03.11.2012 Views

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

Medium Access Control (MAC) and Physical Layer (PHY) - CISE

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

4-June-07 P1901_PRO_016_r0<br />

The following diagram ¡Error! No se encuentra el origen de la referencia.depicts a transmission sequence<br />

using this kind of token. As it is outlined in the above diagram, a transmission sequence starts with a Distributor<br />

Token. This type of token assigns the channel to a list of nodes. The Data Token is used by slaves to release the<br />

token to the next detination node. Further sections describe this diagram in more detail.<br />

List Info<br />

Dst1 = Slave 1 Validity1 SessionId1<br />

Dst2 = Slave 4 Validity2 SessionId2<br />

IPPDUS1<br />

Dst3 = Slave 3 Validity3 SessionId3<br />

Dst4 = Slave 2 Validity4 SessionId4<br />

IPPDUS2 IPPDUS2 IPPDUS2<br />

IPPDUS2<br />

MASTER<br />

DISTRIBUTOR<br />

TOKEN<br />

Slave 1<br />

Slave 4 DATA<br />

TOKEN to Slave 2<br />

Slave 3<br />

Slave 2<br />

DATA TOKEN<br />

To Slave 4<br />

DATA<br />

From SessionId1<br />

≤ Valitdity1<br />

DATA<br />

≤ Valitdity2<br />

From SessionId2<br />

DATA TOKEN to Slave 3<br />

DATA<br />

From SessionId3<br />

≤ Validity3<br />

Figure 24: Transmission Sequence<br />

DATA<br />

From SessionId4<br />

≤ Validity4<br />

DATA TOKEN<br />

to MASTER<br />

Submission page 85 UPA-OPERA<br />

DISTRIBUTOR<br />

TOKEN<br />

Using the previously described channel access, a programmed timming interval can be set, synchronized or not<br />

with the mains meriod using the clock token, where several nodes in a preestablished order can transmit.<br />

4.1.2 Contention medium access example<br />

In the previous examples, the destination of the token, <strong>and</strong> so, the next token holder is explicity defined in the<br />

information that the token contains. In the case of CSMA or <strong>Access</strong> Replay frame, the next token holder is not<br />

predefined by the node that transmit the token, but a priorized contention period is open to decide the node that<br />

will be the next token holder.<br />

Asume again the topology described in Figure 23.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!