SCA Transport Protocol Driver

Size: px
Start display at page:

Download "SCA Transport Protocol Driver"

Transcription

1 SCA Transport Protocol Driver No: Introduction This report provides a detailed, technical description of the wireless modem s transport protocol driver developed for Mobile Data Computer Systems (MDCS). This module supports the Software Corporation of America (SCA) server/client transport protocol or can be adapted into any data transport protocol requiring high level, end-to-end data integrity. The purpose of this data transport method is to guarantee that the data sent between a client computer, usually a laptop in a public safety vehicle, and the server computer is checked between all components in the system. The series of radio modem uses a 32-bit Cyclic Redundancy Check (CRC) error detection on all radio packet that grantees the data accuracy on the radio link but, it was found that the integrity of the data could be compromised between the laptop and the wireless modem in the vehicle by electrical noise, power quality issues or other data collisions on the serial port of the computer. If the data packet structure was intact but the internal data corrupt, this could then be passed over the radio link to the server which could have trouble interpreting this data. To eliminate this as a potential problem, all data packets are checked between the laptop and the before transport and checked again between the and the server. Software Commands A new software command (SCA ON/OFF) has been added to the operating system in version Listed below are the discrete commands that are enabled in the when this software command is enabled: SCA = ON Enables the Transport Protocol and Programs the following commands. SWITCH 2 or 8 = UP Enables autoconnect (depends upon modem case style AUTOLF = OFF Disables auto line feeds ECHO = OFF Disables echo EDIT = OFF Disables edit functions from converse SENDPAC = 255 Disables sendpacket COMMAND = 0 Disables command mode return TERMC = ON Enables receive termination timer MESS = ON Enables formatted status messages Structure The following diagrams outline the required packet format for the MDCS Transfer Protocol: The sending packet is originated from either the or Server computer. Start Repeater Dest. Start Data End TX Error Header Route(s) Address Length Data Check SOH 3-Bytes 1-Byte 2-Bytes STX Bytes EOT 1-Byte 415 N. QUAY STREET KENNEWICK, WA Page 1 of 6

2 Description SOH (SOH) ASCII Start of Header (0x01) Repeater The client/server software driver controls all repeater routing. The repeater route fields are in Route bytes 2 through 4. If only 1 repeater is used, the first address in the route field will have the address of the repeater and the remaining 2 fields must be 0. The repeater routing fields will be loaded in successive bytes 2-4 with no repeater designated by inserting a 0 in that field. Destination Single byte address of remote. Valid addresses are (Decimal). Address Two byte field of total packet size including the BCC error check. Length Start Data (STX) ASCII Start Text (0x02) Data The modem can accept a data field from Bytes in length. Through testing, a maximum packet size of 512 Bytes provided best results. End of TX Error Check (EOT) ASCII End of Text (0x04) Single Byte Block Check Code (BCC) to validate packet information. Calculations for BCC listed below. The receiving packet is originated in the remote and sent to either the or Server computer. Start Repeater Source Start Data Data End TX Error Check Header Route(s) Address Length SOH 3-Bytes 1-Byte 2-Bytes STX Bytes EOT 1-Byte SOH Repeater Route Source Address Length Start Data Data End of TX Error Check Description (SOH) ASCII Start of Header (0x01) The repeater route fields are in bytes 2 through 4. For example, if only 1 repeater is used, the first address in the route field will be the address of the repeater and the remaining 2 fields will be 0. The addressing in the route order will not be modified from the send packet. Single byte address of that sent the data. Valid addresses are (Decimal). Two byte field of total packet size including the BCC error check. (STX) ASCII Start Text (0x02) The modem can accept a data field from Bytes in length. Through testing, a maximum packet size of 512 Bytes provided best results. (EOT) ASCII End of Text (0x04) Single Byte Block Check Code (BCC) to validate packet information. Calculations for BCC listed below. Reply s The reply packet will be sent from either the computer or to acknowledge a correct data packet. Acknowledge Not-Acknowledge ACK NAK (1-Byte) (1-Byte) Reply Description Acknowledge (ACK) ASCII Acknowledge (0x06) Not-Acknowledge (NAK) ASCII Not- Acknowledge (0x15) 415 N. QUAY STREET KENNEWICK, WA Page 2 of 6

3 Data Flow When the receives a packet from the server or client computer () it checks that the data was received correctly by calculating the checksum and comparing it to the BCC error check byte at the end of the packet (Figure 1). If the BCC does not match, the sends a NAK to the computer and discards the packet (Figure 2). If the checksum matches, the sends an ACK (Reply ) to the computer and forwards the data to the RF transmitter. 1st Successive s SS01-99 * (0x2A) * (0x2A) (ADD 10) RF Link (ADD 99) Server Time Figure 1: Transport Protocol Diagram Bad Data Re-send Bad Data Re-send (3X Max) NAK (0x15) * (0x2A) (ADD 10) 10ms 10ms (ADD 99) NAK (0x15) Server Time Figure 2: Error Handling Diagram The then sends the packet to the remote over the RF link using the route and destination address fields in the packet header. If the RF packet is the initial radio communication between the modems, the will return a connection status message (SS01- Destination Address ) to the computer. The remote will send a radio acknowledge to the transmitting that the packet was received correctly. After the receives the acknowledge from the remote it will send back an asterisk (* - 0x2A) to the originating computer indicating the data was received by the remote. If the sending does not receive an acknowledgement from the remote the packet is retransmitted the number of time indicated by the Retry command (6 Retries by default). If the packet fails to be passed over the RF link, the will send back a status message indicating the link is down (SS03) and the data discarded (Figure 3). An asterisk follows the status message. 1st RF Link Time RF Link Retry (6 Times) Failed to Connect Message SS05 If RF Link Already Established RF Link Retry (6 Times) Link Down Message SS03 (ADD 10) (ADD 99) Server Figure 3: RF Error Message Diagram 415 N. QUAY STREET KENNEWICK, WA Page 3 of 6

4 At the remote, the data is sent to the server/client computer ( Using a predetermined time delay (termt time), the will wait for an ACK or NAK and re-send the data if NAKed or if nothing is received (Figure 2). The will re-send the serial packet up to 3 times and then discard the data packet. Special Software Commands To return the to the Command mode and change software parameters, send the a data packet with 00 as destination. The will return to the command mode and will to be sent a Reset command to return to converse mode. Example Code for Calculating BCC The BCC will encompass all bytes including control characters. /*========================================= Block Check Code (BCC) Return BCC byte ========================================*/ BYTE Block_Check_Code( BYTE *block, WORD len ) { WORD i; WORD bcc = ZERO; For (i = ZERO; i < len; i++) { bcc^= string [i] ; /*XOR byte*/ bcc << = one ; /*rotate left by 1*/ bcc= bcc+((bcc>>8) & 0X01; /*Wrap MSB into LSB*/ } return (byte) bcc; } 415 N. QUAY STREET KENNEWICK, WA Page 4 of 6

5 Example Data Flow Diagrams The following diagrams list examples of the data flow from the client/server computer though the modems: Computer (Address 10) Server Computer RF Link (Address 99) Figure 4: Example Link Diagram Layout without repeaters Figure 4 (All Numbers in Hex) XX (Calculated) SOH Repeaters DA Length STX Data (Example) EOT BCC Layout without repeaters Figure 4 (All Numbers in Hex) A XX (Calculated) SOH Repeaters SA Length STX Data (Example) EOT BCC 415 N. QUAY STREET KENNEWICK, WA Page 5 of 6

6 Example Data Flow Diagrams (Cont.) Address 10 Address 101 Repeater Node 2 Mobile Node () Address 99 Address 100 Repeater Node 1 RF Server Computer Base System (Server) Figure 5: Example Repeater Diagram Layout Using Repeaters 100 and 101 Figure 5 (All Numbers in Hex) XX (Calculated) SOH Repeaters DA Length STX Data (Example) EOT BCC Layout Using Repeaters 100 and Figure 5 (All Numbers in Hex) A XX (Calculated) SOH Repeaters SA Length STX Data (Example) EOT BCC 415 N. QUAY STREET KENNEWICK, WA Page 6 of 6

Control Characters used in DirectNET

Control Characters used in DirectNET Control Characters used in DirectNET ENQ (0x05) Enquiry to start communications ACK (0x06) Acknowledge (data received and no errors NAK (0x15) Negative Acknowledge (data received but there were errors)

More information

BULLETIN 1203-GD2, -GK2 & 1336-GM2 DF1 MESSAGING (FULL DUPLEX / POINT-TO-POINT)

BULLETIN 1203-GD2, -GK2 & 1336-GM2 DF1 MESSAGING (FULL DUPLEX / POINT-TO-POINT) BULLETIN 1203-GD2, -GK2 & 1336-GM2 DF1 MESSAGING (FULL DUPLEX / POINT-TO-POINT) APPLICATION NOTE OCTOBER 20, 1999 PURPOSE The purpose of this document is to provide information on using the DF1 Full Duplex/Point-to-Point

More information

DirectNET Host. Communications Programs. In This Chapter...

DirectNET Host. Communications Programs. In This Chapter... Communications Programs In This Chapter.... Why do you need a communications program? Modes of Operation Protocol Components Controlling the Communications Initiating the Request Acknowledging the Request

More information

NL6000 Wireless Modem NL6000 User Manual Rev 1.1

NL6000 Wireless Modem NL6000 User Manual Rev 1.1 NL6000 Wireless Modem NL6000 User Manual Rev 1.1 WWW.RFNEULINK.COM 6. Procedures This section includes step-by-step procedures for configuring all the parameters that control the operation of the NL6000.

More information

Data Link Control Protocols

Data Link Control Protocols Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,

More information

PayLink-IP/232 Configuration Guide 2005 Lava Computer MFG Inc.

PayLink-IP/232 Configuration Guide 2005 Lava Computer MFG Inc. PayLink-IP/232 Configuration Guide 2005 Lava Computer MFG Inc. www.lavalink.com Rev. A07 PayLink-IP/232 Configuration Guide This document describes the configuration features of the PayLink-IP/232. It

More information

Data Link Protocols. High Level Data. Control Protocol. HDLC Framing ~~~~~~~~ Functions of a Data Link Protocol. Framing PDUs. Addressing Destination

Data Link Protocols. High Level Data. Control Protocol. HDLC Framing ~~~~~~~~ Functions of a Data Link Protocol. Framing PDUs. Addressing Destination Data Link Protocols Data Link Services Connection-less services Functions of a Data Link Protocol Framing PDUs ing Destination Error Detection / Error Recovery Link Management Ethernet (covered elsewhere)

More information

1. Data Link Layer Protocols

1. Data Link Layer Protocols 1. Data Link Layer Protocols Purpose of the Data Link Layer The Data Link Layer Purpose of the Data Link Layer Data Link Sublayers Network LLC Sublayer Data Link Physical MAC Sublayer 802.3 Ethernet 802.11

More information

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition

Chapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Identify

More information

6 Remote memory access protocol (normative)

6 Remote memory access protocol (normative) 6 Remote memory access protocol (normative) 6.1 General 6.1.1 Purpose The remote memory access protocol (RMAP) has been designed to support a wide range of SpaceWire applications. Its primary purpose however

More information

Wireless Modem Exchange (WMX) Protocol Description

Wireless Modem Exchange (WMX) Protocol Description Wireless Modem Exchange (WMX) Protocol Description Document Version D4 July 2013 Raveon Technologies Corporation 2320 Cousteau Court Vista, CA 92081 www.raveon.com 1 Raveon Technologies Corp. Table of

More information

11 Serial Communications

11 Serial Communications 11.1 COMMUNICATIONS PACKAGES There are a number of communication packages that can be used with the Quantum III to facilitate setup, record parameter data, view internal activity on a soft-scope and permit

More information

Modbus Remote Communication Protocol for REM 54_. Technical Description

Modbus Remote Communication Protocol for REM 54_. Technical Description Modbus Remote Communication Protocol for REM 54_ 1MRS 750781-MUM Issued: 08.03.2002 Version: A/18.06.2002 Checked: ML Approved: AF Remote Communication Protocol for REM 54_ Modbus We reserve the right

More information

GE Fanuc Interfacing. ENGINEERING REPORT No: Introduction. Installing ESTeem Utility Software A: INSTALL

GE Fanuc Interfacing. ENGINEERING REPORT No: Introduction. Installing ESTeem Utility Software A: INSTALL Interfacing ENGINEERING REPORT No: 91-010 Introduction This report describes interfacing the modem to General Electric (GE) Fanuc programmable controllers. These programmable logic controllers () consist

More information

FPU-16 A-B PROTOCOL/DATA LOGGER MANUAL

FPU-16 A-B PROTOCOL/DATA LOGGER MANUAL FPU-6 A-B PROTOCOL/DATA LOGGER MANUAL FEBRUARY 26, 22 PRELIMINARY Copyright 22 by Startco Engineering Ltd. All rights reserved. Publication: FPU-6-AB-M Document: S95-F6-AB Printed in Canada. Startco Engineering

More information

PBOT Data Distribution System

PBOT Data Distribution System FINANCIAL AUTOMATION PBOT Data Distribution System Vendor Interface Specification Document No.: OTS -04-668-SPEC Revision History Version Date Comments Approval Draft 5/25/05 Draft Note: This document

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms

More information

Transmission SIGNALs

Transmission SIGNALs Chapter 6 Digital Communications Basics 6.1 Introduction 6.2 Transmission media 6.3 Source of signal impairment 6.4 Asynchronous Transmission 6.5 Synchronous Transmission 6.6 Error Detection Methods 6.7

More information

Computer and Network Security

Computer and Network Security CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:

More information

WiMOD LR Base Host Controller Interface

WiMOD LR Base Host Controller Interface WiMOD LR Base Host Controller Interface Specification Version 1.7 Document ID: 4100/40140/0062 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information File

More information

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7

CIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7 CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the

More information

Data Link Layer. Srinidhi Varadarajan

Data Link Layer. Srinidhi Varadarajan Data Link Layer Srinidhi Varadarajan Data Link Layer: Functionality The data link layer must: Detect errors (using redundancy bits) Request retransmission if data is lost (using automatic repeat request

More information

Universal Asynchronous Receiver Transmitter Communication

Universal Asynchronous Receiver Transmitter Communication Universal Asynchronous Receiver Transmitter Communication 13 October 2011 Synchronous Serial Standard SPI I 2 C Asynchronous Serial Standard UART Asynchronous Resynchronization Asynchronous Data Transmission

More information

Data Representation and Binary Arithmetic. Lecture 2

Data Representation and Binary Arithmetic. Lecture 2 Data Representation and Binary Arithmetic Lecture 2 Computer Data Data is stored as binary; 0 s and 1 s Because two-state ( 0 & 1 ) logic elements can be manufactured easily Bit: binary digit (smallest

More information

Vanguard Managed Solutions

Vanguard Managed Solutions Vanguard Managed Solutions Vanguard Applications Ware Serial Feature Protocols Transparent Character-Oriented Protocol Notice 2002 Vanguard Managed Solutions, LLC 575 West Street Mansfield, Massachusetts

More information

CS422 Computer Networks

CS422 Computer Networks CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service

More information

PART III. Data Link Layer MGH T MGH C I 204

PART III. Data Link Layer MGH T MGH C I 204 PART III Data Link Layer Position of the data-link layer Data link layer duties LLC and MAC sublayers IEEE standards for LANs Chapters Chapter 10 Error Detection and Correction Chapter 11 Data Link Control

More information

The Transport Layer: TCP & Reliable Data Transfer

The Transport Layer: TCP & Reliable Data Transfer The Transport Layer: TCP & Reliable Data Transfer Smith College, CSC 249 February 15, 2018 1 Chapter 3: Transport Layer q TCP Transport layer services: v Multiplexing/demultiplexing v Connection management

More information

EZ Protocol. Communication Protocol for EZPLC. For use of EZAutomation and AVG Customers with EZPLC Products. Copyright 2005 AVG

EZ Protocol. Communication Protocol for EZPLC. For use of EZAutomation and AVG Customers with EZPLC Products. Copyright 2005 AVG EZ Protocol Communication Protocol for EZPLC For use of EZAutomation and AVG Customers with EZPLC Products Copyright 2005 AVG EZAutomation www.ezautomation.net 1-877-774-EASY EZ Protocol... 3 1. Intoduction...

More information

Data Link Layer: Overview, operations

Data Link Layer: Overview, operations Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer

More information

Xi2000-BT Series Configuration Guide

Xi2000-BT Series Configuration Guide U.S. Default Settings Sequence Reset Scanner Xi2000-BT Series Configuration Guide Auto-Sense Mode ON UPC-A Convert to EAN-13 OFF UPC-E Lead Zero ON Save Changes POS-X, Inc. 2130 Grant St. Bellingham, WA

More information

C1098 JPEG Module User Manual

C1098 JPEG Module User Manual C1098 JPEG Module User Manual General Description C1098 is VGA camera module performs as a JPEG compressed still camera that can be attached to a wireless or PDA host. Users can send out a snapshot command

More information

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

Announcements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations

More information

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer

Department of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application

More information

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6

No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:

More information

WiMOD LoRaWAN EndNode Modem HCI Specification

WiMOD LoRaWAN EndNode Modem HCI Specification WiMOD LoRaWAN EndNode Modem HCI Specification Specification Version 1.13 Document ID: 4100/40140/0073 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information

More information

Using UART in radio data transmission with the CDP-02 module By Tomihiko Uchikawa

Using UART in radio data transmission with the CDP-02 module By Tomihiko Uchikawa Using UART in radio data transmission with the CDP-02 module By Tomihiko Uchikawa Abstract: The first time a customer uses the CDP-TX-02N/RX-02N (called CDP-02 module) radio module, they are often uncertain

More information

STEVEN R. BAGLEY PACKETS

STEVEN R. BAGLEY PACKETS STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and

More information

Positional Number System

Positional Number System Positional Number System A number is represented by a string of digits where each digit position has an associated weight. The weight is based on the radix of the number system. Some common radices: Decimal.

More information

GNetPlus Communication Protocol

GNetPlus Communication Protocol GNetPlus Communication Protocol 1 TM970013 REV.C April 26, 2006 Basic Package (BINARY VERSION) Master Query Package (HOST) Field Header Address Query Function Data length DATA BYTES Error Check Desc SOH

More information

BASE STATION CONFIGURATION 4

BASE STATION CONFIGURATION 4 BASE STATION CONFIGURATION 4 4.1 Overview...47 4.2 Interfaces...49 4.2.1 TekLAN Parameters....................49 4.2.1.1 Radio.........................50 4.2.1.2 Wireless LAN Parameters..............52

More information

Frames, Packets and Topologies

Frames, Packets and Topologies Frames, Packets and Topologies Info 341 Networking and Distributed Applications Frames and Packets 1 Motivating Packets What if a network required everything to be sent as a single chunk What happens when

More information

Input-Output Organization

Input-Output Organization Ted Borys - CSI 404 5/1/2004 Page 11-1 Section 11 Input-Output Organization ASCII Character Set 94 printable characters Upper & lowercase letters 10 numerals Special characters such as $, @, #, % 34 control

More information

C-MAX CME8000-BUS. Module Layout CME8000-BUS-LP02 RS232. Industrial Module with CME8000 receiver IC. Short Description

C-MAX CME8000-BUS. Module Layout CME8000-BUS-LP02 RS232. Industrial Module with CME8000 receiver IC. Short Description Industrial Module with CME8000 receiver IC RF Technology Specialist Short Description The CME8000 is a BiCMOS integrated straight through receiver with build in very high sensitivity and a pre-decoding

More information

Ethernet IP Datalink. Introduction

Ethernet IP Datalink. Introduction Object Dictionary 1 Ethernet IP Datalink Introduction The Ethernet Internet Protocol (IP) Datalink object manages the Ethernet communications bus and the messages transmitted on it. This object allows

More information

Serial I/O. 4: Serial I/O. CET360 Microprocessor Engineering. J. Sumey

Serial I/O. 4: Serial I/O. CET360 Microprocessor Engineering. J. Sumey 4: Serial I/O CET360 Microprocessor Engineering J. Sumey Introduction serial, i.e. bit-at-a-time, interfacing techniques are useful when parallel interfacing limitations become problematic distance limitations

More information

Item 2) In clause PL_OC2:Overall_Control state frame transmission cancellations: change the text to be as follows:

Item 2) In clause PL_OC2:Overall_Control state frame transmission cancellations: change the text to be as follows: a Maxtor Corporation 500 McCarthy Boulevard Milpitas, CA 95035 USA To: T10 SAS Protocol Working Group Contact: Mark Evans Phone: 408-894-5310 Email: mark_evans@maxtor.com Date: 23 February 2004 Subject:

More information

Leica LP C (Laser Printer for Cassettes) System Requirement & Specifications

Leica LP C (Laser Printer for Cassettes) System Requirement & Specifications Leica LP C (Laser Printer for Cassettes) System Requirement & Specifications LP C Req. & Spec. Page 1 of 9 Version 1.1 Copyright 2010 Leica Microsystems All rights reserved All company names, product names,

More information

Appendix. Pioneering Protocols

Appendix. Pioneering Protocols Appendix Pioneering Protocols STUDENTS STUDYING ancient civilizations and languages often wonder what is the point in studying cultures that no longer exist. How will the way people lived hundreds and

More information

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science

Data Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow

More information

INTELLIS. Modbus Direct Network Monitor

INTELLIS. Modbus Direct Network Monitor INTELLIS Modbus Direct Network Monitor System Installation and Operation Manual Phone: (201) 794-7650 Fax: (201)794-0913 Chapter 1 Modbus Protocol Revision History Revision 1.0 30 April, 2002 Initial Version

More information

Packet/Frame, Error Detection How to send data efficiently & reliably?

Packet/Frame, Error Detection How to send data efficiently & reliably? Packet/Frame, Error Detection How to send data efficiently & reliably? Packet and Packet Communication - Shared Network Resource, Fairness, Reliability Frame - Byte Oriented Frame and Bit Oriented Frame

More information

Card Issuing Machine for Magnetic, Contact & IC Card

Card Issuing Machine for Magnetic, Contact & IC Card SPECIFICATION L 1 OF 68 2006. 10. 31. Card Issuing Machine for Magnetic, Contact & IC Card SPECIFICATION L 2 OF 68 2006. 10. 31. REVISION HISTORY No DATE DESCRIPTION REV PAGE F/W Name 1 2001.01.. Ver 2.00

More information

Chapter 3. The Data Link Layer. Wesam A. Hatamleh

Chapter 3. The Data Link Layer. Wesam A. Hatamleh Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data

More information

WiMOD LR Base Host Controller Interface

WiMOD LR Base Host Controller Interface WiMOD LR Base Host Controller Interface Specification Version 1.10 Document ID: 4100/40140/0062 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information File

More information

Implementation and Verification of a Pollingbased MAC Layer Protocol for PLC

Implementation and Verification of a Pollingbased MAC Layer Protocol for PLC Implementation and Verification of a Pollingbased Layer Protocol for PLC Project Work by Luis Lax Cortina at the Institute of the Industrial Information Technology Zeitraum: 11.12.2009 12.06.2010 Hauptreferent:

More information

The MMDVM Specification ( )

The MMDVM Specification ( ) The MMDVM Specification (20150922) Introduction The MMDVM is intended to be an open-source Multi-Mode Digital Voice Modem, which utilises the power of an ARM processor and a simple analogue interface board.

More information

plc numbers Encoded values; BCD and ASCII Error detection; parity, gray code and checksums

plc numbers Encoded values; BCD and ASCII Error detection; parity, gray code and checksums plc numbers - 3. 3. NUMBERS AND DATA Topics: Number bases; binary, octal,, hexa Binary calculations; s compliments, addition, subtraction and Boolean operations Encoded values; BCD and ASCII Error detection;

More information

Lecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1

Lecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Lecture 5 Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting

More information

ELEG3923 Microprocessor Ch.6 Arithmetic and Logics

ELEG3923 Microprocessor Ch.6 Arithmetic and Logics Department of Electrical Engineering University of Arkansas ELEG3923 Microprocessor Ch.6 Arithmetic and Logics Dr. Jingxian Wu wuj@uark.edu OUTLINE 2 Arithmetic instructions Signed number operations Logic

More information

DatraxRF Spread Spectrum Wireless Modem

DatraxRF Spread Spectrum Wireless Modem DatraxRF Spread Spectrum Wireless Modem Overview The DatraxRF 12, 96, and 192 modules are 100-milliwatt, frequency-hopping wireless modules that allow wireless communication between equipment using a standard

More information

Data Link Control Layer, Error Detection, Error Correction, and Framing

Data Link Control Layer, Error Detection, Error Correction, and Framing Data Link Control Layer, Error Detection, Error Correction, and Framing EEE 538, WEEK 2 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Error Detection Techniques Used

More information

MeshX [Firmware Version 801(x)] MaxStream Wireless Mesh Networking

MeshX [Firmware Version 801(x)] MaxStream Wireless Mesh Networking MeshX [Firmware Version 801(x)] MaxStream Wireless Mesh Networking Introduction 2 MeshX Feature Set 2 Communications 3 Transparent Operation 3 API Operation 3 Data Transmission 4 Unicast Addressing 4 Broadcast

More information

03-186r5 SAS-1.1 Transport layer retries 13 January 2004

03-186r5 SAS-1.1 Transport layer retries 13 January 2004 To: T10 Technical Committee From: Rob Elliott, HP (elliott@hp.com) Date: 13 January 2004 Subject: 03-186r5 SAS-1.1 Transport layer retries Revision history Revision 0 (6 May 2003) first revision Revision

More information

Internet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!! Garcia UCB!

Internet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!!  Garcia UCB! cs10.berkeley.edu CS10 : Beauty and Joy of Computing Internet II!!Senior Lecturer SOE Dan Garcia!!!www.cs.berkeley.edu/~ddgarcia CS10 L17 Internet II (1)! Why Networks?! Originally sharing I/O devices

More information

In modern computers data is usually stored in files, that can be small or very, very large. One might assume that, when we transfer a file from one

In modern computers data is usually stored in files, that can be small or very, very large. One might assume that, when we transfer a file from one In modern computers data is usually stored in files, that can be small or very, very large. One might assume that, when we transfer a file from one computer to another, the whole file is sent as a continuous

More information

03-186r3r3 SAS-1.1 Transport layer retries 25 October 2003

03-186r3r3 SAS-1.1 Transport layer retries 25 October 2003 To: T10 Technical Committee From: Rob Elliott, HP (elliott@hp.com) Date: 25 October 2003 Subject: 03-186r3r3 SAS-1.1 Transport layer retries Revision history Revision 0 (6 May 2003) first revision Revision

More information

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations

I. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched

More information

HAI Network Communication Protocol Description

HAI Network Communication Protocol Description Home Automation, Inc. HAI Network Communication Protocol Description This document contains the intellectual property of Home Automation, Inc. (HAI). HAI authorizes the use of this information for the

More information

General Remote Interface Description. en General Remote Interface Description

General Remote Interface Description. en General Remote Interface Description General Remote Interface Description en General Remote Interface Description General Remote Interface Description en 2 Table of Contents 1 Introduction...3 1.1 Purpose...3 1.2 Scope...3 1.3 Definitions,

More information

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.

The data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames. Module 2 Data Link Layer: - Data link Layer design issues - Error Detection and correction Elementary Data link protocols, Sliding window protocols- Basic Concept, One Bit Sliding window protocol, Concept

More information

3.1. Unit 3. Binary Representation

3.1. Unit 3. Binary Representation 3.1 Unit 3 Binary Representation ANALOG VS. DIGITAL 3.2 3.3 Analog vs. Digital The analog world is based on continuous events. Observations can take on (real) any value. The digital world is based on discrete

More information

Specification. for. Serial Interface DN-C635

Specification. for. Serial Interface DN-C635 Date 2003-01-28 1 page of 39 Specification for Serial Interface DN-C635 Denon, Ltd. Date 2003-01-28 2 page of 39 Histories Rev. Date Name Description 1.0 Jan.,28, 03 J.Watanabe Date 2003-01-28 3 page of

More information

RS485 INSTRUCTION MANUAL. DM4500 Series. Page 1 of 6

RS485 INSTRUCTION MANUAL. DM4500 Series. Page 1 of 6 RS485 INSTRUCTION MANUAL DM4500 Series Page 1 of 6 INDEX 1.1. RS485 OUTPUT...3 1.1.1. Introduction... 1.1.2. RS output menu diagram... Page 2 of 6 1.1 RS4 OUTPUT 1.1.1 Introduction The RS485 output option

More information

Fundamentals of Programming (C)

Fundamentals of Programming (C) Borrowed from lecturer notes by Omid Jafarinezhad Fundamentals of Programming (C) Group 8 Lecturer: Vahid Khodabakhshi Lecture Number Systems Department of Computer Engineering Outline Numeral Systems

More information

Module : ServerIron ADX Packet Capture

Module : ServerIron ADX Packet Capture Module : ServerIron ADX Packet Capture Objectives Upon completion of this module, you will be able to: Describe Brocade ServerIron ADX (ADX) Packet Capture feature Configure and verify the Packet Capture

More information

Card Issuing Station For Magnetic, Contact & IC Card

Card Issuing Station For Magnetic, Contact & IC Card 91000090 SPECIFICATION B 1 OF 56 2007. 10. 01. Card Issuing Station For Magnetic, Contact & IC Card KYTronics Corp.,Ltd 3 rd Floor, A-Dong, Twin Town-Bldg, 703-2. Gojan-Dong, AnSan-City, Kyung Ki-Do, Korea

More information

Ethereal Exercise 2 (Part A): Link Control Protocol

Ethereal Exercise 2 (Part A): Link Control Protocol Course: Semester: ELE437 Ethereal Exercise 2 (Part A): Link Control Protocol Introduction In this exercise some details at the data link layer will be examined. In particular, the Link Control Protocol

More information

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer

Overview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer Overview Data Link Technology Functions of the data link layer Technologies concept and design error control flow control fundamental protocols Suguru Yamaguchi Nara Institute of Science and Technology

More information

CRC. Implementation. Error control. Software schemes. Packet errors. Types of packet errors

CRC. Implementation. Error control. Software schemes. Packet errors. Types of packet errors CRC Implementation Error control An Engineering Approach to Computer Networking Detects all single bit errors almost all 2-bit errors any odd number of errors all bursts up to M, where generator length

More information

UNIT-II 1. Discuss the issues in the data link layer. Answer:

UNIT-II 1. Discuss the issues in the data link layer. Answer: UNIT-II 1. Discuss the issues in the data link layer. Answer: Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing

More information

(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.

(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1. Data Link Layer (cont.) (Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1 LOGICAL LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL

More information

OPERATION MANUAL Card Reader Communication

OPERATION MANUAL Card Reader Communication KC-0001-06-SI 2001-Apr.-2 OPERATION MANUAL Card Reader Communication Protocol SCR-9xxF 9xxF-xR xr-xxxx xxxx NEURON Corporation Copying is prohibited without NEURON Corporation s permission This specification

More information

2D BARCODE SCANNER CA-SC-20200B

2D BARCODE SCANNER CA-SC-20200B D BARCODE SCANNER CA-SC-B Quick Start Guide Getting Familiar with Your Device Thank you for choosing Capture Bar Code Scanner. All Devices deliver world-class performance for a broad range of applications

More information

Viewing Status and Statistics

Viewing Status and Statistics CHAPTER 7 This chapter explains how to use ADU to view the client adapter s status and its transmit and receive statistics. The following topics are covered in this chapter: Overview of ADU and Statistics

More information

RS485/RS232 Communications Interface

RS485/RS232 Communications Interface EUROTHERM DRIVES RS485/RS232 Communications Interface Technical Manual HA466357U001 Issue 3 Compatible with Version 4.x Software Copyright Eurotherm Drives Limited 2002 All rights strictly reserved. No

More information

CSE 461: Framing, Error Detection and Correction

CSE 461: Framing, Error Detection and Correction CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages

More information

Number Systems for Computers. Outline of Introduction. Binary, Octal and Hexadecimal numbers. Issues for Binary Representation of Numbers

Number Systems for Computers. Outline of Introduction. Binary, Octal and Hexadecimal numbers. Issues for Binary Representation of Numbers Outline of Introduction Administrivia What is computer architecture? What do computers do? Representing high level things in binary Data objects: integers, decimals, characters, etc. Memory locations (We

More information

INSTRUCTION MANUAL FOR GCS-300 COMMUNICATION [OPTION CODE: C5] GCSC3E

INSTRUCTION MANUAL FOR GCS-300 COMMUNICATION [OPTION CODE: C5] GCSC3E INSTRUCTION MANUAL FOR COMMUNICATION [OPTION CODE C5] GCSC3E1 2002.04 To prevent the accidents by mishandling of this controller, please arrange to give this manual into the hands of the operator who actually

More information

CHAPTER 6 ARITHMETIC, LOGIC INSTRUCTIONS, AND PROGRAMS

CHAPTER 6 ARITHMETIC, LOGIC INSTRUCTIONS, AND PROGRAMS CHAPTER 6 ARITHMETIC, LOGIC INSTRUCTIONS, AND PROGRAMS Addition of Unsigned Numbers The instruction ADD is used to add two operands Destination operand is always in register A Source operand can be a register,

More information

Interconnecting Networks with TCP/IP

Interconnecting Networks with TCP/IP Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol

More information

CCNA 1 Chapter 7 v5.0 Exam Answers 2013

CCNA 1 Chapter 7 v5.0 Exam Answers 2013 CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the

More information

Chapter 2 Number System

Chapter 2 Number System Chapter 2 Number System Embedded Systems with ARM Cortext-M Updated: Tuesday, January 16, 2018 What you should know.. Before coming to this class Decimal Binary Octal Hex 0 0000 00 0x0 1 0001 01 0x1 2

More information

ADVANCED VEHICLE TECHNOLOGIES, Inc. AV. AVT-718 KIE Support. Introduction. Hardware. Firmware. Inc.

ADVANCED VEHICLE TECHNOLOGIES, Inc. AV. AVT-718 KIE Support. Introduction. Hardware. Firmware. Inc. ADVANCED VEHICLE TECHNOLOGIES, Inc. AV Inc. AVT-718 KIE Support 6 February 2003 This document describes KIE (K-line Inverted Echo) mode of operation for the AVT-718 unit. KIE mode was first released in

More information

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1

Computer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1 Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter

More information

JCL-33A (C5) Warning. 1. System Configuration COMMUNICATION INSTRUCTION MANUAL

JCL-33A (C5) Warning. 1. System Configuration COMMUNICATION INSTRUCTION MANUAL COMMUNICATION INSTRUCTION MANUAL JCL-33A (C5) No.JCL3CE3 2018.11 This manual contains instructions for the communication functions, operations and notes when operating the JCL-33A. To prevent accidents

More information

Your favorite blog :www.vijay-jotani.weebly.com (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY

Your favorite blog :www.vijay-jotani.weebly.com (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY VISIT: Course Code : MCS-042 Course Title : Data Communication and Computer Network Assignment Number : MCA (4)/042/Assign/2014-15 Maximum Marks : 100 Weightage : 25% Last Dates for Submission : 15 th

More information

D0 DCM Module Setup Direct

D0 DCM Module Setup Direct D0 DCM Module Setup 3 In This Chapter.... Important Module Information Using DirectSOFT5 to Configure s 1 and Port 2 Registers Using Ladder Logic to Configure s (DL05) Using Ladder Logic to Configure s

More information

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

Chapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences

More information

The Transport Layer Reliability

The Transport Layer Reliability The Transport Layer Reliability CS 3, Lecture 7 http://www.cs.rutgers.edu/~sn4/3-s9 Srinivas Narayana (slides heavily adapted from text authors material) Quick recap: Transport Provide logical communication

More information