEE 802.3 specifies max value of 2T to be 51.2usThis relates to maximum distance of 2500m between hostsAt 10Mbps it takes 0 1us to transmit one bit so 512 bits (64B) takeAt 10Mbps it takes 0.1us to transmit one bit so 512 bits (64B) take 51.2us to sendSo, Ethernet frames must be at least 64B long⌧14B header 46B data 4B CRC⌧14B header, 46B data, 4B CRC⌧Padding is used if data is less than 46B
Send jamming signal of 48 bits after collision is detected to
Computers as Components 125
j g ginsure all hosts see collision
![Page 126: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/126.jpg)
Exponential BackoffExponential BackoffIf a collision is detected, delay and try againDelay time is selected using binary exponential backoff
1 t ti h K f {0 1} th d l K * 51 21st time: choose K from {0,1} then delay = K * 51.2us2nd time: choose K from {0,1,2,3} then delay = K * 51.2usnth time: delay = K x 51.2us, for K=0..2n – 1⌧Note max value for k = 1023
f l ( ll )give up after several tries (usually 16)⌧Report transmit error to host
Wh t j t h f ll t f KWhy not just choose from small set for KThis works fine for a small number of hostsL b f d ld lt i lli i
Computers as Components 126
Large number of nodes would result in more collisions
![Page 127: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/127.jpg)
Fi ldbFieldbus
Used for industrial control and i t t ti f t i tinstrumentation---factories, etc.H1 standard based on 31.25 MB/s twisted /pair medium.High Speed Ethernet (HSE) standardHigh Speed Ethernet (HSE) standard based on 100 Mb/s Ethernet is used for backbone networks in industrial plants.
Computers as Components 127
![Page 128: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/128.jpg)
N t kNetworks
Network-based design.Communication analysis.System performance analysis.y p y
Internet.I t t bl d tInternet-enabled systems.Vehicles as networks.Sensor networks
Computers as Components 128
![Page 129: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/129.jpg)
C i ti l iCommunication analysis
First, understand delay for single message.Delay for multiple messages depends on:y p g p
network protocol;devices on networkdevices on network.
Computers as Components 129
![Page 130: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/130.jpg)
M d lMessage delay
Assume:single message;no contention.
Delay:t t + t + ttm = tx + tn + tr
= xmtr overhead + network xmit time + rcvr overhead
Computers as Components 130
![Page 131: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/131.jpg)
E l I2C d lExample: I2C message delay
Network transmission time dominates.A 100 kbit / 8 bit b tAssume 100 kbits/sec, one 8-bit byte.Number of bits in packet:
npacket = start + address + data + stop= 1 + 8 + 8 + 1 = 18 bits
Time required to transmit: 1.8 x 10-4 sec.20 instructions on 8 MHz controller adds 2 5 x20 instructions on 8 MHz controller adds 2.5 x 10-6 delay on xmtr, rcvr.Tm =2 5 us +180 us + 2 5 us = 185 us
Computers as Components 131
Tm =2.5 us +180 us + 2.5 us = 185 us
![Page 132: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/132.jpg)
M lti l Multiple messages
If messages can interfere with each other, l i i lanalysis is more complex.
Model total message delay:g yty = td + tm
= wait time for network + message delay= wait time for network + message delay
Computers as Components 132
![Page 133: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/133.jpg)
A bit ti d d lArbitration and delayFixed-priority arbitration introduces unbounded delay for all but highest-y gpriority device.
Unless higher-priority devices are known toUnless higher-priority devices are known to have limited rates that allow lower devices to transmittransmit.
Round-robin arbitration introduces bounded delay proportional to the number of devices (N).
Computers as Components 133
( )
![Page 134: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/134.jpg)
F th li tiFurther complications
Acknowledgment time.Transmission errors.
Computers as Components 134
![Page 135: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/135.jpg)
P i it i i i t kPriority inversion in networks
In many networks, a packet cannot be i t t dinterrupted.Result is priority inversion:p y
low-priority message holds up higher-priority messagemessage.
Doesn’t cause deadlock, but can slow d i t t i tidown important communications.
Computers as Components 135
![Page 136: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/136.jpg)
M ltih t kMultihop networks
In multihop networks, one node receives th t it t d ti timessage, then retransmits to destination
(or intermediate).hop 1 hop 2
A B CNetwork 1 Network 2
Computers as Components 136
![Page 137: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/137.jpg)
S t f l iSystem performance analysis
System analysis is difficult in general.multiprocessor performance analysis is hard;communication performance analysis is hard.p y
Simple example: uncertainty in P1 finish time -> uncertainty in P2 start timetime -> uncertainty in P2 start time.
P1 P2
Computers as Components 137
![Page 138: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/138.jpg)
A l i h llAnalysis challenges
P2 and P3 can delay each other even P1each other, even though they are in separate tasksseparate tasks.Delays in P1
t t P2 th
P2
P3propagate to P2, then P3, then to P4.
P4P4
Computers as Components 138
![Page 139: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/139.jpg)
L b d tLower bounds on system
Computational requirements:
Communication requirements:requirements:
sum up process requirements over
requirements:Count all transmissions in onerequirements over
least-common multiple of periods, average
transmissions in one period.
p , gover one period.
Computers as Components 139
![Page 140: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/140.jpg)
H d l tf d iHardware platform design
Need to choose:number and types of PEs;number and types of networks.yp
Evaluate a platform by allocating processes scheduling processes andprocesses, scheduling processes and communication.
Computers as Components 140
![Page 141: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/141.jpg)
I/O i t i tI/O-intensive systems
Start with I/O devices, then consider t ticomputation:
catalog required devices;identify critical deadlines;chooses devices that can share PEs;chooses devices that can share PEs;analyze communication times;h PE i h d ichoose PEs to go with devices.
Computers as Components 141
![Page 142: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/142.jpg)
C t ti i t i tComputation-intensive systems
Start with shortest-deadline tasks:Put shortest-deadline tasks on separate PEs.Check for interference on critical communications.Allocate low-priority tasks to common PEsAllocate low priority tasks to common PEs wherever possible.
Balance loads wherever possibleBalance loads wherever possible.
Computers as Components 142
![Page 143: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/143.jpg)
Internet-enabled b dd d tembedded system
Internet-enabled embedded system: any embedded system that includes an Internetembedded system that includes an Internet interface (e.g., refrigerator).I t t li b dd d t d i dInternet appliance: embedded system designed for a particular Internet task (e.g. email).Examples:
Cell phone.Laser printer.
Computers as Components 143
![Page 144: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/144.jpg)
TCP/IP & OSITCP/IP & OSI
In OSI reference model terminology -the TCP/IP protocol suite covers thethe TCP/IP protocol suite covers the transport and network layers.
TCP/IP can be used on many data-TCP/IP can be used on many datalink layers (can support many network hardware implementations)network hardware implementations).
Computers as Components 144
![Page 145: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/145.jpg)
I t t P t lInternet Protocol
Internet Protocol (IP) is basis for Internet.IP i th t k lIP is the network layer
packet delivery service (host-to-host).translation between different data-link protocols.
Provides an internetworking standard: between two Ethernets, Ethernet and token ring, etc.Higher-level services are built on top of IP.g p
Computers as Components 145
![Page 146: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/146.jpg)
IP i i tiIP in communication
application application
presentation
session
presentation
session
network
transport
network
transport
networkIPIP IPdata link
network
data link
network
data link
networkIPIP IP
physical physicalphysical
node A router dComputers as Components 146
node A router node B
![Page 147: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/147.jpg)
I t t tiInternet routing
Best effort routing:doesn’t guarantee data delivery at IP layer.
Routing can vary:Routing can vary:session to session;packet to packetpacket to packet.
Computers as Components 147
![Page 148: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/148.jpg)
Hi h l l I t t iHigher-level Internet services
Transmission Control Protocol (TCP) id ti i t d iprovides connection-oriented service.
Quality-of-service (QoS) guaranteed Q y (Q ) gservices are under development.
Computers as Components 148
![Page 149: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/149.jpg)
Th I t t i t kThe Internet service stack
SNMPFTP HTTP SMTP telnet Application(HTTP,FTP, DNS)7
UDPTCP Transport(TCP, UDP)4
IPNetwork
(IP)
Data Link
3
FTP: file transfer protocolHTTP: hypertext transport protocolSMTP i l il f l
Data Link
(Ethernet, 802.11b)
Physical
2
SMTP: simple mail transfer protocolSNMP: simple network management protocolUDP: user datagram protocol
Physical1
Computers as Components 149
![Page 150: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/150.jpg)
IP k tIP packet
Includes:version, service type, lengthtime to live, protocol, psource and destination addressdata payloaddata payload
Maximum data payload is 65,535 bytes.
Computers as Components 150
![Page 151: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/151.jpg)
IP Datagrams
IP provides connectionless, li bl d li f IP d tunreliable delivery of IP datagrams.
Connectionless: each datagram is independent of all others.Unreliable: there is no guarantee that gdatagrams are delivered correctly or even delivered at all.
An IP packet is called a datagramComputers as Components 151
An IP packet is called a datagram
![Page 152: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/152.jpg)
IP Datagram
VERS HL Fragment LengthService1 byte1 byte 1 byte 1 byte
SFragment Offset
ag e t e gtSe ceDatagram ID FLAG
TTL (time to live) Protocol Header ChecksumTTL (time to live) Protocol Header ChecksumSource Address
Destination AddressDestination AddressOptions (if any)
Data
Computers as Components 152
![Page 153: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/153.jpg)
IP ddIP addresses
32 bits in early IP, 128 bits in IPv6.Typically written in form xxx.xx.xx.xx.Names (foo baz com) translated to IPNames (foo.baz.com) translated to IP address by domain name server (DNS).
Computers as Components 153
![Page 154: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/154.jpg)
IP AddressesIP Addresses
IP addresses are not the same as the underlying data link (MAC) addressesunderlying data-link (MAC) addresses.
Why ?Why ?Why ?Why ?
Computers as Components 154
![Page 155: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/155.jpg)
IP AddressesIP Addresses
IP is a network layer - it must be capable of providing communication betweenof providing communication between hosts on different kinds of networks (different data link implementations)(different data-link implementations).The address must include information about what network the receiving host is on. This is what makes routing feasible.on. This is what makes routing feasible.
Computers as Components 155
![Page 156: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/156.jpg)
IP Addresses
IP addresses are logical addresses (not physical)physical)32 bits.
IPv4 (version 4)
Includes a network ID and a host ID.Every host must have a unique IP address.Every host must have a unique IP address.IP addresses are assigned by a central authority (American Registry for Internetauthority (American Registry for Internet Numbers for North America).
Computers as Components 156
![Page 157: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/157.jpg)
Formats of IP AddressesFormats of IP Addresses
ClassClassAA 0 NetID HostIDAA
10 NetID HostIDBB
110 NetID HostIDCC
1110 Multicast AddressDD
Computers as Components 157
8 bits 8 bits 8 bits8 bits
![Page 158: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/158.jpg)
Formats of IP AddressesClass AClass AClass AClass A
Formats of IP AddressesClass AClass A
128 possible network IDsover 4 million host IDs per network ID
Class AClass A128 possible network IDsover 4 million host IDs per network IDover 4 million host IDs per network IDover 4 million host IDs per network ID
Class BClass BClass BClass B16K possible network IDs64K host IDs per network ID64K host IDs per network ID
Class CClass Cover 2 million possible network IDsabout 256 host IDs per network ID
Computers as Components 158
about 256 host IDs per network ID
![Page 159: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/159.jpg)
Network and Host IDs
A Network ID is assigned to an organization by a global authorityorganization by a global authority.
Host IDs are assigned locally by a system administrator.y
Both the Network ID and the HostBoth the Network ID and the Host ID are used for routing.
Computers as Components 159
![Page 160: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/160.jpg)
IP Addresses
IP Addresses are usually shown in dotted d i l t tidecimal notation:
1.2.3.4 00000001 00000010 00000011 00000100cs.rpi.edu is 128.213.1.1
10000000 11010101 00000001 0000000110000000 11010101 00000001 00000001
CS has a class B networkCS has a class B network
Computers as Components 160
![Page 161: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/161.jpg)
Host and Network Addresses
A single network interface is assigned a single IP address calledassigned a single IP address called the host address. A h h l i lA host may have multiple interfaces, and therefore multiple host addresses.Hosts that share a network all have the same IP network address (the network ID).
Computers as Components 161
network ID).
![Page 162: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/162.jpg)
IP Broadcast and Network Addresses
An IP broadcast addresses has a host ID of all 1sof all 1s.IP broadcasting is not necessarily a true b d i li h d l ibroadcast, it relies on the underlying hardware technology. An IP address that has a host ID of all 0s is called a network address and refers to an entire network.
Computers as Components 162
![Page 163: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/163.jpg)
Subnet Addresses
An organization can subdivide it’s host address space into groups called subnetsaddress space into groups called subnets.The subnet ID is generally used to group hosts based on the physical networkhosts based on the physical network topology.
10 NetID SubnetID HostID10 NetID SubnetID HostID
Computers as Components 163
![Page 164: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/164.jpg)
S b ttiSubnetting
router
Subnet 1 Subnet 2 Subnet 3128.213.1.x 128.213.2.x 128.213.3.x
Computers as Components 164
![Page 165: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/165.jpg)
Subnetting
Subnets can simplify routing.IP subnet broadcasts have a hostID of all 1s.It is possible to have a single wire networkIt is possible to have a single wire network with multiple subnets.
Computers as Components 165
![Page 166: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/166.jpg)
Mapping IP Addresses to pp gHardware Addresses
IP Addresses are not recognized by h dhardware.If we know the IP address of a host, how e o t e add ess o a ost, odo we find out the hardware address ?The process of finding the hardwareThe process of finding the hardware address of a host given the IP address is called Address ResolutionAddress Resolution
Computers as Components 166
![Page 167: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/167.jpg)
Reverse Address Resolution
The process of finding out the IP address f h t i h d dd iof a host given a hardware address is
called Reverse Address ResolutionReverse Address Resolution
Reverse address resolution is needed byReverse address resolution is needed by diskless workstations when booting (which used to be quite common).
Computers as Components 167
![Page 168: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/168.jpg)
ARPARP
The Address Resolution Protocol is used by a sending host when it knows the IP address of the destination but needs the Ethernet (or (whatever) address.ARP is a broadcast protocol every host onARP is a broadcast protocol - every host on the network receives the request.Each host checks the request against it’s IP address - the right one responds.
Computers as Components 168
address the right one responds.
![Page 169: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/169.jpg)
ARP (cont.)
ARP does not need to be done every ti IP d t i t h ttime an IP datagram is sent - hosts remember the hardware addresses of each other.Part of the ARP protocol specifiesPart of the ARP protocol specifies that the receiving host should also remember the IP and hardwareremember the IP and hardware addresses of the sending host.
Computers as Components 169
![Page 170: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/170.jpg)
ARP tiARP conversation
HEY - Everyone please listen! Will 128.213.1.5 please send me . . . phis/her Ethernet address?
not me
Hi Green! I’m 128 213 1 5 and myHi Green! I m 128.213.1.5, and my Ethernet address is 87:A2:15:35:02:C3
Computers as Components 170
![Page 171: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/171.jpg)
RARP conversationRARP conversation
HEY - Everyone please listen! My Ethernet address is 22:BC:66:17:01:75.Does anyone know my IP address ?
not me
Hi Green! Your IP address is
not me
Computers as Components 171
128.213.1.17.
![Page 172: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/172.jpg)
Services provided by IP
Connectionless Delivery (each datagram is treated individually)datagram is treated individually).Unreliable (delivery is not
d)guaranteed).Fragmentation / Reassembly g / y(based on hardware MTU).RoutingRouting.Error detection.
Computers as Components 172
![Page 173: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/173.jpg)
IP Datagram FragmentationIP Datagram Fragmentation
Each fragment (packet) has the same structure as the IP datagramstructure as the IP datagram. IP specifies that datagram reassembly is done only at the destination (not on a hop-by-hop basis).y p )If any of the fragments are lost - the entire datagram is discarded (and an ICMP messagedatagram is discarded (and an ICMP message is sent to the sender).
Computers as Components 173
ICMP: internet control message protocol
![Page 174: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/174.jpg)
IP Flow Control & Error Detection
If packets arrive too fast - the receiver di d i k t d ddiscards excessive packets and sends an ICMP message to the sender (SOURCE QUENCH).If an error is found (header checksumIf an error is found (header checksum problem) the packet is discarded and an ICMP message is sent to the senderICMP message is sent to the sender.
Computers as Components 174
![Page 175: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/175.jpg)
ICMP E ICMP Error message
IP datagram
C
IP datagramis discarded
Host Host or router
ICMP ErrorMessage
ICMP error messages report error conditions
Host Host or router
ICMP error messages report error conditions Typically sent when a datagram is discardedyp y gError message is often passed from ICMP to the application program
Computers as Components 175
the application program
![Page 176: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/176.jpg)
ICMP protocol
ICMP is a protocol used for exchanging t lcontrol messages.
ICMP uses IP to deliver messages.gICMP messages are usually generated and processed by the IP software not the userprocessed by the IP software, not the user process.
Computers as Components 176
![Page 177: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/177.jpg)
ICMP Message Types
Echo RequestEcho ResponseEcho ResponseDestination UnreachableRedirectTi E d dTime ExceededRedirect (route change)( g )there are more ...
Computers as Components 177
![Page 178: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/178.jpg)
Transport Layer & TCP/IP
Process LayerProcess Process
TCP UDP
Process Layer
T
ocess ocess
TCP UDP Transport Layer
IP Network LayerICMP, ARP &
RARP
802.3 Data-Link LayerRARP
Computers as Components 178
y
![Page 179: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/179.jpg)
UDP (User Datagram Protocol)
UDP is a transport protocolcommunication between processes
UDP uses IP to deliver datagrams to the right hostright host.UDP uses ports to provide communication services to individual processes.
Computers as Components 179
![Page 180: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/180.jpg)
Ports
TCP/IP uses an abstract destination point ll d lcalled a protocol port.
Ports are identified by a positive integer.Ports are identified by a positive integer.Operating systems provide some
h i th t t ifmechanism that processes use to specify a port.
Computers as Components 180
![Page 181: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/181.jpg)
PortsHost AHost A Host BHost B
Process Process
Process Process
Process Process
Computers as Components 181
![Page 182: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/182.jpg)
TCPTCP
TCP is an alternative transport layer protocol supported by TCP/IP.TCP provides:TCP provides:
Connection-orientedReliableFull-duplexFull-duplexByte-Stream
Computers as Components 182
![Page 183: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/183.jpg)
Buffering
TCP is responsible for buffering data and d t i i h it i ti t ddetermining when it is time to send a datagram.
It is possible for an application to tell TCPIt is possible for an application to tell TCP to send the data it has buffered without
iti f b ff t fillwaiting for a buffer to fill up.
Computers as Components 183
![Page 184: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/184.jpg)
Full Duplex
TCP provides transfer in both directions (over a single virtual connection)(over a single virtual connection).
To the application program these appear as 2 unrelated data streams, although TCP , gcan piggyback control and data communication by providing control y p ginformation (such as an ACK) along with user data.
Computers as Components 184
user data.
![Page 185: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/185.jpg)
TCP Ports
Interprocess communication via TCP i hi d ith th fTCP is achieved with the use of ports (just like UDP).
UDP ports have no relation to TCPUDP ports have no relation to TCP ports (different name spaces).
Computers as Components 185
![Page 186: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/186.jpg)
TCP Segments
The chunk of data that TCP asks IP t d li i ll d TCP tto deliver is called a TCP segment.
Each segment contains:d t b t f th b t tdata bytes from the byte streamcontrol information that identifies the data bytes
Computers as Components 186
![Page 187: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/187.jpg)
TCP S t F t TCP Segment Format
Destination Port1 byte 1 byte
Source Port1 byte 1 byte
Destination PortSource PortSequence NumberRequest NumberRequest Number
offset Reser. Control WindowCh k U t P i t
Options (if any)Checksum Urgent Pointer
Data
Computers as Components 187
![Page 188: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/188.jpg)
Add i i TCP/IPAddressing in TCP/IP
Each TCP/IP address includes:Internet AddressProtocol (UDP or TCP)o o o (U o C )Port Number
NOTE: TCP/IP is a protocol suite that includes IP, TCP and UDPTCP and UDP.
Computers as Components 188
![Page 189: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/189.jpg)
TCP vs. UDPQ: Which protocol is better ?Q: Which protocol is better ?A: It depends on the application.A: It depends on the application.A: It depends on the application.A: It depends on the application.
TCP id tiTCP id ti i t d li bli t d li blTCP provides a connectionTCP provides a connection--oriented, reliable, oriented, reliable, byte stream service (lots of overhead).byte stream service (lots of overhead).
UDP offers minimal datagram delivery service UDP offers minimal datagram delivery service g yg y(as little overhead as possible).(as little overhead as possible).
Computers as Components 189
![Page 190: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/190.jpg)
TCP/IP SummaryTCP/IP Summary
IP: network layer protocolunreliable datagram delivery between g yhosts.
UDP: transport layer protocolUDP: transport layer protocolunreliable datagram delivery
b tbetween processes.
TCP: transport layer protocolTCP: transport layer protocolreliable, byte-stream delivery
between processes.
Computers as Components 190
between processes.
![Page 191: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/191.jpg)
E l JExample: Javacam
Hardware platform:parallel-port camera;National Semi NS486SXF;;1.5 Mbytes memory.
Uses memory efficient Java NanokernelUses memory-efficient Java Nanokernel.
Computers as Components 191
![Page 192: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/192.jpg)
J hit tJavacam architecture
Web browserQuickCamapplet
Q i kCHTTPQuickcam
QuickCamJava VM
server
Java nanokernel
486
Computers as Components 192
![Page 193: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/193.jpg)
V hi l t kVehicles as networks
1/3 of cost of car/airplane is electronics/avionicselectronics/avionics.Dozens of microprocessors are used throughout th hi lthe vehicle.Network applications:
Vehicle control.Instrumentation.Communication.Passenger entertainment systems.
Computers as Components 193
![Page 194: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/194.jpg)
CAN bCAN bus
First used in 1991.Serial bus 1 Mb/sec upSerial bus, 1 Mb/sec up to 40 m.Synchronous busSynchronous bus.Logic 0 dominates logic 1 on bus.o busArbitrated with CSMA/AMP:
Arbitration on message priority.
Computers as Components 194
![Page 195: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/195.jpg)
CAN d t fCAN data frame
11 bit destination addressaddress.RTR bit determines
d/ it f /tread/write from/to destination.Any node can detect bus error, interrupt packet for retransmission.
Computers as Components 195
![Page 196: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/196.jpg)
CAN t llCAN controller
Controller implements physical and data linkphysical and data link layers.N t k lNo network layer needed---bus
id d t dprovides end-to-end connections.
Computers as Components 196
![Page 197: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/197.jpg)
Oth hi l bOther vehicle busses
FlexRay is next generation:Time triggered protocolTime triggered protocol.10 Mb/s.
L l I t t N t k (LIN) tLocal Interconnect Network (LIN) connects devices in a small area (e.g., door).Passenger entertainment networks:
Bluetooth.Media Oriented Systems Transport (MOST).
Computers as Components 197
![Page 198: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/198.jpg)
A i iAvionics
Anything permanently attached to the aircraft must be certified by FAA/national agencymust be certified by FAA/national agency.Traditional architecture uses separate l t i f h i t t/d ielectronics for each instrument/device.
Line replaceable unit (LRU) can be physically d d l dremoved and replaced.
Federated architecture shares processors across b ( / )a subsystem (nav/comm, etc.)
Computers as Components 198
![Page 199: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/199.jpg)
S t kSensor networks
Wireless networks, small nodes.Ad hoc networks---organizes itself without system administrator:y
Must be able to declare membership in network find other networksnetwork, find other networks.Must be able to determine routes for data.M t d t fi ti dMust update configuration as nodes enter/leave.
Computers as Components 199
![Page 200: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/200.jpg)
N d bilitiNode capabilities
Must be able to turn radio on/off quickly ith l h dwith low power overhead.Communication/computation power = 100x.
Radios should operate at several different power levels to avoid interference withpower levels to avoid interference with other nodes.Must buffer, route network traffic.
Computers as Components 200
![Page 201: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/201.jpg)
N t kNetworks
Example: elevator controller.
Computers as Components 201
![Page 202: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/202.jpg)
T i lTerminology
Elevator car: holds passengers.Hoistway: elevator shaft.Car control panel: buttons in each carCar control panel: buttons in each car.Floor control panel: elevator request, etc.
flper floor.
Computers as Components 202
![Page 203: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/203.jpg)
El t tElevator system
floor
floor
floor
floor
floor
Hoistway 1 Hoistway 2
Computers as Components 203
Hoistway 1 Hoistway 2
![Page 204: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/204.jpg)
Th f tiTheory of operation
Each floor has control panel, display.Each car has control panel:
one button per floor;one button per floor;emergency stop.
C t ll d b i l t llControlled by a single controller.
Computers as Components 204
![Page 205: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/205.jpg)
El t iti iElevator position sensing
sensor
fine
coarse
Computers as Components 205
![Page 206: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/206.jpg)
El t t lElevator control
Elevator control has up and down.To stop, disable both.
Master controller:Master controller:reads elevator positions;reads requests;reads requests;schedules elevators;controls movement;controls doors.
Computers as Components 206
controls doors.
![Page 207: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/207.jpg)
Elevator system i trequirements
name elevator systeminputs F floor control, N position, N car
control, 1 masteroutputs F displays, N motor controllersfunctions responds to requests, operatesp q , p
safelyperformance elevator control is time-criticalmanufacturing cost electronics is small part of totalmanufacturing cost electronics is small part of totalpower electronics consumes small
fraction of totalh i l i / i ht bli i i t tphysical size/weight cabling is important
Computers as Components 207
![Page 208: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/208.jpg)
Elevator system class didiagram
Master-control-panel*Coarse-sensor*
1
Car
Master control panel
Fine-sensor*1
11N
11
Car
Controller
e se so
l l*
1
1
11
1 1
FloorCar-control-panel* 1
NF
11
Motor*Floor-control-panel* 1
Computers as Components 208
![Page 209: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/209.jpg)
Ph i l i t fPhysical interfaces
Sensor*hit: boolean
Car-control-panel*Floors[1 F]: booleanhit: boolean Floors[1..F]: booleanemergency-stop:
boolean
Coarse-sensor* Fine-sensor*open-door, close-door:
boolean
Master-control-panel...
Motor*
speed: {o,s,f}
Floor-control-panel*
up, down: boolean
Computers as Components 209
speed: {o,s,f} up, down: boolean
![Page 210: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/210.jpg)
C d Fl lCar and Floor classes
Car
request-lights[1..F]:
Floor
up light down light:q gboolean
current-floor: integer
up-light, down-light:boolean
Computers as Components 210
![Page 211: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/211.jpg)
C t ll lController class
Controller
car-floor[1..H]: integeremergency-stop[1..H]:
iinteger
scan-cars()scan-floors()scan-master-panel()
t ()operate()
Computers as Components 211
![Page 212: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/212.jpg)
A hit tArchitecture
Computation and I/O occur at:floor control panels/displays;elevator cars;;system controller.
Computers as Components 212
![Page 213: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/213.jpg)
P l d b t llPanels and cab controller
Panels are straightforward---no real-time i trequirements.
Cab controller:read buttons and send events to system controller;controller;read sensor inputs and send to system controllercontroller.
Computers as Components 213
![Page 214: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/214.jpg)
S t t llSystem controller
Must take inputs from many sources:car controllers;floors.
Must control cars to hard real-time deadlinesdeadlines.User interface, scheduling are soft deadlines.
Computers as Components 214
![Page 215: 8 N t k8. Networks · aNetworks are complex aId ll th id hihIdeally, they provide high-ll i hillevel services while hiding details of data transmission aInternational Standards Organization](https://reader033.vdocuments.us/reader033/viewer/2022052013/60297339cc1bd20e412bd74d/html5/thumbnails/215.jpg)
T tiTesting
Build an elevator simulator using an FPGAFPGA:
simulate multiple elevators;simulate real-time control demands.
Computers as Components 215