0% found this document useful (0 votes)
13 views40 pages

Optimizing Network Communication Hierarchies

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views40 pages

Optimizing Network Communication Hierarchies

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Network Communication

The backbone of enterprise integration


• Links all the devices together irrespective of their physical location
• Integrate the whole enterprise, including suppliers & customers

Sales Design MRP Manufacture Delivery

Communication Hierarchy

• Enterprise level
• Plant level
• Cell level
• Equipment level
Network Communication
Network requirements is different in terms of
• Communication device
• Distance
• Transmission media
• Bandwidth
• Protocol

Interconnection of different Hierarchy levels

• Equipment level – individual CNC machines and robots


• Cell level – connect CNC machines and robots in a cell
• Plant level – connect cells and other departments
• Enterprise level – globally link various plants/sites
Network Communication
TF

Computer Sales / Marketing /Finance/


Enterprise Level
CAD/CAM (Design)

Payroll/Cost accounting
Plant Level Computer
CAD/CAM (Manufacture)

Control/
Cell Level
Coordinate

Satellite Computer Satellite Computer

Equipment Level

Computer Computer Computer Computer Computer Computer

Machine Machine Machine Machine Machine Machine


Network Communication
TF Communication Network
A collection of equipment & physical media that interconnects two or more
computers
• Local Area Network (LAN) – interconnect within same building or organization
Ex: Home WiFi networks
• Wide Area Network (WAN) – uses common career facilities over long distances
Uses to connect sites & equipment
Ex: A bank, including its branch offices and ATM machines
• Hybrid Network – Different types
✓ Metropolitan Area Network (MAN) – covers a large city or suburb
Interconnects LANs within metropolitan area
Ex: telephone company network

✓ Intranet & Extranet


▪ Intranet – Only for internal employees
▪ Extranet – For external authorized users as well
Network Communication
Selection of Network Technology
• Communication Medium
• Network Topology
• Medium Access Control method
• Signaling Method

Communication Medium
Physical material that carry electrical signal of encoded data –
Transmit data over short/long distances
Types
➢ Open-wire pair – obsolete now a days
➢ Co-axial cable – good for longer distance
➢ Twisted pair cable – good for shorter distance
➢ Fiber-optic system – high data transmission
➢ Wireless media – High bandwidth, high cost
Network Communication
Co-axial Cable
Consists of a hollow outer cylindrical conductor that surrounds a single
inner wire made of two conducting elements.
▪ located in the center of the cable, is a copper conductor
▪ surrounding the copper conductor is a layer of flexible insulation
▪ over this insulating material is a woven copper braid or metallic foil
that acts both as the second wire in the circuit and as a shield for the
inner conductor
This second layer, or shield, can help reduce the amount of outside
interference. Covering this shield is the cable jacket.
Network Communication
Co-axial Cable

➢supports 10 to 100 Mbps speed


➢relatively inexpensive
➢can be cabled over longer distances
Network Communication
TF

Twisted pair Cable


• A type of cabling that is used for telephone communications and
most modern Ethernet networks.
• A pair of wires forms a circuit that can transmit data. The pairs
are twisted to provide protection against crosstalk, the noise
generated by adjacent pairs.
• When electrical current flows through a wire, it creates a small,
circular magnetic field around the wire. When two wires in an
electrical circuit are placed close together, their magnetic fields
are the exact opposite of each other. Thus, the two magnetic
fields cancel each other out.
• They also cancel out any outside magnetic fields. Twisting the
wires can enhance this cancellation effect.
Network Communication
Twisted pair Cable
Types
✓ unshielded twisted pair (UTP)
✓ shielded twisted pair (STP)
UTP
▪ a medium that is composed of pairs of wires
▪ used in a variety of networks
▪ each of the eight individual copper wires in UTP cable is covered by
an insulating material
▪ in addition, the wires in each pair are twisted around each other
▪ relies solely on the cancellation effect produced by the twisted wire
pairs to limit signal degradation caused by electromagnetic
interference (EMI) and radio frequency interference (RFI)
Network Communication
Twisted pair Cable
UTP
UTP cable often is installed using a Registered Jack 45 (RJ-45)
connector.
RJ-45 is an eight-wire connector used commonly to connect
computers onto a local-area network (LAN), especially Ethernets.

▪ Speed and throughput—10 to 1000 Mbps


▪ Average cost per node—Least expensive
▪ Media and connector size—Small
▪ Maximum cable length—100 m (short)
Network Communication
Twisted pair Cable

STP

▪ combines the techniques of shielding, cancellation, and wire twisting


▪ each pair of wires is wrapped in a metallic foil
▪ four pairs of wires then are wrapped in an overall metallic braid or foil
▪ STP reduces electrical noise both within the cable (pair-to-pair
coupling, or crosstalk) and from outside the cable (EMI and RFI).
▪ usually is installed with STP data connector, which is created especially
for the STP cable. However, STP cabling also can use the same RJ
connectors that UTP uses.
Network Communication
Twisted pair Cable
STP
▪ Speed and throughput—10 to 1000 Mbps
▪ Average cost per node—Moderately expensive
▪ Media and connector size—Medium to large (STP Data Connector)
▪ Maximum cable length—100 m (short)
Network Communication
TF
Fiber Optic System
Fiber-optic cable does not carry electrical impulses as
copper wire does – instead, signals that represent bits
are converted into pulses of light.
➢ consists of two fibers encased in separate sheaths
➢ each optical fiber is surrounded by layers of protective buffer
material: usually a plastic shield, then a plastic such as Kevlar, and
finally, an outer jacket that provides protection for the entire cable.
➢ the plastic conforms to appropriate fire and building codes
➢ purpose of the Kevlar is to furnish additional cushioning and
protection for the fragile, hair-thin glass fibers
➢ a stainless steel wire is sometimes included for added strength
➢ several connectors can connect fiber to the networking device; the
most common is a SC connector, which has two optics, one
connecting to transmit and the other connecting to receive
Network Communication
Fiber Optic System
❖ The light-guiding parts of an optical fiber are called the core and the
cladding
❖ The core is usually very pure glass with a high index of refraction –
when a cladding layer of glass or plastic with a low index of
refraction surrounds the core glass, light can be trapped in the fiber
core.
❖ This process is called total internal reflection, and it allows the
optical fiber to act like a light pipe, guiding light for long distances,
even around bends.
Network Communication
Fiber Optic System
• fiber-optic cable is more expensive
• not susceptible to EMI and is capable of higher data rates than
any of the other types of networking media discussed here
• more secure because it does not emit electrical signals that could
be received by external devices
Network Communication
Wireless media
Wireless communication uses radio frequencies (RFs) or infrared
waves to transmit data between devices on a LAN
For wireless LANs, a key component is the wireless hub, or access
point, used for signal distribution.
To receive the signals from the access point, a PC or laptop needs to
install a wireless adapter card, or wireless network interface card
(NIC).
Network Communication
Wireless media
Wireless signals are electromagnetic waves that can travel through the
vacuum of outer space and through a medium such as air.
No physical medium is necessary for wireless signals, making them a
versatile way to build a network.
They use portions of the RF spectrum to transmit voice, video, and data.
Wireless frequencies range from 3 kHz to 300 GHz. The data-transmission
rates range from 9 kbps to 54 Mbps.
WiMax vs WiFi
➢ WiMax based on Microwave whereas WiFi based on Radio wave
➢ An ideal Wi-Fi based network reaches upto 100 m as whereas an ideal
WiMAX network can reach upto 80-90 km
➢ Wi-Fi is needed to serve for household and corporate needs of
interconnectivity. WiMAX serves a larger inter-operable network. WiMAX
can be used to provide internet services to a larger area where it can
serve households, mobile phones and even Wi-Fi spots.
Network Communication
Network Topology
Network topology is the arrangement of the various
elements (links, nodes, etc.) of a computer network –
describes the relationship between the nodes in
communication system
Types
➢ BUS
➢ Star
➢ Ring
➢ Tree
➢ Mesh
Network Communication
Network Topology
BUS
• One of the most commonly used, Devices are directly connected to cable
• Uses the least amount of cabling than any other topology
• Requires a special device called terminator – to prevent bouncing back of
the data packet which travels through the cable
• Performs well only for a limited number of nodes. When the number of
devices connected to the bus increases, the efficiency decreases
• It is not easy to isolate faults in the network nodes
• Each device on the network "sees" all the data being transmitted, thus
posing a security risk
Network Communication
Network Topology
STAR
• Central computer is located at the center (known as hub)
• Each user is connected directly to the host
• Hub monitors data traffic through the network and prevents collision
• If hub fails, the entire network will fail
• Due to the centralized nature, it is easy to detect faults in the network
devices
• Lesser security risk
Network Communication
Network Topology
RING
• Each device is connected to two (previous and next) other devices
• Number of device connected is not limited by number of slots
• Token is used to carry data through the network
• Data transmission is unidirectional
• The failure of a single node in the network can cause the entire network
to fail; This can be solved by using a dual ring or a switch that closes off
the break
Network Communication
Network Topology
TF
TREE
• It is actually a combination of bus and star topology
• The tree topology is useful in cases where a star or bus cannot be
implemented individually
• Each star segment gets a dedicated link from the central bus. Thus, failing of
one segment does not affect the rest of the network
• Very flexible layout
• As multiple segments are connected to a central bus, the network depends
heavily on the bus. Its failure affects the entire network
• Owing to its size and complexity, maintenance is not easy and costs are high
Network Communication
Network Topology
MESH
• Very highly secured network (least probability of failure)
• Each device is directly connected to all other devices. So if one line fails,
there will always be multiple alternative lines to convey data from one
node to another
• Very expensive as high amount of wiring is required
• Usually used in defense industries
Network Communication
TF
Access Control/Channel Access Method
Access control- Information / Data access to network
Channel access method - allows several terminals connected to the
same multi-point transmission medium to transmit over it and to
share its capacity
➢ Token Passing
➢ CSMA/CD - Carrier-sense multiple access with collision
detection
➢ ATM - Asynchronous Transfer Mode
Token Passing
Token passing is a channel access method where a signal via token (special data
carrier) is passed between nodes that authorize the node to communicate in a
predetermined sequence
Network Communication
Access Control/Channel Access Method
Token Passing
• Token passing schemes provide Round-Robin Scheduling
• Some machine may get higher priority
• A station may transmit only one token at a time through the ring – Hence
this process minimizes the possibility of collision
• Channel bandwidth can be fully utilized without idle time when demand is
heavy
• Disadvantage- even when demand is light, a station wishing to transmit
must wait for the token, increasing latency (time delay)
• Manufacturing network uses this method

Round-robin scheduling is allocating each task


an equal share of the CPU time.
Network Communication
TF
Access Control/Channel Access Method
CSMA/CD – Carrier-sense multiple access with collision detection
a media access control method used most notably in local
area network using early Ethernet technology
• Developed by Xerox
• Any station wants to send signal, listens whether line is busy or not
• If not busy, then send signal
• If same time – collision occurs
• If collision is detected, sender waits for a while before re-transmitting the
signal
Network Communication
Access Control/Channel Access Method
CSMA/CD
Network Communication
TF
Access Control/Channel Access Method
ATM - Asynchronous Transfer Mode
• Uses asynchronous time-division multiplexing
• Data sent in the form of small packets (cell) and all the packets are of
same size (53 byte), where in other data transfer method packets are
of variable length - thus takes longer time to be transmitted.
• A cell is processed asynchronously relative to other related cells and is
queued before being multiplexed over the transmission path
• Capable of transferring data at a speed of 155 Mbps or higher
• Designed for a network that must handle both traditional high-
throughput data traffic (e.g., file transfers), and real time, low latency
content such as voice and video
• Uses star topology and can use both twisted pair and fiber optic cable
Network Communication
Access Control/Channel Access Method
ATM - Asynchronous Transfer Mode
Network Communication
Network Linking Devices
Hub
✓ Broadcasts all the data packets to all nodes which are attached to the
Hub’s output port.
✓ Uses relatively old technology, hence less reliable and cheap
Bridge
✓ Used to connect two or more LAN or network together
Network Communication
Network Linking Devices

Switch
✓ Identifies the device connected to it from its IP address
✓ Substantially reduces the amount of broadcast traffics and hence
became the most popular linking device
Gateway
✓ works as an entrance to another network. Without gateway two
dissimilar networks cannot exchange data
Network Communication
Network Linking Devices
Router
✓ Stores the routing information for networks
✓ Looks into each packet’s header and determines the best route to
reach the destination.
✓ Works as Switch, Hub, Firewall and Gateway at the same time
✓ Saves a lot of cost
Network Communication
Signaling Method
▪ Data are propagated from one point to another by means of signals
▪ Signals are electromagnetic representation of transmitted data
▪ Data/signal converters convert data to signals for transmission on the
sending end & back to data at receiving end
Broadband
• Uses data itself as a signal by impressing the data directly onto
the communication wire
• Uses analog signals in the form of optical or electromagnetic
waves over multiple transmission frequencies
• For signals to be both sent and received, the transmission
media must be split into two channels. Alternatively, two cables
can be used: one to send and one to receive transmissions
• Many independent messages can be transmitted simultaneously
• Serves as backbone that supports many channels
Network Communication
Signaling Method
Baseband
• LAN converts data into digital signals before transmission, transmit
signals & the convert the signals into data at receiving end
• Occupies the entire bandwidth of the network media to transmit a
single data signal
• Sending and receiving cannot occur on the same wire at the same time
• Only one signal can be transmitted
• Works well in small network, limited distance
Network Communication
Networking Protocols Transmission Control Protocol
➢ TCP/IP – default protocol of Internet and also for Windows PC
• Provides end-to-end data communication specifying how data should be
packetized, addressed, transmitted, routed and received
➢ IPX/SPX – a proprietary protocol of Novell (Netware Network Operating
System)
➢ NetBIOS/NetBEUI – a simple protocol that has no configurable parameters
• Suitable for using in small business organization
• Provides services related to the session layer of the OSI model allowing
applications on separate computers to communicate over a local area
network
➢ ALOHA – packet switch radio communication network (University of Hawaii)
• Can also run over wired media
Network Communication
TF
MAP/TOP
MAP (Manufacturing Automation Protocol)
• Developed by GM
• Token passing access method
• Uses BUS network (Token Bus Network)
• Broadband transmission
• Suitable for shop floor
TOP (Technical and Office Protocol)
• Developed by Boeing
• Uses CSMA/CD access method
Network Communication
TF
Open Systems Interconnection model (OSI model)
➢ A conceptual model that characterizes and standardizes the
communication functions of a telecommunication or computing
system without regard to their underlying internal structure
and technology
➢ Its goal is the interoperability of diverse communication
systems with standard protocols.
➢ The model partitions a communication system into seven
abstraction layers (control is passed from one layer to the next).
Network Communication
Open Systems Interconnection model (OSI model)
Network Communication
Open Systems Interconnection model (OSI model)
Physical
• Bit level transmission between nodes of the network is established
• Consists of hardware that drives network & circuits
• Deals with mechanical, electrical, functional & procedural characteristics
to access physical medium
Data link
• Transfer information across physical link (hubs and switches)
• Error control, flow control of functions
Network
• Decides which outgoing path should be used to send the message to a
destination node
• Router is used for this purpose
Transport
• All the messages delivered between the hosts of the network are dealt in this
layer
• This is done through the process of fragmentation and reassembly
Network Communication
Open Systems Interconnection model (OSI model)
Session
• Controls communication between applications by establishing,
managing & terminating virtual connections
• The format of the data to be transmitted is defined in this layer
• Performs synchronization in data transfer
Presentation
• Syntax used by two network hosts for communication is defined
• Translation of data between a networking service and an application
• Includes character encoding, Compression and encryption/ decryption
Application
• Provides the user interface to the networking system
• Provides different end user services like e-mail, file transfer, virtual terminal access
etc.

You might also like