02.02.2018 Views

Practical_modern_SCADA_protocols_-_dnp3,_60870-5_and_Related_Systems

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Ethernet <strong>and</strong> TCP/IP networks 327<br />

Assume that both node 1 <strong>and</strong> node 2 are in listen mode <strong>and</strong> node 1 has frames queued<br />

to transmit. All previous traffic on the medium has ceased ie there is no carrier, <strong>and</strong> the<br />

interframe gap from the last transmission has timed out. Node 1 now commences to<br />

transmit its preamble signal, which immediately commences to propagate both left <strong>and</strong><br />

right on the cable. At the left end, the termination resistance absorbs the transmission,<br />

but the signal continues to propagate to the right. However, the MAC sublayer in node<br />

2 has also been given a frame to transmit from the LLC sublayer, <strong>and</strong> since the node<br />

‘sees’ a free cable, it too commences to transmit its preamble. Again, the signals propagate<br />

on to the cable, <strong>and</strong> some short time later they ‘collide’. Almost immediately, node<br />

2’s transceiver recognizes that the signals on the cable are corrupted, <strong>and</strong> the logic<br />

incorporated on the NIC asserts a collision detect signal. This causes node 2 to send<br />

a jam signal of 32 bits of r<strong>and</strong>om data, <strong>and</strong> then stop transmitting. In fact, the st<strong>and</strong>ard<br />

allows any data to be sent as long as, by design, it is not the value of the CRC field of<br />

the frame. It appears that most nodes will send the next 32 bits of the data frame as<br />

a jam, since that is instantly available.<br />

This jam signal continues to propagate along the cable, as a contention signal since it<br />

is ‘mixed’ with the signal still being transmitted from node 1. Eventually, node 1 recognizes<br />

the collision, <strong>and</strong> goes through the same jam process as node 2. You can see from<br />

this that the frame from node 1 must be at least twice the end-to-end propagation delay<br />

of the network, or else the collision detection will not work correctly. The jam signal<br />

from node 1 will continue to propagate across the network until absorbed at the far end<br />

terminator, meaning that the system vulnerable period is three times the end-to-end<br />

propagation delay.<br />

After the jam sequence has been sent, the transmission is halted. The node then<br />

schedules a retransmission attempt after a r<strong>and</strong>om delay controlled by a process known<br />

as the truncated binary exponential backoff algorithm. The length of the delay is chosen<br />

so that it is a compromise between reducing the probability of another collision <strong>and</strong><br />

delaying the retransmission for an unacceptable length of time. The delay is always an<br />

integer multiple of the slot time. In the first attempt, the node will choose, at r<strong>and</strong>om,<br />

either one or zero slot times delay. If another collision occurs, the delay will be chosen<br />

at r<strong>and</strong>om from 0, 1, 2 or 3 slot times, thus reducing the probability that a further<br />

collision will occur. This process can continue for up to 10 attempts, with a doubling<br />

of the range of slot times available for the node to delay transmission at each attempt.<br />

After ten attempts, the node will attempt 6 more retries, but the slot times available for<br />

the delay period will remain as they were at the tenth attempt. After 16 attempts, it is<br />

likely that there is a problem on the network <strong>and</strong> the node will cease attempting to<br />

retransmit.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!