Argus Radio Telescope Architecture

Size: px
Start display at page:

Download "Argus Radio Telescope Architecture"

Transcription

1 Argus Radio Telescope Architecture Douglas Needham Argus Architecture p.1/15

2 Introduction: Traditional Telescopes Radio telescopes commonly consist of a single large parabolic dish. Physical constraints limit either the amount of visible sky or the size of the radio telescope. At 100-by-110 meters, the Robert C. Byrd Green Bank Telescope (GBT) is likely about as large as a fully steerable radio telescope will ever be. Cost was $74.5M. Larger radio telescopes such as the 305 meter dish at Arecibo gain their larger size at the expense of mobility. Less sky is visible. Argus Architecture p.2/15

3 Introduction: Telescope Arrays To increase resolution, Very Long Baseline Interferometry (VLBI) techniques are used to combine signals from smaller telescopes. Examples: The Very Large Array (VLA) in NM. The Allen Telescope Array (ATA) in CA. Argus (not to be confused with the SETI League s Project Argus). Argus Architecture p.3/15

4 Introduction: What is Argus? Argus is a radically new radio telescope design. Conceived by Dr. Robert Dixon of the Ohio State University Radio Observatory beginning in the 1980 s. Replaces large antennas of high directivity with an array of numerous smaller omni-directional antennas. Uses computers to form virtual telescopes to look at multiple locations or even the entire sky. Well suited for viewing transient radio astronomy and SETI applications. Presents unique design challenges in terms of computing and networking. Argus Architecture p.4/15

5 Introduction: Argus Advantages Argus size is not constrained by physical construction limitations. Argus permits the creation of multiple virtual radio telescopes, which can observe the entire sky, or multiple small portions of it. Compare this to the GBT, which has single beam width of 12 /f(ghz). At 1420MHz, this is 8.5. Argus should be able to use VLBI techniques to increase resolution. Cost?? Argus Architecture p.5/15

6 Introduction: Argus Disadvantages The current implementation with 32 elements has a minimum beam width of approximately 6 deg. Current antenna elements still have a low effective aperture ( 0.006m 2 at1420mhz). Construction of smaller arrays is very costly and labor intensive. The effective aperture costs on the order of $200K/m 2 for Argus vs. $10K/m 2 for the 100m telescope at Green Bank. Argus is 20 times as expensive. Argus Architecture p.6/15

7 What does Argus look like? Argus Architecture p.7/15

8 Argus 2002 Architecture LNA/BPF LNA/BPF GHz DCR DCR LVDS 14MHz BW 20MSPS (8+8bits) LVDS Replicator LVDS Replicator 2 P To other ANPs 2 P To other ANPs 1 64 ANP UDP/IP 8kHz BW 40kSPS (16+16bits) 100Mbps Ethernet Switch BFC BFC BFC BFC 100Mbps Ethernet Switch To/from other PCs for other ANPs DCC DCC DCC Argus Architecture p.8/15

9 Networks The Argus architecture implies the existence of several separate networks, including: At least one high speed network for raw data. (Data Network) At least one network for computed products. (Display/Command Network) A possible separate control network for controlling the ANPs. Argus Architecture p.9/15

10 Networks - Data Network Handles the raw data sent from the ANP for processing. Data is broadcast using 4+KB UDP packets at rates of up to 80Mbps on a 100baseTX network. Data samples are grouped into acquisitions, which include a status packet and multiple data packets. All packets begin with a identification header. All packets are required to process the acquisition, but some loss of acquisitions can be tolerated. Argus Architecture p.10/15

11 Networks - Data Network Problems Some issues exist which are addressable today with code changes, but others will likely require more powerful equipment. They include: Multiple writes for the ID header and data make the data subject to acquisition corruption due to UDP reordering. Packets are currently subject to issues related to fragmentation and reassembly. Scaling beyond a single ANP may introduce synchronization issues between multiple ANPs. In the future, scaling limitations will likely exist due to network and computer limitations. Argus Architecture p.11/15

12 Networks - Display Network Transports data reduced as the result of processing. Uses a proprietary command protocol modeled after FTP and HTTP. Uses multiple separate data channels for the transfer of display data. May involve connections via an insecure WAN. Makes provisions for strong authentication of commands which may impact other users. Argus Architecture p.12/15

13 Argus Authentication Protocol Argus uses an authentication protocol which relies on the MD5 digest combined with a form challenge/response to avoid playback. The tuple of username, M D5(passphrase) is stored via secure means. When authorization is required, a status code is returned by the server which includes a challenge. The client responds with M D5(challenge, now(), M D5(passphrase)) The server validates the response using the stored MD5 hash of the user s pass-phrase and a small time window. Argus Architecture p.13/15

14 Argus Beam Forming UDP data fom ANP Data Reception and Demultiplexing Control Data Antenna Calibration and Directional Delay Antenna Calibration and Directional Delay Array Summation Array Summation Listening Port Display Command IPC FFT FFT Space Domain Time Domain Space Domain Time Domain Integration Integration Display Data IPC Argus Architecture p.14/15

15 Links - The North American AstroPhysical Observatory, containing information about Argus. - The National Radio Astronomy Observatory, with information about the GBT and VLA. - The National Astronomy and Ionosphere Center, with information about the Arecibo Radio Telescope. - The SETI Institute, with information about the Allen Telescope Array and Project Argus. Argus Architecture p.15/15

The Argus 2002 Architecture

The Argus 2002 Architecture 1 The Argus 2002 Architecture Steven W. Ellingson 1 1 The Ohio State University ElectroScience Laboratory, 1320 Kinnear Road, Columbus OH 43212. E-mail: ellingson.1@osu.edu 2 I. Acronyms ANP Argus Narrowband

More information

Adaptive selfcalibration for Allen Telescope Array imaging

Adaptive selfcalibration for Allen Telescope Array imaging Adaptive selfcalibration for Allen Telescope Array imaging Garrett Keating, William C. Barott & Melvyn Wright Radio Astronomy laboratory, University of California, Berkeley, CA, 94720 ABSTRACT Planned

More information

The Breakthrough LISTEN Search for Intelligent Life: A Wideband Data Recorder for the Robert C. Byrd Green Bank Telescope

The Breakthrough LISTEN Search for Intelligent Life: A Wideband Data Recorder for the Robert C. Byrd Green Bank Telescope The Breakthrough LISTEN Search for Intelligent Life: A Wideband Data Recorder for the Robert C. Byrd Green Bank Telescope Dave MacMahon University of California at Berkeley Breakthrough LISTEN SETI Project

More information

OSKAR: Simulating data from the SKA

OSKAR: Simulating data from the SKA OSKAR: Simulating data from the SKA Oxford e-research Centre, 4 June 2014 Fred Dulwich, Ben Mort, Stef Salvini 1 Overview Simulating interferometer data for SKA: Radio interferometry basics. Measurement

More information

Fast Holographic Deconvolution

Fast Holographic Deconvolution Precision image-domain deconvolution for radio astronomy Ian Sullivan University of Washington 4/19/2013 Precision imaging Modern imaging algorithms grid visibility data using sophisticated beam models

More information

Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation

Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Performance Evaluation of FDDI, ATM, and Gigabit Ethernet as Backbone Technologies Using Simulation Sanjay P. Ahuja, Kyle Hegeman, Cheryl Daucher Department of Computer and Information Sciences University

More information

NRAO VLA Archive Survey

NRAO VLA Archive Survey NRAO VLA Archive Survey Jared H. Crossley, Loránt O. Sjouwerman, Edward B. Fomalont, and Nicole M. Radziwill National Radio Astronomy Observatory, 520 Edgemont Road, Charlottesville, Virginia, USA ABSTRACT

More information

Correlator Field-of-View Shaping

Correlator Field-of-View Shaping Correlator Field-of-View Shaping Colin Lonsdale Shep Doeleman Vincent Fish Divya Oberoi Lynn Matthews Roger Cappallo Dillon Foight MIT Haystack Observatory Context SKA specifications extremely challenging

More information

D Demonstration of integrated BoD testing and validation

D Demonstration of integrated BoD testing and validation D6.06 - Demonstration of integrated BoD testing and validation Deliverable Number 06 WP # 6 Date 2012-12-30 Authors Jimmy Cullen, The University of Manchester Fedde Bloemhof, JIVE Paul Boven, JIVE Ralph

More information

OSKAR-2: Simulating data from the SKA

OSKAR-2: Simulating data from the SKA OSKAR-2: Simulating data from the SKA AACal 2012, Amsterdam, 13 th July 2012 Fred Dulwich, Ben Mort, Stef Salvini 1 Overview OSKAR-2: Interferometer and beamforming simulator package. Intended for simulations

More information

The UniBoard. a RadioNet FP7 Joint Research Activity. Arpad Szomoru, JIVE

The UniBoard. a RadioNet FP7 Joint Research Activity. Arpad Szomoru, JIVE The UniBoard a RadioNet FP7 Joint Research Activity Arpad Szomoru, JIVE Overview Background, project setup Current state UniBoard as SKA phase 1 correlator/beam former Future: UniBoard 2 The aim Creation

More information

CSCD 330 Network Programming

CSCD 330 Network Programming CSCD 330 Network Programming Lecture 9 Transport Layer Winter 2019 Reading: Begin Chapter 3 Some Material in these slides from J.F Kurose and K.W. Ross All material copyright 1996-2007 1 Outline Overview

More information

Introduction to TCP/IP Offload Engine (TOE)

Introduction to TCP/IP Offload Engine (TOE) Introduction to TCP/IP Offload Engine (TOE) Version 1.0, April 2002 Authored By: Eric Yeh, Hewlett Packard Herman Chao, QLogic Corp. Venu Mannem, Adaptec, Inc. Joe Gervais, Alacritech Bradley Booth, Intel

More information

Wireless Router at Home

Wireless Router at Home Wireless Router at Home 192.168.1.2 192.168.1.1 Modem 192.168.1.3 120.6.46.15 telephone line to ISP 192.168.1.4 Internet connection with public IP internal LAN with private IPs 192.168.1.5 Wireless All-in-one

More information

Visualization & the CASA Viewer

Visualization & the CASA Viewer Visualization & the Viewer Juergen Ott & the team Atacama Large Millimeter/submillimeter Array Expanded Very Large Array Robert C. Byrd Green Bank Telescope Very Long Baseline Array Visualization Goals:

More information

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet

Chapter 2 - Part 1. The TCP/IP Protocol: The Language of the Internet Chapter 2 - Part 1 The TCP/IP Protocol: The Language of the Internet Protocols A protocol is a language or set of rules that two or more computers use to communicate 2 Protocol Analogy: Phone Call Parties

More information

ECE 333: Introduction to Communication Networks Fall 2001

ECE 333: Introduction to Communication Networks Fall 2001 ECE 333: Introduction to Communication Networks Fall 2001 Lecture 26: Transport layer I 1 Transport Layer In the remaining lectures, we will discuss several issues that are commonly addressed at the transport

More information

IP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching

IP Packet Switching. Goals of Todayʼs Lecture. Simple Network: Nodes and a Link. Connectivity Links and nodes Circuit switching Packet switching IP Packet Switching CS 375: Computer Networks Dr. Thomas C. Bressoud Goals of Todayʼs Lecture Connectivity Links and nodes Circuit switching Packet switching IP service model Best-effort packet delivery

More information

Shared Risk Observing

Shared Risk Observing Shared Risk Observing EVLA Advisory Committee Meeting, March 19-20, 2009 Claire Chandler Deputy AD for Science, NM Ops Motivation Early science: Want to get EVLA science capabilities i into the hands of

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms

More information

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. ** Slides are attributed to J. F.

CSEN 503 Introduction to Communication Networks. Mervat AbuElkheir Hana Medhat Ayman Dayf. ** Slides are attributed to J. F. CSEN 503 Introduction to Communication Networks Mervat AbuElkheir Hana Medhat Ayman Dayf ** Slides are attributed to J. F. Kurose Chapter 3 outline Transport-layer services Multiplexing and demultiplexing

More information

Imaging and Deconvolution

Imaging and Deconvolution Imaging and Deconvolution Urvashi Rau National Radio Astronomy Observatory, Socorro, NM, USA The van-cittert Zernike theorem Ei E V ij u, v = I l, m e sky j 2 i ul vm dldm 2D Fourier transform : Image

More information

OPEN BASE STATION ARCHITECTURE INITIATIVE

OPEN BASE STATION ARCHITECTURE INITIATIVE OPEN BASE STATION ARCHITECTURE INITIATIVE Conformance Test Specification Appendix H UDPCP Test Cases Version.00 Issue.00 (38) FOREWORD OBSAI description and specification documents are developed within

More information

Introduction to TCP/IP

Introduction to TCP/IP Introduction to TCP/IP Properties and characteristics of TCP/IP IPv4 IPv6 Public vs private vs APIPA/link local Static vs dynamic Client-side DNS settings Client-side DHCP Subnet mask vs CIDR Gateway TCP/IP

More information

Radio astronomy data reduction at the Institute of Radio Astronomy

Radio astronomy data reduction at the Institute of Radio Astronomy Mem. S.A.It. Suppl. Vol. 13, 79 c SAIt 2009 Memorie della Supplementi Radio astronomy data reduction at the Institute of Radio Astronomy J.S. Morgan INAF Istituto di Radioastronomia, Via P. Gobetti, 101

More information

Communications Software. CSE 123b. CSE 123b. Spring Lecture 2: Internet architecture and. Internetworking. Stefan Savage

Communications Software. CSE 123b. CSE 123b. Spring Lecture 2: Internet architecture and. Internetworking. Stefan Savage CSE 123b CSE 123b Communications Software Spring 2003 Lecture 2: Internet architecture and Internetworking Stefan Savage Some history 1968: DARPANET (precursor to Internet) Bob Taylor, Larry Roberts create

More information

The Correlator Control Computer

The Correlator Control Computer The Correlator Control Computer J Perez Atacama Large Millimeter/submillimeter Array Karl G. Jansky Very Large Array Robert C. Byrd Green Bank Telescope Very Long Baseline Array ICT CCC Functional Overview

More information

Overview of Ethernet Networking

Overview of Ethernet Networking Overview of Ethernet Networking Renesas Electronics America Inc. 1/31/2011 Rev. 0.02 00000-A Agenda This course contains an overview of Ethernet technology and its advantages and limits. Contained in this

More information

Synthesis Imaging. Claire Chandler, Sanjay Bhatnagar NRAO/Socorro

Synthesis Imaging. Claire Chandler, Sanjay Bhatnagar NRAO/Socorro Synthesis Imaging Claire Chandler, Sanjay Bhatnagar NRAO/Socorro Michelson Summer Workshop Caltech, July 24-28, 2006 Synthesis Imaging 2 Based on the van Cittert-Zernike theorem: The complex visibility

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the

More information

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems

B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems B.Sc. (Hons.) Computer Science with Network Security B.Eng. (Hons) Telecommunications B.Sc. (Hons) Business Information Systems Bridge BTEL/PT BCNS/14/FT BIS/14/FT BTEL/14/FT Examinations for 2014-2015

More information

Transport layer Internet layer

Transport layer Internet layer Lecture 2-bis. 2 Transport Protocols As seen by the application developer point of view The primary (in principle unique) role of transport protocols!" # $ % "!"& Transport httpd 25 80 3211... My app 131.175.15.1

More information

EnGenius Quick Start Guide

EnGenius Quick Start Guide T he operates seamlessly in the 2.4 GHz frequency spectrum supporting the 802.11b (2.4GHz, 11Mbps) and the newer, faster 802.11g (2.4GHz, 54Mbpswireless standard. High output power and high sensitivity

More information

networks List various types of networks and their

networks List various types of networks and their Chapter 15 Networks Chapter Goals Describe the core issues related to computer networks List various types of networks and their characteristics Explain various topologies of local-area networks Explain

More information

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link.

Internet Layers. Physical Layer. Application. Application. Transport. Transport. Network. Network. Network. Network. Link. Link. Link. Internet Layers Application Application Transport Transport Network Network Network Network Link Link Link Link Ethernet Fiber Optics Physical Layer Wi-Fi ARP requests and responses IP: 192.168.1.1 MAC:

More information

The Transmission Control Protocol (TCP)

The Transmission Control Protocol (TCP) The Transmission Control Protocol (TCP) Application Services (Telnet, FTP, e-mail, WWW) Reliable Stream Transport (TCP) Unreliable Transport Service (UDP) Connectionless Packet Delivery Service (IP) Goals

More information

style Click to edit Master text Click to edit Master subtitle style Rodrigo Améstica Click to edit Master text styles

style Click to edit Master text Click to edit Master subtitle style Rodrigo Améstica Click to edit Master text styles Correlator DataMaster Processor Click to edit title Click to edit Master subtitle style style Click to edit Master text Rodrigo Améstica Click to edit Master text styles Atacama Large Millimeter/submillimeter

More information

Pre-Processing and Calibration for Million Source Shallow Survey

Pre-Processing and Calibration for Million Source Shallow Survey Pre-Processing and Calibration for Million Source Shallow Survey V.N. Pandey(Kapteyn Institute/ASTRON) for LOFAR Offline Processing Team April 1 st, 2009 CALIM 09, Socorro Outline 1 2 3 4 MSSS (MS 3 )

More information

Using Time Division Multiplexing to support Real-time Networking on Ethernet

Using Time Division Multiplexing to support Real-time Networking on Ethernet Using Time Division Multiplexing to support Real-time Networking on Ethernet Hariprasad Sampathkumar 25 th January 2005 Master s Thesis Defense Committee Dr. Douglas Niehaus, Chair Dr. Jeremiah James,

More information

Geodetic VLBI Observations Using Giga-Bit VLBI System

Geodetic VLBI Observations Using Giga-Bit VLBI System Geodetic VLBI Observations Using Giga-Bit VLBI System Y. Koyama 1, T. Kondo 1, J. Nakajima 1, M. Sekido 1, R. Ichikawa 1, E. Kawai 1, H. Okubo 1, H. Osaki 1, H. Takaba 2, M. Yoshida 2, and K. Wakamatsu

More information

Data Networks. Lecture 1: Introduction. September 4, 2008

Data Networks. Lecture 1: Introduction. September 4, 2008 Data Networks Lecture 1: Introduction September 4, 2008 Slide 1 Learning Objectives Fundamental aspects of network Design and Analysis: Architecture: layering, topology design, switching mechanisms Protocols:

More information

Outline: Connecting Many Computers

Outline: Connecting Many Computers Outline: Connecting Many Computers Last lecture: sending data between two computers This lecture: link-level network protocols (from last lecture) sending data among many computers 1 Review: A simple point-to-point

More information

Lecture 3: Modulation & Layering"

Lecture 3: Modulation & Layering Lecture 3: Modulation & Layering" CSE 123: Computer Networks Alex C. Snoeren HW 1 out Today, due 10/09! Lecture 3 Overview" Encoding schemes Shannon s Law and Nyquist Limit Clock recovery Manchester, NRZ,

More information

Data Processing for the Square Kilometre Array Telescope

Data Processing for the Square Kilometre Array Telescope Data Processing for the Square Kilometre Array Telescope Streaming Workshop Indianapolis th October Bojan Nikolic Astrophysics Group, Cavendish Lab University of Cambridge Email: b.nikolic@mrao.cam.ac.uk

More information

SKA Technical developments relevant to the National Facility. Keith Grainge University of Manchester

SKA Technical developments relevant to the National Facility. Keith Grainge University of Manchester SKA Technical developments relevant to the National Facility Keith Grainge University of Manchester Talk Overview SKA overview Receptors Data transport and network management Synchronisation and timing

More information

Transient Buffer Wideband (TBW) Preliminary Design Ver. 0.1

Transient Buffer Wideband (TBW) Preliminary Design Ver. 0.1 Transient Buffer Wideband (TBW) Preliminary Design Ver. 0.1 Steve Ellingson November 11, 2007 Contents 1 Summary 2 2 Design Concept 2 3 FPGA Implementation 3 4 Extending Capture Length 3 5 Issues to Address

More information

Wide Area Networks (WANs) Slide Set 6

Wide Area Networks (WANs) Slide Set 6 Wide Area Networks (WANs) Slide Set 6 Wide Area Networks (WANs) WAN Purposes Link sites (usually) within the same corporation Remote access for individuals who are off-site Internet access for individuals

More information

ULTRA HIGH CAPACITY IPLINK MODEL SALINAS IPLINK-2400

ULTRA HIGH CAPACITY IPLINK MODEL SALINAS IPLINK-2400 ULTRA HIGH CAPACITY IPLINK MODEL SALINAS IPLINK-2400 Up 2400 Mbps Capacity full duplex in two 80 MHz channels Cross Polarization Interference Cancellation (XPIC) Hitless and Errorless Adaptive Coding and

More information

Configuring 802.1X Settings on the WAP351

Configuring 802.1X Settings on the WAP351 Article ID: 5078 Configuring 802.1X Settings on the WAP351 Objective IEEE 802.1X authentication allows the WAP device to gain access to a secured wired network. You can configure the WAP device as an 802.1X

More information

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1

OSI Transport Layer. Network Fundamentals Chapter 4. Version Cisco Systems, Inc. All rights reserved. Cisco Public 1 OSI Transport Layer Network Fundamentals Chapter 4 Version 4.0 1 Transport Layer Role and Services Transport layer is responsible for overall end-to-end transfer of application data 2 Transport Layer Role

More information

CS610- Computer Network Solved Subjective From Midterm Papers

CS610- Computer Network Solved Subjective From Midterm Papers Solved Subjective From Midterm Papers May 08,2012 MC100401285 Moaaz.pk@gmail.com Mc100401285@gmail.com PSMD01 CS610- Computer Network Midterm Examination - Fall 2011 1. Where are destination and source

More information

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.

Lecture 17 Overview. Last Lecture. Wide Area Networking (2) This Lecture. Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9. Lecture 17 Overview Last Lecture Wide Area Networking (2) This Lecture Internet Protocol (1) Source: chapters 2.2, 2.3,18.4, 19.1, 9.2 Next Lecture Internet Protocol (2) Source: chapters 19.1, 19.2, 22,1

More information

Optimizing the Internet Quality of Service and Economics for the Digital Generation. Dr. Lawrence Roberts President and CEO,

Optimizing the Internet Quality of Service and Economics for the Digital Generation. Dr. Lawrence Roberts President and CEO, Optimizing the Internet Quality of Service and Economics for the Digital Generation Dr. Lawrence Roberts President and CEO, lroberts@anagran.com Original Internet Design File Transfer and Remote Computing

More information

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Summer 2008) Midterm. Date: June 12, 2008

Department of Computer Science and Engineering. CSE 3213: Computer Networks I (Summer 2008) Midterm. Date: June 12, 2008 Department of Computer Science and Engineering CSE 3213: Computer Networks I (Summer 2008) Midterm Date: June 12, 2008 Name: Student number: Instructions: Examination time: 120 minutes. Write your name

More information

CSE398: Network Systems Design

CSE398: Network Systems Design CSE398: Network Systems Design Instructor: Dr. Liang Cheng Department of Computer Science and Engineering P.C. Rossin College of Engineering & Applied Science Lehigh University March 14, 2005 Outline Classification

More information

ECE 158A: Lecture 7. Fall 2015

ECE 158A: Lecture 7. Fall 2015 ECE 158A: Lecture 7 Fall 2015 Outline We have discussed IP shortest path routing Now we have a closer look at the IP addressing mechanism We are still at the networking layer, we will examine: IP Headers

More information

CS Efficient Network Management. Class 5. Danny Raz

CS Efficient Network Management. Class 5. Danny Raz CS236635 Efficient Network Management Class 5 Danny Raz 1 Minhalot Exercise 1 is due TODAY Exercise2 writing a paper review (list will be on the Web by the midterm) Mailing list - exists Mid Term exam:

More information

PoS(EXPReS09)036. e-vlbi Networking Tricks. Paul Boven, for the EXPReS team Joint Institute for VLBI in Europe (JIVE)

PoS(EXPReS09)036. e-vlbi Networking Tricks. Paul Boven, for the EXPReS team Joint Institute for VLBI in Europe (JIVE) , for the EXPReS team Joint Institute for VLBI in Europe (JIVE) E-mail: boven@jive.nl Real-time e-vlbi is made possible by having access to long-distance, high-performance networks - straight from the

More information

8. Networks. Why networked embedded systems General network architecture. Networks. Internet-enabled embedded systems Sensor networks

8. Networks. Why networked embedded systems General network architecture. Networks. Internet-enabled embedded systems Sensor networks 8. Networks Why networked embedded systems General network architecture ISO seven network layers Networks I 2 C, CAN, Ethernet Internet-enabled embedded systems Sensor networks Computers as Components

More information

CMPE 80N: Introduction to Networking and the Internet

CMPE 80N: Introduction to Networking and the Internet CMPE 80N: Introduction to Networking and the Internet Katia Obraczka Computer Engineering UCSC Baskin Engineering Lecture 11 CMPE 80N Fall'10 1 Announcements Forum #2 due on 11.05. CMPE 80N Fall'10 2 Last

More information

Your Global Automation Partner. Elevating Ethernet Intelligence: Implementing Ethernet Technology in Industrial Applications. White Paper - W1004

Your Global Automation Partner. Elevating Ethernet Intelligence: Implementing Ethernet Technology in Industrial Applications. White Paper - W1004 Your Global Automation Partner Elevating Ethernet Intelligence: Implementing Ethernet Technology in Industrial Applications White Paper - W1004 Manufacturers are faced with the constant demand to increase

More information

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964

On Distributed Communications, Rand Report RM-3420-PR, Paul Baran, August 1964 The requirements for a future all-digital-data distributed network which provides common user service for a wide range of users having different requirements is considered. The use of a standard format

More information

WF121: b/g/n module. Product Presentation

WF121: b/g/n module. Product Presentation WF121: 802.11 b/g/n module Product Presentation Topics Key features Benefits WF121 overview The Wi-Fi software stack Evaluation tools Certifications Use cases Key features WF121: Key features 802.11 b/g/n

More information

Energy-Efficient Data Transfers in Radio Astronomy with Software UDP RDMA Third Workshop on Innovating the Network for Data-Intensive Science, INDIS16

Energy-Efficient Data Transfers in Radio Astronomy with Software UDP RDMA Third Workshop on Innovating the Network for Data-Intensive Science, INDIS16 Energy-Efficient Data Transfers in Radio Astronomy with Software UDP RDMA Third Workshop on Innovating the Network for Data-Intensive Science, INDIS16 Przemek Lenkiewicz, Researcher@IBM Netherlands Bernard

More information

Lessons from EXPReS and the future of e-vlbi. 2nd Terena E2E Workshop, Amsterdam,

Lessons from EXPReS and the future of e-vlbi. 2nd Terena E2E Workshop, Amsterdam, Lessons from EXPReS and the future of e-vlbi 2nd Terena E2E Workshop, Amsterdam, 2009-12-08 What is JIVE? Operate the EVN correlator and support astronomers doing VLBI. A collaboration of the major radioastronomical

More information

CASPER AND GPUS MODERATOR: DANNY PRICE, SCRIBE: RICHARD PRESTAGE. Applications correlators, beamformers, spectrometers, FRB

CASPER AND GPUS MODERATOR: DANNY PRICE, SCRIBE: RICHARD PRESTAGE. Applications correlators, beamformers, spectrometers, FRB CASPER AND GPUS MODERATOR: DANNY PRICE, SCRIBE: RICHARD PRESTAGE Frameworks MPI, heterogenous large systems Pipelines hashpipe, psrdata, bifrost, htgs Data transport DPDK, libvma, NTOP Applications correlators,

More information

interface Question 1. a) Applications nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer

interface Question 1. a) Applications  nslookup/dig Web Application DNS SMTP HTTP layer SIP Transport layer OSPF ICMP IP Network layer TDTS06 Computer networks, August 23, 2008 Sketched answers to the written examination, provided by Juha Takkinen, IDA, juhta@ida.liu.se. ( Sketched means that you, in addition to the below answers, need

More information

The Data exacell DXC. J. Ray Scott DXC PI May 17, 2016

The Data exacell DXC. J. Ray Scott DXC PI May 17, 2016 The Data exacell DXC J. Ray Scott DXC PI May 17, 2016 DXC Leadership Mike Levine Co-Scientific Director Co-PI Nick Nystrom Senior Director of Research Co-PI Ralph Roskies Co-Scientific Director Co-PI Robin

More information

1 Highlight [User ID]. 2 Display text entry dialog. 3 Enter user name (pg.153). 4 Return to ftp menu (2/3).

1 Highlight [User ID]. 2 Display text entry dialog. 3 Enter user name (pg.153). 4 Return to ftp menu (2/3). $00_WT-4_En.book Page 165 Friday, August 10, 2007 2:02 PM FTP Menu, Page 2/3 Anonymous login: Highlight this option and press the multi selector right to toggle it on (M) or off. Turn this option on for

More information

DOCSIS. Introduction. Gabor Major. UPC Magyarorszag Kft. Liberty Global Inc.

DOCSIS. Introduction. Gabor Major. UPC Magyarorszag Kft. Liberty Global Inc. DOCSIS Introduction Gabor Major UPC Magyarorszag Kft. Liberty Global Inc. Agenda Introduction Signal transmission Provisioning flow Docsis protocol Docsis management traffic QoS Baseline privacy Dynamic

More information

Internet Service to Remote Sites

Internet Service to Remote Sites Internet Service to Remote Sites V1.6 November 2017 2017 Lauritzen Inc. - All rights reserved. 1 Contents 1. Internet Service to Remote Sites An Overview... 3 2. Site Inspection... 4 3. Radio Bridge to

More information

Defining Networks with the OSI Model. Module 2

Defining Networks with the OSI Model. Module 2 Defining Networks with the OSI Model Module 2 Objectives Skills Concepts Objective Domain Description Objective Domain Number Understanding OSI Basics Defining the Communications Subnetwork Defining the

More information

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia

IP - The Internet Protocol. Based on the slides of Dr. Jorg Liebeherr, University of Virginia IP - The Internet Protocol Based on the slides of Dr. Jorg Liebeherr, University of Virginia Orientation IP (Internet Protocol) is a Network Layer Protocol. IP: The waist of the hourglass IP is the waist

More information

Message Passing Models and Multicomputer distributed system LECTURE 7

Message Passing Models and Multicomputer distributed system LECTURE 7 Message Passing Models and Multicomputer distributed system LECTURE 7 DR SAMMAN H AMEEN 1 Node Node Node Node Node Node Message-passing direct network interconnection Node Node Node Node Node Node PAGE

More information

SKA Regional Centre Activities in Australasia

SKA Regional Centre Activities in Australasia SKA Regional Centre Activities in Australasia Dr Slava Kitaeff CSIRO-ICRAR APSRC Project Engineer ERIDANUS National Project Lead Why SKA Regional Centres? SKA 1 Observatory Compute capacity: 100 Pflops

More information

Chapter 7. Local Area Network Communications Protocols

Chapter 7. Local Area Network Communications Protocols Chapter 7 Local Area Network Communications Protocols The Network Layer The third layer of the OSI Model is the network layer. The network layer is concerned with providing a means for hosts to communicate

More information

Introduction to WiFi Networking. Training materials for wireless trainers

Introduction to WiFi Networking. Training materials for wireless trainers Introduction to WiFi Networking Training materials for wireless trainers Goals The goal of this lecture is to introduce 802.11 family of radio protocols 802.11 radio channels wireless network topologies

More information

Position of IP and other network-layer protocols in TCP/IP protocol suite

Position of IP and other network-layer protocols in TCP/IP protocol suite Position of IP and other network-layer protocols in TCP/IP protocol suite IPv4 is an unreliable datagram protocol a best-effort delivery service. The term best-effort means that IPv4 packets can be corrupted,

More information

HAI Network Communication Protocol Description

HAI Network Communication Protocol Description Home Automation, Inc. HAI Network Communication Protocol Description This document contains the intellectual property of Home Automation, Inc. (HAI). HAI authorizes the use of this information for the

More information

Networking interview questions

Networking interview questions Networking interview questions What is LAN? LAN is a computer network that spans a relatively small area. Most LANs are confined to a single building or group of buildings. However, one LAN can be connected

More information

Computer Network 2015 Mid-Term Exam.

Computer Network 2015 Mid-Term Exam. Computer Network 2015 Mid-Term Exam. Question : ``Basic of Computer Networks and the Internet' Please fill into the blanks (15%) a) The amount of time required to push all of a packet s bits into a link

More information

ECE 333: Introduction to Communication Networks Fall 2002

ECE 333: Introduction to Communication Networks Fall 2002 ECE 333: Introduction to Communication Networks Fall 2002 Lecture 26: Transport layer I 1 Transport Layer In the remaining lectures, we will discuss several issues that are commonly addressed at the transport

More information

ISA100.11a. Pengfei Ren.

ISA100.11a. Pengfei Ren. ISA100.11a Pengfei Ren pengfei@wayne.edu Outline Introduction System Overview Communication Protocol Security Coexistence Implementations and Equipment Conclusion Outline Introduction System Overview Communication

More information

Module 3. Wide Area Networking (WAN)

Module 3. Wide Area Networking (WAN) Module 3 Wide Area Networking (WAN) When many nodes or LAN s are connected together in a large scale, we have a WAN. This may be world wide. Because of the separation of the nodes, the Public Data Network

More information

CS162 Operating Systems and Systems Programming Lecture 21. Networking. Page 1

CS162 Operating Systems and Systems Programming Lecture 21. Networking. Page 1 CS162 Operating Systems and Systems Programming Lecture 21 Networking April 21, 2008 Prof. Anthony D. Joseph http://inst.eecs.berkeley.edu/~cs162 Review: The Internet Protocol: IP The Internet is a large

More information

Powering Real-time Radio Astronomy Signal Processing with latest GPU architectures

Powering Real-time Radio Astronomy Signal Processing with latest GPU architectures Powering Real-time Radio Astronomy Signal Processing with latest GPU architectures Harshavardhan Reddy Suda NCRA, India Vinay Deshpande NVIDIA, India Bharat Kumar NVIDIA, India What signals we are processing?

More information

CS 4390 Computer Networks. Transport Services and Protocols

CS 4390 Computer Networks. Transport Services and Protocols CS 4390 Computer Networks UT D data Session 07 Transport Layer Overview and UDP Adapted from Computer Networking a Top-Down Approach 1996-2012 by J.F Kurose and K.W. Ross, All Rights Reserved Transport

More information

System Architecture Challenges in the Home M2M Network

System Architecture Challenges in the Home M2M Network System Architecture Challenges in the Home M2M Network Michael Starsinic InterDigital Communications M2M Background M2M Communications Machine-to-Machine or Machine-to-Man The Machine usually includes

More information

Goal of Today s Lecture. EE 122: Designing IP. The Internet Hourglass. Our Story So Far (Context) Our Story So Far (Context), Con t

Goal of Today s Lecture. EE 122: Designing IP. The Internet Hourglass. Our Story So Far (Context) Our Story So Far (Context), Con t Goal of Today s Lecture EE 122: Designing IP Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee122/ (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues

More information

PPP Configuration Options

PPP Configuration Options PPP Configuration Options 1 PPP Configuration Options PPP can be configured to support various functions including: Authentication using either PAP or CHAP Compression using either Stacker or Predictor

More information

Chapter 7 Multimedia Networking

Chapter 7 Multimedia Networking Chapter 7 Multimedia Networking Principles Classify multimedia applications Identify the network services and the requirements the apps need Making the best of best effort service Mechanisms for providing

More information

ELEVATING ETHERNET INTELLIGENCE:

ELEVATING ETHERNET INTELLIGENCE: ELEVATING ETHERNET INTELLIGENCE: IMPLEMENTING ETHERNET TECHNOLOGY IN INDUSTRIAL APPLICATIONS A WHITE PAPER Published 11/28/2012 M anufacturers are faced with the constant features, benefits and performance

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

System Development for an HSDPA Music Channel Service

System Development for an HSDPA Music Channel Service : HSDPA Technologies Enabling Greater System Development for an HSDPA Music Channel Service Takaya Ono, Yohei Sato, Daisuke Kondo, and Junko Hiraishi Abstract The HSDPA (high-speed downlink packet access)

More information

By Ambuj Varshney & Akshat Logar

By Ambuj Varshney & Akshat Logar By Ambuj Varshney & Akshat Logar Wireless operations permits services, such as long range communications, that are impossible or impractical to implement with the use of wires. The term is commonly used

More information

Introduction to Protocols

Introduction to Protocols Chapter 6 Introduction to Protocols 1 Chapter 6 Introduction to Protocols What is a Network Protocol? A protocol is a set of rules that governs the communications between computers on a network. These

More information

Using CASA to Simulate Interferometer Observations

Using CASA to Simulate Interferometer Observations Using CASA to Simulate Interferometer Observations Nuria Marcelino North American ALMA Science Center Atacama Large Millimeter/submillimeter Array Expanded Very Large Array Robert C. Byrd Green Bank Telescope

More information

COMPUTER NETWORK. PREPARED BY: DHAVAL R. PATEL Page 1. Q.1 Explain IP address. IP address is unique number of network device in network.

COMPUTER NETWORK. PREPARED BY: DHAVAL R. PATEL Page 1. Q.1 Explain IP address. IP address is unique number of network device in network. Q.1 Explain IP address. IP address is unique number of network device in network. Two IP address could not be same. Using this network we can connect the devices with each other. It is separated by dot(.).

More information

Introduction to computer networking

Introduction to computer networking edge core Introduction to computer networking Comp Sci 3600 Security Outline edge core 1 2 edge 3 core 4 5 6 The edge core Outline edge core 1 2 edge 3 core 4 5 6 edge core Billions of connected computing

More information

EE-379 Embedded Systems and Applications Introduction to Ethernet

EE-379 Embedded Systems and Applications Introduction to Ethernet EE-379 Embedded Systems and Applications Introduction to Ethernet Cristinel Ababei Department of Electrical Engineering, University at Buffalo Spring 2013 Note: This course is offered as EE 459/500 in

More information