180 results on '"ethernet"'
Search Results
2. Gateway Strategies for Embedding of Automotive CAN-Frames into Ethernet-Packets and Vice Versa.
- Author
-
Kern, Andreas, Reinhard, Dominik, Streichert, Thilo, and Teich, Jürgen
- Abstract
Today΄s automotive communication architectures are composed of up to five special purpose communication technologies with dedicated features to interconnect hundreds of comfort-, safety-, and infotainment-related distributed functions. In the future, the number and complexity of such highly distributed functions will further increase and the outcome of this are stronger requirements to the underlying communication architectures. Ethernet and IP, both standardized and widely used in other industrial sectors, could be one solution to handle the upcoming requirements and could homogenize the variety of communication technologies. This paper focuses on a transformation concept to connect a CAN-based network to an Ethernet/IP-based network and vice versa. It highlights several variants which optimize different objectives, like the protocol header overhead or the latency of messages. Moreover, it presents measured results for different network utilizations and a currently deployed automotive CAN subnetwork. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
3. A Zero-Nanosecond Time Synchronization Platform for Gigabit Ethernet Links.
- Author
-
Nicolau, Carles
- Abstract
Ethernet is becoming the dominant data transmission technology for service providers due to its simplicity and low cost. However, the need for Quality of Service (QoS) provisioning for some time-sensitive applications drives the definition of new functionalities in Ethernet. In this work we address QoS in Ethernet by introducing a time synchronization capability at MAC level while maintaining its asynchronous and distributed architecture. We present a reconfigurable logic platform based on a Field Programmable Gate Array (FPGA) in which we embed our custom timestamping unit (TSU). Leveraging the TSU, we have implemented a synchronization mechanism with which we achieved a best-case synchronization accuracy of zero nanoseconds. The effectiveness of the method is confirmed through several experiments. [ABSTRACT FROM AUTHOR]
- Published
- 2011
- Full Text
- View/download PDF
4. Pessimistic Useful Efficiency of EPL Network Cycle.
- Author
-
Gaj, Piotr
- Abstract
Nowadays, there are many industrial Ethernet protocols which could act as a fieldbus functionality. There is a necessity to select an independent comparative factor in order to define the scope and the usage domain of the given protocol. In this article the author considers the construction of transactions in EPL (Ethernet PowerLink) protocol and qualification of its features to describe time characteristic and to compare EPL with other protocols of real-time Ethernet type. Author presents advantages and common traits of some of the existing solutions. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
5. Future Internet Is by Ethernet.
- Author
-
Luoma, Marko, Kantola, Raimo, and Manner, Jukka
- Abstract
This is a position paper describing an approach to the creation of the Future Internet. We argue that the new architecture must respond to two key challenges: (1) increase trust among Internet stakeholders and (2) provide cost efficient scaling of the network to new levels of capacity, number of users and applications. We argue that the solution is to redesign the Internet by gradually replacing IP with a carrier grade transport system. In practice such a packet transport system can be created based on Carrier Grade Ethernet. We call the resulting network Internet by Ethernet. We make some fundamental arguments and outline the research agenda that will open based on the premises that we describe. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
6. MyriXen: Message Passing in Xen Virtual Machines over Myrinet and Ethernet.
- Author
-
Nanos, Anastassios and Koziris, Nectarios
- Abstract
Data access in HPC infrastructures is realized via user-level networking and OS-bypass techniques through which nodes can communicate with high bandwidth and low-latency. Virtualizing physical components requires hardware-aided software hypervisors to control I/O device access. As a result, line-rate bandwidth or lower latency message exchange over 10GbE interconnects hosted in Cloud Computing infrastructures can only be achieved by alleviating software overheads imposed by the Virtualization abstraction layers, namely the VMM and the driver domains which hold direct access to I/O devices. In this paper, we present MyriXen, a framework in which Virtual Machines efficiently share network I/O devices bypassing overheads imposed by the VMM or the driver domains. MyriXen permits VMs to optimally exchange messages with the network via a high performance NIC, leaving security and isolation issues to the Virtualization layers. Smart Myri-10G NICs provide hardware abstractions that facilitate the integration of the MX semantics in the Xen split driver model. With MyriXen, multiple VMs exchange messages using the MX message passing protocol over Myri-10G interfaces as if the NIC was assigned solely to them. We believe that MyriXen can integrate message passing based applications in clusters of VMs provided by Cloud Computing infrastructures with near-native performance. [ABSTRACT FROM AUTHOR]
- Published
- 2010
- Full Text
- View/download PDF
7. ETHOM, an Ethernet over SCI and DX Driver for Linux.
- Author
-
Finocchiaro, Rainer, Razik, Lukas, Lankes, Stefan, and Bemmerl, Thomas
- Subjects
- *
COMPUTER networks , *COMPUTER network protocols , *COMPUTER software , *ETHERNET , *COMPUTER interfaces - Abstract
Nowadays, high computing demands are often tackled by clusters of computers, each of which is basically an assembly of a growing number of CPU cores and main memory; these nodes are connected by some kind of communication network. With the growing speed and number of CPU cores, the network becomes a severe bottleneck limiting overall cluster performance. High-speed interconnects like SCI and Dolphin DX are good for alleviating this communication bottleneck, when the communication software is either based on IP or specifically adapted to the interconnect. Software written to communicate directly via Ethernet frames can not be used this way, though. In this article, we present ETHOM, a driver that implements an Ethernet interface on top of the Dolphin Express software stack. It enables the Dolphin networks SCI and DX to be used as high-speed replacement for Ethernet. Offering an Ethernet and with that an IP interface, it enhances their functionality and allows usage of layer-2 kernel functionality like interface bonding and bridging. This driver is an improvement of ETHOS, the Ethernet over Sockets driver, delivering lower latencies at the cost of higher CPU load. By means of various measurements, we show that ETHOM with SCI or DX offers a two-fold increase in communication performance over Gigabit Ethernet. [ABSTRACT FROM AUTHOR]
- Published
- 2009
8. Protocol Design Issues in WLAN.
- Author
-
Farooqui, Muhammad Akber
- Subjects
- *
IEEE 802.11 (Standard) , *WIRELESS LAN standards , *ETHERNET , *QUALITY of service , *ACCESS control - Abstract
IEEE 802.11 wireless LAN (WLAN) is the most widely used WLAN standard today, but it cannot provide QoS support for the increasing number of multimedia applications. Thus, a large number of 802.11 QoS enhancement schemes have been proposed, each one is focusing on a particular mode. This work summarizes all these schemes and presents current research activities. We are proposing in this work to adapt the concept of Quality of Service (QoS) issues in wireless LAN scenario. A deep comparative analysis has been done with leader based schemes and results have been verified using OPNET simulator. [ABSTRACT FROM AUTHOR]
- Published
- 2009
9. Advanced Industrial Communications.
- Author
-
Krist, Petr
- Abstract
The paper deals with the new advanced industrial communication solutions concepts. It describes basic structures of industrial distributed control systems and physical and application layers of the most commonly used standards. The main differences between industrial real-time communications and information data network communications are classified and convergence trends of both of them are emphasized. The Ethernet standard is mentioned and the requirements for industrial Ethernet implementation declared. The progressive leading solution ETHERNET Powerlink is introduced. The contribution outlines the structure of an advanced distributed control node and declares the new conception of the virtual application communication bus with an example CANopen - ETHERNET Powerlink. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
10. Ring Flushing for Reduced Overload in Spanning Tree Protocol Controlled Ethernet Networks.
- Author
-
Horváth, Dániel, Kapitány, Gábor, Plósz, Sándor, Moldován, István, and Lukovszki, Csaba
- Abstract
Flooding causes serious problems to the scalability of Ethernet networks. Recent proposals to overcome this problem, such as SEATTLE [5], usually require significant changes in different network layers, making the realistic chance of their deployment questionable. In this paper, we propose Ring Flushing, a practical method to reduce the burden of flooding during topology changes. The basic idea behind our approach is to locate stale forwarding information in an efficient way. Ring Flushing abolishes the broadcast-like spreading of topology change information thus shrinking the flushing domain. We implemented Ring Flushing in OMNeT++ simulation environment and evaluated its performance in different topologies and parameter settings. Our simulations show that the Ring Flushing has clear advantage over the approach of standard Rapid Spanning Tree Protocol (RSTP) in terms of throughput during network recovery. Furthermore, the Ring Flushing diminishes overall network overload during topology changes as the network size increases. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
11. The Design of a Low-Cost Wide Area Network Simulator.
- Author
-
Schmidt, Kevin, Cerney, Joe, Becker, Ryan, Duffy, Patrick, Goulart, Ana, and Morgan, Joseph
- Abstract
This paper presents the design of the Bottle-Net WANulator. The Bottle-Net WANulator is an inexpensive and self-contained Wide Area Network (WAN) simulator that can be used for commercial, educational, and research purposes. It inserts artificial latency and limits the bandwidth between network devices in a closed environment. The two Ethernet ports on the WANulator allow for asynchronous configuration; also, throughput statistics are displayable at the user interface, which proved as a useful tool for measuring traffic of multimedia applications. In this paper, we provide a detailed description of the WANulator hardware and software design, which can be implemented at under US$300 per unit. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
12. Ultra-Fast Downloading of Partial Bitstreams through Ethernet.
- Author
-
Bomel, Pierre, Crenne, Jeremie, Ye, Linfeng, Diguet, Jean-Philippe, and Gogniat, Guy
- Abstract
In this paper we present a partial bitstreams ultra-fast downloading process through a standard Ethernet network. These Virtex-based and partially reconfigurable systems use a specific data-link level protocol to communicate with remote bistreams servers. Targeted applications cover portable communicating low cost equipments, multi-standards software defined radio, automotive embedded electronics, mobile robotics or even spacecrafts where dynamic reconfiguration of FPGAs reduces the components count: hence the price, the weight, the power consumption, etc... These systems require a local network controller and a very small internal memory to support this specific protocol. Measures, based on real implementations, show that our systems can download partial bistreams with a speed twenty times faster (a sustained rate of 80 Mbits/s over Ethernet 100 Mbit/s) than best known solutions with memory requirements in the range of 10th of KB. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
13. DESIGN OF SINGLE-PHASE POWER METER BASED ONETHERNET.
- Author
-
Yuan, Huimei and Wang, Yan
- Abstract
According to the related technology about power meter, single-phase power meter based on Ethernet is designed and researched. Single-chip processor MC9S12NE64 is used as system΄s CPU and in charge of the system control and information processing. Power measurement chip CS5460A is applied to calculate electrical parameters. EMAC and EPHY modules which are MC9S12NE64΄s inter parts are adopted to accomplish Ethernet communication, and how to design Ethernet protocol and data processing are illuminated in detail. The system has realized real-time settlement of electric charge and other network-controlled functions such as power stoppage and supply. It overcomes current problems about electric charge΄s disagreement due to offline running of power meter. The power meter is mainly used in the environment where Internet network has been realized, and it is unnecessary to establish wired communication network in addition. Resources of network sharing can be achieved and cost can be saved greatly. [ABSTRACT FROM AUTHOR]
- Published
- 2009
- Full Text
- View/download PDF
14. Adaptive Mobility Management in 802.11 Infrastructure Networks.
- Author
-
Issac, B., Hamid, K. A., and Tan, C. E.
- Subjects
IEEE 802.11 (Standard) ,WIRELESS communications ,ETHERNET ,WIRELESS LAN standards ,DATA transmission systems - Abstract
In 802.11 wireless infrastructure networks, as the mobile node moves from the current access point to another, the active connections will not be badly dropped if the hand off is smooth and if there are sufficient resources reserved in the target access point. In a 5x5 grid of access points, within a 6x6 grid of regions, by location tracking and data mining, we predict the mobility pattern of mobile node with good accuracy. The mobility prediction, active scanning of mobile nodes, along with pre-authenticating neighbouring access points is used to reduce the re-association delay, probe delay and authentication delay respectively. The model implements first stage reservation by examining packet content types and second stage reservation by using information from mobility prediction results, so that sufficient resources can be reserved when the mobile node does the handoff to the next access point. The overall mobility management scheme thus improves the quality of service and enables smooth hand off. The performance simulation is done to verify the proposed model. [ABSTRACT FROM AUTHOR]
- Published
- 2008
15. A Short Introduction to Computer Networks.
- Author
-
Fuchs, Ulrich
- Abstract
Computer Networks have become an essential tool in many aspects: human communication, gathering, exchange and sharing of information, distributed work environments, access to remote resources (data and computing power) and many more. Starting from an historical overview, this paper will give an introduction to the underlying ideas and technologies. The second half will concentrate on the most commonly used network technology today (Ethernet and TCP/IP) and give an introduction to the communication mechanisms used. [ABSTRACT FROM AUTHOR]
- Published
- 2008
- Full Text
- View/download PDF
16. Simulation of IEEE 802.11e in the Context of Interoperability.
- Author
-
Cabral, Orlando, Segarra, Alberto, and Velez, Fernando J.
- Subjects
- *
IEEE 802.11 (Standard) , *ETHERNET , *WIRELESS LAN standards , *LOCAL area networks , *COMPUTER networks - Abstract
This work provides the specification of a MAC layer simulator that evaluates the service quality in WiFi, and presents initial results as a stand-alone simulator. The simulator will account for inter-working with WiMAX and HSDPA in the context of the IT-MOTION tool. Higher throughputs are found for the FTP service and for the video service, mainly because the frames transmitted in these services are longer than the ones for the voice application. However, the number of supported users is higher for voice. This simulator will allow for tuning-up several parameters like the ones related to how to use BlockACK, normal ACK, and NO ACK policies. [ABSTRACT FROM AUTHOR]
- Published
- 2007
17. Dynamic Traffic Regulation for WiFi Networks.
- Author
-
Marrero, Domingo, Macías, Elsa M., and Suárez, Alvaro
- Subjects
- *
IEEE 802.11 (Standard) , *ETHERNET , *WIRELESS LAN standards , *BANDWIDTHS , *QUALITY of service - Abstract
Multimedia applications require high bandwidth in order to assure certain level of Quality of Service (QoS). It is well known that the characteristics of the traffic for multimedia applications are very different from the traditional data traffic that only requires a best effort service. In a network in which terminals communicate multimedia and also traditional data traffic, another important effect is produced: if a bad set of priorities is used neither the data traffic nor the multimedia ones obtain good performance. Sometimes is better to give higher priority to a short traditional data transaction, because it will finish soon leaving free the channel for the multimedia application. This is a hard problem to solve that requires a combination of well known methods. On the other hand, Wireless Fidelity (WiFi) networks have experimented an spectacular growth in last recent years. As a result, they are being used to access multimedia servers allocated in wired networks. Nevertheless, the availability of real bandwidth in current commercial WiFi networks is limited. Therefore, admission control becomes very important to increase the overall system performance. To get real value of this, we combine the admission control with a traffic regulation mechanism. Depending on the requested service, the Access Point (AP) could deny the network access if the required bandwidth is not guaranteed or on the contrary, the access is allowed by reducing the rate of the newly associated station or the rate of some current associated ones. [ABSTRACT FROM AUTHOR]
- Published
- 2007
18. A Proactive Horizontal Handover Algorithm for WiFi-WiMax Interoperable Networks.
- Author
-
Suárez, Alvaro, Elbatsh, Kholoud, and Macías, Elsa
- Subjects
- *
IEEE 802.11 (Standard) , *ETHERNET , *WIRELESS LAN standards , *VIDEO on demand , *LOCAL area networks - Abstract
Two important high bandwidth wireless certifications in our days are Worldwide Interoperability for Microwave Access (WiMax) and Wireless Fidelity (WiFi). They can interoperate to form a geographical wider network in wchich Mobile Client (MC) can move. We suppose a combination of two WiFi Access Points (AP) and a WiMax Base Station (BS) that interoperate putting a WiMax Wireless Network Interface Card (WNIC) in the WiFi AP. The BS can request real time video or Video on Demand (VoD) from a server allocated in the fixed network (to which the BS is connected). In order to model the movement of the MC, we build a diagram state to represent the areas in which MC can be and from what area to which one the MC passes. Classifying the areas in connected and disconnected ones we can discover the different actions that are achieved by different entities of a simple protocol that are allocated in the BS and the AP. These entities are in charge to control the buffers to efficiently support disconnections due to handover and out of coverage situations (disconnected states). Up to our knowledge, no other authors have studied this complex problem. [ABSTRACT FROM AUTHOR]
- Published
- 2007
19. Ethernet Quick Guide.
- Subjects
CHARTS, diagrams, etc. ,ETHERNET - Abstract
Several diagrams and charts are presented on Ethernet protocols and frequently used Ethernet glossary.
- Published
- 2006
20. A Tunnel-Based QoS Management Framework for Delivering Broadband Internet on Trains.
- Author
-
Van Quickenborne, Frederic, De Greve, Filip, De Turck, Filip, Moerman, Ingrid, and Demeester, Piet
- Abstract
Current satellite, GPRS and GSM systems show different shortcomings to provide Broadband Internet access to trains. In this paper, we motivate that an Ethernet based aggregation network in combination with WiFi and WiMAX antennas is the best approach for realizing Broadband Internet access in trains. The focus is on the management system for the Ethernet aggregation network and more specifically on the implementation of the module for tunnel switching trigger management. The components of the management system are presented and different tunnel switching strategies supported by the framework are compared in terms of minimal, average and maximal packet loss. [ABSTRACT FROM AUTHOR]
- Published
- 2006
- Full Text
- View/download PDF
21. MODERN ETHERNET TECHNOLOGIES.
- Author
-
Lam, Cedric F.
- Subjects
DATA transmission systems ,ETHERNET ,LOCAL area networks ,COMPUTER networks ,PACKET radio transmission ,INTERNET - Abstract
This article focuses on modern ethernet technologies. Ethernet has become the ubiquitous means to network servers and desktop computers. Over 85% of the network traffic in today's Internet is generated as Ethernet packets. Ethernet has become the most popular network technology among many different competing technologies in the Internet era because of its low cost and simplicity. A 10/l00BASE-T Ethernet Network Interface Card (NIC) costs as little as $15 nowadays. Ethernet address space is large enough that virtually every Ethernet device in the world can be assigned a globally unique address at the factory. IEEE is in charge of assigning blocks of globally administered addresses to manufacturers of Ethernet interfaces so that each globally administered address is unique in the whole universe.
- Published
- 2003
22. LOCAL AREA NETWORKS.
- Author
-
Carson, John H.
- Subjects
LOCAL area networks ,COMPUTER networks ,FRAME relay (Data transmission) ,DATA transmission systems ,ETHERNET ,BROADCASTING industry - Abstract
This article presents information on local area networks (LAN) in telecommunications. In 1980, noting the increasing popularity of Ethernet and the need to standardize existing and future LAN protocols, the IEEE formed the 802 Committee, whose duties were to oversee these standards. Later, the Committee's responsibilities were increased to address MAN standards. Contention based LAN systems employ a broadcast approach where every station potentially hears every transmission. This means that overlapping transmissions will collide and interfere with each other.
- Published
- 2003
23. Frame Operations.
- Subjects
ETHERNET ,READ-only memory ,MANUFACTURED products ,LOCAL area networks ,COMPUTER storage devices ,COMPUTER software - Abstract
The article comments on the composition of different types of Ethernet Frames. In reality, there is only one physical Ethernet frame. Each Ethernet NIC contains a unique address burned into its read-only memory at the time of manufacture. To ensure that this universally administered address is not duplicated, the IEEE assigns blocks of addresses to each manufacturer. These addresses normally include a three-byte prefix, which identifies the manufacturer and is assigned by the IEEE, and a three-byte suffix, which is assigned by the adapter manufacturer to its NIC.
- Published
- 2003
24. Front Matter.
- Author
-
Held, Gilbert
- Subjects
ETHERNET ,COMPUTER networks - Abstract
Presents the table of contents for the January 2003 issue of the journal "Ethernet Networks."
- Published
- 2003
25. Ethernet Networks.
- Subjects
ETHERNET ,COMPUTER networks ,STANDARDS ,TECHNOLOGY ,LOCAL area networks ,DATA transmission systems - Abstract
The article presents information about different types of Ethernet networks by closely examining the components and operating characteristics of Ethernet and then comparing its major features with the different networks defined by the IEEE 802.3 standard. Although significant advances in Ethernet technology have occurred over the past decade, many features and constraints associated with newer technology are based upon the original technology. One of the problems faced by the designers of Ethernet was the selection of an appropriate medium.
- Published
- 2003
26. The Future of Ethernet.
- Subjects
ETHERNET ,PRICES ,PERSONAL computers ,COMPUTER operating systems ,COMMUNICATION ,LOCAL area networks - Abstract
The article comments on the future of Ethernet. Just a half-dozen years ago, the average price of an Ethernet adapter card was approximately $1000, while the cost of a personal computer was between $3000 and $4000. Excluding the cost of cabling and a network operating system, an Ethernet adapter card represented an approximate 25- to 33-percent increase in the cost of a personal computer. Although 10 Gigabit Ethernet is primarily expected to be used by large organizations and communications carriers in a metropolitan networking environment, people can also expect the cost of such equipment to decline as production increases.
- Published
- 2003
27. Wireless Ethernet.
- Subjects
ETHERNET ,DATA transmission systems ,LOCAL area networks ,TECHNOLOGY ,COMMUNICATION ,COMPUTER network protocols - Abstract
This chapter contains sections titled: [ABSTRACT FROM PUBLISHER]
- Published
- 2003
28. Managing the Network.
- Subjects
COMPUTER networks ,SIMPLE Network Management Protocol (Computer network protocol) ,DATA transmission systems ,ETHERNET ,LOCAL area networks ,COMMUNICATION - Abstract
This article will focus upon the tools and techniques required to effectively manage a network. First, the article will examine the Simple Network Management Protocol (SNMP) and its Remote Monitoring management information base. Once this is accomplished, then it will focus upon the use of products that can provide people with some of the tools people may require to both effectively manage the transmission of information on the network, as well as observe the operation of file servers attached to the network. The SNMP was originally developed as a mechanism for managing TCP/IP and Ethernet networks.
- Published
- 2003
29. Security.
- Subjects
COMPUTER security ,ETHERNET ,COMMUNICATION ,NETWORK routers ,COMPUTER operating systems - Abstract
The article comments on security and techniques that can be used to protect an Ethernet network. Cisco's Internetworking Operating System (IOS) controls the operation of that vendor's communications devices to include routers and switches. IOS support a command line interface that can be accessed via the router console port, a modem connection, or a Telnet connection. Of the three methods only the first can offer the possibility of being truly secure as it requires a directly connected terminal device, which can be co-located with the router in a secure, locked area. Because the other two methods support remote access, they theoretically permit a virtually unlimited number of persons to attempt to access a router's operating system and represent potential vulnerabilities.
- Published
- 2003
30. Security.
- Subjects
ETHERNET ,LOCAL area networks ,TOPOLOGY ,DATA transmission systems ,STANDARDS ,COMPUTER networks - Abstract
The article presents various keywords related to Ethernet, which are used in the January 2003 issue of the journal "Ethernet Networks: Design, Implementation, Operation, Management." Some of the keywords are: access list, access method, access point, accounting management, active topology, address resolution protocol, Aloha, Alto Aloha Network, backpressure, Barker code, baseband signaling, Basic Service Set, Basic Service Set Identification, Bayonet Nut Connector, cabling standards, carrier extension, carrier-sense multiple access with collision avoidance, carrier sense multiple access with collision detection, collapsed backbone, collision detection, collision domain, collision window, communications controller, concentrator, configuration management, data field, data link layer and datagram.
- Published
- 2003
31. Traffic Integration in Personal, Local, and Geographical Wireless Networks.
- Author
-
Bruno, Iraffaele, Conti, Marco, and Gregori, Enrico
- Subjects
WIRELESS communications ,BLUETOOTH technology ,IEEE 802.11 (Standard) ,ETHERNET ,UNIVERSAL Mobile Telecommunications System ,CELL phone systems - Abstract
Chapter 7 discusses the integration of voice and data traffic in wireless networks. It concentrates on Bluetooth technology (de-facto standard for wireless personal area networks), IEEE 802.11 technology (the main standard for wireless local area networks), and the UMTS technology for third generation cellular systems. [ABSTRACT FROM PUBLISHER]
- Published
- 2002
32. Indoor Wireless Environments.
- Author
-
Ramachandran, Lakshmi
- Subjects
ELECTRIC network topology ,ELECTRIC network analysis ,TELECOMMUNICATION systems ,BLUETOOTH technology ,IEEE 802.11 (Standard) ,ETHERNET - Abstract
Chapter 28 focuses on design issues and options for the physical layer, and media access control layer protocols (IEEE 802.11, HomeRF and Bluetooth) that have been proposed for the indoor wireless environments. Network topology and self-organization of such networks, with special reference to Bluetooth, are also discussed. [ABSTRACT FROM PUBLISHER]
- Published
- 2002
33. Data Communications in the Office Environment, Part 1.
- Subjects
DATA transmission systems ,ELECTRONIC data processing ,SIMPLE Network Management Protocol (Computer network protocol) ,ETHERNET ,MODEMS - Abstract
The interconnection of MIS assets on a local level is the subject of this chapter. This interconnection is almost universally carried out by means of a local area network (LAN). The IEEE defines a LAN as a nonpublic data network in which serial transmission is used without store and forward techniques for direct data communication among data stations located on the user's premises. [ABSTRACT FROM PUBLISHER]
- Published
- 2001
34. Limits to Technology Leverage Strategies.
- Author
-
Mathews, John A. and Cho, Dong-Sung
- Abstract
This chapter probes the strengths and weaknesses of the model of high-technology industry creation through leverage, and the underlying conditions that account for the industry's success or failure. We have shown in previous chapters that Korea, Taiwan, Singapore and, to some extent, Malaysia have mastered leverage strategies for the creation of high-technology industries, in particular semiconductors, while similar strategies appear to be working well in other countries of the region, notably China. But how effective have these strategies really been? They may have created viable and well-balanced semiconductor industries that are capable of sustaining themselves, but have they worked in other sectors and cases? Is there a coherence in their repeated applications? Are there counter-examples? How widespread is their applicability? Is their success, such as it is, contingent on certain industry characteristics? Is a leverage strategy more likely to work in one kind of industry than another? We aim, then, to look at the leverage strategies to find out how and why they work. We also seek to establish the extent to which they are spreading and why. There are three cases to consider: further leverage in the same core countries of East Asia as they continue to upgrade their knowledge-intensive industries; leverage by other countries in East Asia such as China; and leverage by advanced firms in the technologically advanced countries. We shall look for evidence of coherent application of leverage strategies in all three cases in order to establish their significance. [ABSTRACT FROM AUTHOR]
- Published
- 2000
- Full Text
- View/download PDF
35. A Cat Can Look at a King: How Taiwan Did it.
- Author
-
Mathews, John A. and Cho, Dong-Sung
- Abstract
In the mid-1980s, when Japan and the US were locked in their battle for world supremacy in semiconductors, and Korean firms like Samsung were making their first forays into the DRAM sector, the Taiwanese semiconductor industry did not look much like a threat. There were several foreign-owned and domestic IC packaging and testing companies operating at the ‘back end’ of the semiconductor value chain and a few IC design houses that took advantage of the favourable conditions at the Hsinchu Science-based Industry Park. But there were only two IC fabrication plants on the island – one operated by the public-sector research institute, ERSO, and one operated by the ERSO spin-off company, UMC. By international standards the latter was a very small company, and its output was limited to simple LSI chips for consumer product applications such as toys, watches and greeting cards. Plans to produce DRAMs or other complex IC products like microprocessors seemed a long way off. Only ten years later, the Taiwan semiconductor industry had risen to be the fourth largest in the world, and its firms were holding their own in international competition, and entering strategic alliances with the cream of the Japanese, European and American industry players. Like the cat in the fairy story, Taiwan had shown that it could look the industry leaders in the face. Clearly there was a lot more happening in Taiwan in the mid-1980s than was evident to the outside observer. [ABSTRACT FROM AUTHOR]
- Published
- 2000
- Full Text
- View/download PDF
36. Basic LAN Internetworking.
- Subjects
COMPUTER networks ,BRIDGES (Computer networks) ,NETWORK routers ,LOCAL area networks ,ETHERNET ,DATA transmission systems - Abstract
The article focuses on the operation of bridges and routers. Bridges operate by examining MAC layer addresses, using the destination and source addresses within a frame as a decision criteria to make their forwarding decisions. Operating at the MAC layer, bridges are not addressed and must therefore examine all frames that flow on a network. There are two primary methods used by bridges to connect local area networks: transparent or self-learning, and source routing. Transparent bridges were originally developed to support the connection of Ethernet networks, whereas source routing bridges support Token-Ring network operations.
- Published
- 2000
37. Congestion Control for Self-Similar Network Traffic.
- Author
-
Tuan, Tsunyi and Park, Kihong
- Subjects
COMPUTER networks ,COMMUNICATIONS industries ,TELECOMMUNICATION ,TELECOMMUNICATION systems ,ETHERNET ,VIDEOS - Abstract
Recent measurements of local-area and wide-area traffic have shown that network traffic exhibits variability at a wide range of scales. What is striking is the ubiquitousness of the phenomenon, which has been observed in diverse networking contexts, from Ethernet to ATM, LAN and WAN, compressed video, and HTTP-based WWW traffic. Such scale-invariant variability is in strong contrast to traditional models of network traffic, which show burstiness at short time scales but are essentially smooth at large time scales; that is, they lack long-range dependence. Since scale-invariant burstiness can exert a significant impact on network performance, understanding the causes and effects of traffic self-similarity is an important problem. [ABSTRACT FROM PUBLISHER]
- Published
- 2000
38. Bounds on the Buffer Occupancy Probability with Self-Similar Input Traffic.
- Author
-
Likhanov, N.
- Subjects
PROBABILITY theory ,COMMUNICATIONS industries ,COMPUTER networks ,ETHERNET ,VIDEOS ,MODELS & modelmaking - Abstract
High-quality traffic measurements indicate that actual traffic behavior over high-speed networks shows self-similar features. These include an analysis of hundreds of millions of observed packets on several Ethernet LANs, and an analysis of a few million observed frame data by variable bit rate (VBR) video services. In these studies, packet traffic appears to be statistically self-similar. Self-similar traffic is characterized by "burstiness" across an extremely wide range of time scales. This behavior of aggregate Ethernet traffic is very different from conventional traffic models. [ABSTRACT FROM PUBLISHER]
- Published
- 2000
39. Layer 2 Management.
- Subjects
MANAGEMENT ,TCP/IP ,COMPUTER network protocols ,COMPUTER networks ,ETHERNET ,DATA transmission systems - Abstract
In the ISO Open System Interconnection (051) Reference Model the second layer of the model is the data link layer. At that layer frames are formed and passed to the lower physical layer to transport higher layer information, such as TCP/IP packets conveyed via an Ethernet or Token-Ring network. Although the TCP/IP protocol suite technically begins at the network layer, any book covering the management of the protocol would be remiss if it did not focus attention on layer 2 management issues. This is because the ability to transport TCP/IP on an end-to-end basis includes LAN delivery systems and any problem or degradation in the capability or capacity of a LAN can adversely effect the flow of upper layer information.
- Published
- 2000
40. MODULATION ANALYSIS FORMULA.
- Author
-
Walker, H. R.
- Subjects
ELECTRONIC modulation ,ELECTRONICS ,MODULATION theory ,SIGNAL theory ,ETHERNET ,LOCAL area networks ,DATA transmission systems - Abstract
This article reports that the most modulation methods are non-return-to-zero (NRZ) line-code. That is, the data bits are unaltered prior to modulation. When the bits are encoded to some form other than simple ones and zeros, usually to prevent 0 Hz from appearing, a biphase code results. Typical of the codes, which alter the ones and zeros, are Manchester and modified frequency modulation (MFM). The encoding used for Ethernet is a biphase code. The encoding used for double-density disk recording is a biphase code. The slip codes used in variable phase shift keying are variations of MFM. NRZ codes result in a spectrum that extends from 0 Hz upward.
- Published
- 1999
41. ETHERNET.
- Author
-
Molie, Mart L.
- Subjects
ETHERNET ,LOCAL area networks ,COMPUTER networks ,DISTRIBUTED computing ,DATA transmission systems ,DIGITAL communications - Abstract
The article presents information about Ethernet. It is a widely used local area network (LAN) technology that allows multiple end stations (such as desktop computers, servers, printers, gateways to other networks, etc.) to exchange data among themselves within a single building or campus environment. The sending station segments the data into a sequence of frames, each of which is sent independently through the network to the destination(s). Every frame carries a globally unique 48-bit source and destination address and other information, laid out according to a standard format.
- Published
- 1999
42. APPENDIX E CSMA/CD NETWORK PERFORMANCE.
- Subjects
COMPUTER networks ,ETHERNET ,DATA transmission systems ,LOCAL area networks ,TELECOMMUNICATION systems ,DIGITAL communications - Abstract
This article focuses on the performance of Ethernet, which is a carrier sense multiple access with collision detection network. Each station on the network listens for a carrier and attempts to transmit data, resulting in the occurrence of a collision. Even when one station thinks there is no carrier, it is quite possible that a carrier may also result in a collision. Because of the random number of collisions, Ethernet bus performance is not deterministic and performance characteristics and message transmission delays are not predictable.
- Published
- 1999
43. LAN INTERNETWORKING DEVICES: LAN SWITCHES.
- Subjects
SWITCHING systems (Telecommunication) ,TELECOMMUNICATION equipment ,LOCAL area networks ,ETHERNET ,INTERNETWORKING devices ,COMPUTER networks - Abstract
This article describes the operational methods supported by various types of LAN switches. The article explore the use of both Ethernet and Token-Ring switches to gain an understanding of the key features built into many products, as well as why the presence of some features and the absence of others can result in degraded performance instead of an expected improvement. Lastly, the article examines how the use of certain switch features can result in network problems and how those problems can be alleviated through the use of other device features.
- Published
- 1999
44. LOCAL AREA NETWORKS: ETHERNET NETWORKS.
- Subjects
ETHERNET ,LOCAL area networks ,COMPUTER network standards ,DATA transmission systems ,COMPUTER networks - Abstract
This article focuses on the different types of Ethernet network. From a network access perspective, there is actually only one Ethernet network. However, the CSMA/CD access protocol used by Ethernet, as well as its general frame format and most of its operating characteristics, were used by the Institute of Electrical and Electronics Engineers (IEEE) to develop a series of Ethernet-type networks under the IEEE 802.3 umbrella. The article also focuses on the wiring, topology and hardware components associated with each type of IEEE 802.3 Ethernet network, as well as the Ethernet frame used to transport data.
- Published
- 1999
45. LOCAL AREA NETWORKS: OVERVIEW.
- Subjects
LOCAL area networks ,INTERNETWORKING devices ,ETHERNET ,ASYNCHRONOUS transfer mode ,WIDE area networks ,COMPUTER networks - Abstract
This article focuses on the detailed operation and utilization of local area network (LAN) internetworking devices. Although several types of Ethernet and Token-Ring LANs are covered in this article, asynchronous transfer mode (ATM) may be conspicuous by its absence. ATM represents both a LAN and a wide area network (WAN) technology. LANs can be distinguished from WANs by geographic area of coverage, data transmission and error rates, ownership, government regulation, data routing and in many instances, the type of information transmitted over the network.
- Published
- 1999
46. Local Area Networks (LANs).
- Subjects
LOCAL area networks ,COMPUTER networks ,DISTRIBUTED computing ,PERSONAL computers ,ETHERNET ,DIGITAL communications - Abstract
This chapter describes the different kinds of LANs (Local Area Networks) used in office computer networks to connect PCs (personal computers) and 'desktops' to 'servers' and shared printers. It explains the structures and differences between Token Ring, Ethernet and Token Bus LANs, and the international standards (IEEE 802 or ISO 8802) defining the interfaces and protocols used between the different components making up the LAN. [ABSTRACT FROM PUBLISHER]
- Published
- 1997
47. Bridging Methods.
- Subjects
LOCAL area networks ,DISTRIBUTED computing ,ACCESS control ,ETHERNET ,DATA transmission systems ,FIBER Distributed Data Interface (Computer network standard) - Abstract
A transparent bridge examines media access control frames to learn the addresses of stations on the network, storing information in internal memory in the form of an address table. To understand the operation of a transparent bridge in more detail and some of the limitations associated with the use of this device, consider the simple bridged based network. This network consists of three Ethernet local area network segments connected through the use of two self-learning bridges. For simplicity of illustration only two work-stations are shown and labeled on each local area network.
- Published
- 1998
48. Protocols Guide: Local Area Network and LAN Protocols: Ethernet Protocols: 10-Gigabit Ethernet: IEEE 802.3ae and 802.3an.
- Subjects
ETHERNET ,DATA transmission systems ,LOCAL area networks ,WIDE area networks ,METROPOLITAN area networks (Computer networks) ,COMPUTER network protocols - Abstract
Information on the 10-Gigabit Ethernet protocol from the book "Network Protocols Handbook," Fourth Edition, is presented. It offers data speeds of up to 10 billion bits per second. It is used to interconnect local area networks (LANs), wide area networks (WANs), and metropolitan area networks (MANs). The specifications of this Ethernet provide support to extend the 802.3 protocol and MAC specification to an operating speed of 10 gigabit/second (gb/s).
- Published
- 2007
49. Protocols Guide: Local Area Network and LAN Protocols: Ethernet Protocols: Gigabit (1000 Mbps) Ethernet: IEEE 802.3z (1000Base-X) and 802.3ab (1000Base-T).
- Subjects
ETHERNET ,COMPUTER network protocols ,COMPUTER networks ,FRAME relay (Data transmission) ,LOCAL area networks - Abstract
Information on Ethernet Protocol Gigabit (1000 megabits per second (Mbps)) from the book "Network Protocols Handbook," Fourth Edition, is presented. It is based on the Ethernet protocol but has tenfold speed increase over Fast Ethernet and is published as the IEEE 802.3z and 802.3ab supplements to the IEEE 802.3 base standards. The structure of the protocol is described.
- Published
- 2007
50. Protocols Guide: Local Area Network and LAN Protocols: Ethernet Protocols: Ethernet: IEEE 802.3 Local Area Network protocols.
- Subjects
ETHERNET ,LOCAL area networks ,COMPUTER networks ,COMPUTER science - Abstract
A section of the "Network Protocols Handbook," is presented. It discusses the functions of Ethernet protocols, which refer to the family of local area networks (LAN) covered by a group of IEEE 802.3 standards. The Ethernet system consists of three basic elements including the physical medium, a set of medium access control rules and an Ethernet frame that has standardized sets of bits used to carry data over the system.
- Published
- 2007
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.