12.07.2015 Views

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

HVAC Control in the New Millennium.pdf - HVAC.Amickracing

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>HVAC</strong> <strong>Control</strong> <strong>in</strong> <strong>the</strong> <strong>New</strong> <strong>Millennium</strong>Every transceiver on <strong>the</strong> network reads <strong>the</strong> address <strong>in</strong>formation.When a packet dest<strong>in</strong>ation address matches <strong>the</strong> E<strong>the</strong>rnet address of anode, <strong>the</strong> transceiver for that dest<strong>in</strong>ation node accepts <strong>the</strong> E<strong>the</strong>rnet signal<strong>in</strong>to <strong>the</strong> receive buffers on its E<strong>the</strong>rnet controller. The signal wavecont<strong>in</strong>ues travel<strong>in</strong>g down <strong>the</strong> cable until absorbed by <strong>the</strong> term<strong>in</strong>ators.All transceiver units listen to <strong>the</strong> coax broadcast signal. When <strong>the</strong>dest<strong>in</strong>ation address matches <strong>the</strong> E<strong>the</strong>rnet address of a receiv<strong>in</strong>g node,that transceiver reads <strong>the</strong> signal and copies <strong>the</strong> transmission <strong>in</strong>to its ownbuffer without chang<strong>in</strong>g or damag<strong>in</strong>g <strong>the</strong> signal wave.The controller verifies that <strong>the</strong> length of <strong>the</strong> data message matches<strong>the</strong> value <strong>in</strong> <strong>the</strong> length field. Any discrepancies are passed to <strong>the</strong> softwareprotocols. TCP/IP, for example, would request a rebroadcast of <strong>the</strong>damaged packet. TCP/IP also reports receipt confirmation to <strong>the</strong> transmitt<strong>in</strong>gnode. If <strong>the</strong> transmission has been successful, <strong>the</strong> data fieldcontents are passed to <strong>the</strong> software protocols and eventually transferredto <strong>the</strong> application.E<strong>the</strong>rnet DrawbacksThe nodes contend for network access, much like users of party-l<strong>in</strong>etelephones compete for a free l<strong>in</strong>e. This contention method of broadcast<strong>in</strong>gallows more than one transceiver to transmit at <strong>the</strong> same time. Two ormore transceivers may simultaneously sense a quiet network. In that time<strong>in</strong>terval, each will beg<strong>in</strong> to transmit packets. The signals will collide, corrupt<strong>in</strong>geach transmission. One unit may recognize <strong>the</strong> collision andbroadcast a jam signal. As a consequence two fragmentary packets aretransmitted <strong>in</strong> each direction for each corrupted transmission.When a collision has been sensed and acknowledged, <strong>the</strong> E<strong>the</strong>rnetcontrollers create a random number. This is usually provided by <strong>the</strong> nodecomputer equipment and is used to delay fur<strong>the</strong>r retransmission attempts.The random delay serves to restart <strong>the</strong> contention for <strong>the</strong> network.These collisions on E<strong>the</strong>rnet create fragmentary packets and lower<strong>the</strong> possible transmission rate. The jam signal takes a m<strong>in</strong>imum of 32bits and all collid<strong>in</strong>g packets must be retransmitted.An adm<strong>in</strong>istrative layer directs <strong>the</strong> packets and deals with trafficproblems from packet content. This software provides <strong>the</strong> ability toknow what nodes exist. Some systems map network station names <strong>in</strong>to©2001 by The Fairmont Press, Inc. All rights reserved.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!