SCA Transport Protocol Driver
|
|
- Jerome Pope
- 5 years ago
- Views:
Transcription
1 SCA Transport Protocol Driver No: Introduction This report provides a detailed, technical description of the wireless modem s transport protocol driver developed for Mobile Data Computer Systems (MDCS). This module supports the Software Corporation of America (SCA) server/client transport protocol or can be adapted into any data transport protocol requiring high level, end-to-end data integrity. The purpose of this data transport method is to guarantee that the data sent between a client computer, usually a laptop in a public safety vehicle, and the server computer is checked between all components in the system. The series of radio modem uses a 32-bit Cyclic Redundancy Check (CRC) error detection on all radio packet that grantees the data accuracy on the radio link but, it was found that the integrity of the data could be compromised between the laptop and the wireless modem in the vehicle by electrical noise, power quality issues or other data collisions on the serial port of the computer. If the data packet structure was intact but the internal data corrupt, this could then be passed over the radio link to the server which could have trouble interpreting this data. To eliminate this as a potential problem, all data packets are checked between the laptop and the before transport and checked again between the and the server. Software Commands A new software command (SCA ON/OFF) has been added to the operating system in version Listed below are the discrete commands that are enabled in the when this software command is enabled: SCA = ON Enables the Transport Protocol and Programs the following commands. SWITCH 2 or 8 = UP Enables autoconnect (depends upon modem case style AUTOLF = OFF Disables auto line feeds ECHO = OFF Disables echo EDIT = OFF Disables edit functions from converse SENDPAC = 255 Disables sendpacket COMMAND = 0 Disables command mode return TERMC = ON Enables receive termination timer MESS = ON Enables formatted status messages Structure The following diagrams outline the required packet format for the MDCS Transfer Protocol: The sending packet is originated from either the or Server computer. Start Repeater Dest. Start Data End TX Error Header Route(s) Address Length Data Check SOH 3-Bytes 1-Byte 2-Bytes STX Bytes EOT 1-Byte 415 N. QUAY STREET KENNEWICK, WA Page 1 of 6
2 Description SOH (SOH) ASCII Start of Header (0x01) Repeater The client/server software driver controls all repeater routing. The repeater route fields are in Route bytes 2 through 4. If only 1 repeater is used, the first address in the route field will have the address of the repeater and the remaining 2 fields must be 0. The repeater routing fields will be loaded in successive bytes 2-4 with no repeater designated by inserting a 0 in that field. Destination Single byte address of remote. Valid addresses are (Decimal). Address Two byte field of total packet size including the BCC error check. Length Start Data (STX) ASCII Start Text (0x02) Data The modem can accept a data field from Bytes in length. Through testing, a maximum packet size of 512 Bytes provided best results. End of TX Error Check (EOT) ASCII End of Text (0x04) Single Byte Block Check Code (BCC) to validate packet information. Calculations for BCC listed below. The receiving packet is originated in the remote and sent to either the or Server computer. Start Repeater Source Start Data Data End TX Error Check Header Route(s) Address Length SOH 3-Bytes 1-Byte 2-Bytes STX Bytes EOT 1-Byte SOH Repeater Route Source Address Length Start Data Data End of TX Error Check Description (SOH) ASCII Start of Header (0x01) The repeater route fields are in bytes 2 through 4. For example, if only 1 repeater is used, the first address in the route field will be the address of the repeater and the remaining 2 fields will be 0. The addressing in the route order will not be modified from the send packet. Single byte address of that sent the data. Valid addresses are (Decimal). Two byte field of total packet size including the BCC error check. (STX) ASCII Start Text (0x02) The modem can accept a data field from Bytes in length. Through testing, a maximum packet size of 512 Bytes provided best results. (EOT) ASCII End of Text (0x04) Single Byte Block Check Code (BCC) to validate packet information. Calculations for BCC listed below. Reply s The reply packet will be sent from either the computer or to acknowledge a correct data packet. Acknowledge Not-Acknowledge ACK NAK (1-Byte) (1-Byte) Reply Description Acknowledge (ACK) ASCII Acknowledge (0x06) Not-Acknowledge (NAK) ASCII Not- Acknowledge (0x15) 415 N. QUAY STREET KENNEWICK, WA Page 2 of 6
3 Data Flow When the receives a packet from the server or client computer () it checks that the data was received correctly by calculating the checksum and comparing it to the BCC error check byte at the end of the packet (Figure 1). If the BCC does not match, the sends a NAK to the computer and discards the packet (Figure 2). If the checksum matches, the sends an ACK (Reply ) to the computer and forwards the data to the RF transmitter. 1st Successive s SS01-99 * (0x2A) * (0x2A) (ADD 10) RF Link (ADD 99) Server Time Figure 1: Transport Protocol Diagram Bad Data Re-send Bad Data Re-send (3X Max) NAK (0x15) * (0x2A) (ADD 10) 10ms 10ms (ADD 99) NAK (0x15) Server Time Figure 2: Error Handling Diagram The then sends the packet to the remote over the RF link using the route and destination address fields in the packet header. If the RF packet is the initial radio communication between the modems, the will return a connection status message (SS01- Destination Address ) to the computer. The remote will send a radio acknowledge to the transmitting that the packet was received correctly. After the receives the acknowledge from the remote it will send back an asterisk (* - 0x2A) to the originating computer indicating the data was received by the remote. If the sending does not receive an acknowledgement from the remote the packet is retransmitted the number of time indicated by the Retry command (6 Retries by default). If the packet fails to be passed over the RF link, the will send back a status message indicating the link is down (SS03) and the data discarded (Figure 3). An asterisk follows the status message. 1st RF Link Time RF Link Retry (6 Times) Failed to Connect Message SS05 If RF Link Already Established RF Link Retry (6 Times) Link Down Message SS03 (ADD 10) (ADD 99) Server Figure 3: RF Error Message Diagram 415 N. QUAY STREET KENNEWICK, WA Page 3 of 6
4 At the remote, the data is sent to the server/client computer ( Using a predetermined time delay (termt time), the will wait for an ACK or NAK and re-send the data if NAKed or if nothing is received (Figure 2). The will re-send the serial packet up to 3 times and then discard the data packet. Special Software Commands To return the to the Command mode and change software parameters, send the a data packet with 00 as destination. The will return to the command mode and will to be sent a Reset command to return to converse mode. Example Code for Calculating BCC The BCC will encompass all bytes including control characters. /*========================================= Block Check Code (BCC) Return BCC byte ========================================*/ BYTE Block_Check_Code( BYTE *block, WORD len ) { WORD i; WORD bcc = ZERO; For (i = ZERO; i < len; i++) { bcc^= string [i] ; /*XOR byte*/ bcc << = one ; /*rotate left by 1*/ bcc= bcc+((bcc>>8) & 0X01; /*Wrap MSB into LSB*/ } return (byte) bcc; } 415 N. QUAY STREET KENNEWICK, WA Page 4 of 6
5 Example Data Flow Diagrams The following diagrams list examples of the data flow from the client/server computer though the modems: Computer (Address 10) Server Computer RF Link (Address 99) Figure 4: Example Link Diagram Layout without repeaters Figure 4 (All Numbers in Hex) XX (Calculated) SOH Repeaters DA Length STX Data (Example) EOT BCC Layout without repeaters Figure 4 (All Numbers in Hex) A XX (Calculated) SOH Repeaters SA Length STX Data (Example) EOT BCC 415 N. QUAY STREET KENNEWICK, WA Page 5 of 6
6 Example Data Flow Diagrams (Cont.) Address 10 Address 101 Repeater Node 2 Mobile Node () Address 99 Address 100 Repeater Node 1 RF Server Computer Base System (Server) Figure 5: Example Repeater Diagram Layout Using Repeaters 100 and 101 Figure 5 (All Numbers in Hex) XX (Calculated) SOH Repeaters DA Length STX Data (Example) EOT BCC Layout Using Repeaters 100 and Figure 5 (All Numbers in Hex) A XX (Calculated) SOH Repeaters SA Length STX Data (Example) EOT BCC 415 N. QUAY STREET KENNEWICK, WA Page 6 of 6
Control Characters used in DirectNET
Control Characters used in DirectNET ENQ (0x05) Enquiry to start communications ACK (0x06) Acknowledge (data received and no errors NAK (0x15) Negative Acknowledge (data received but there were errors)
More informationBULLETIN 1203-GD2, -GK2 & 1336-GM2 DF1 MESSAGING (FULL DUPLEX / POINT-TO-POINT)
BULLETIN 1203-GD2, -GK2 & 1336-GM2 DF1 MESSAGING (FULL DUPLEX / POINT-TO-POINT) APPLICATION NOTE OCTOBER 20, 1999 PURPOSE The purpose of this document is to provide information on using the DF1 Full Duplex/Point-to-Point
More informationDirectNET Host. Communications Programs. In This Chapter...
Communications Programs In This Chapter.... Why do you need a communications program? Modes of Operation Protocol Components Controlling the Communications Initiating the Request Acknowledging the Request
More informationNL6000 Wireless Modem NL6000 User Manual Rev 1.1
NL6000 Wireless Modem NL6000 User Manual Rev 1.1 WWW.RFNEULINK.COM 6. Procedures This section includes step-by-step procedures for configuring all the parameters that control the operation of the NL6000.
More informationData Link Control Protocols
Protocols : Introduction to Data Communications Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 23 May 2012 Y12S1L07, Steve/Courses/2012/s1/its323/lectures/datalink.tex,
More informationPayLink-IP/232 Configuration Guide 2005 Lava Computer MFG Inc.
PayLink-IP/232 Configuration Guide 2005 Lava Computer MFG Inc. www.lavalink.com Rev. A07 PayLink-IP/232 Configuration Guide This document describes the configuration features of the PayLink-IP/232. It
More informationData Link Protocols. High Level Data. Control Protocol. HDLC Framing ~~~~~~~~ Functions of a Data Link Protocol. Framing PDUs. Addressing Destination
Data Link Protocols Data Link Services Connection-less services Functions of a Data Link Protocol Framing PDUs ing Destination Error Detection / Error Recovery Link Management Ethernet (covered elsewhere)
More information1. Data Link Layer Protocols
1. Data Link Layer Protocols Purpose of the Data Link Layer The Data Link Layer Purpose of the Data Link Layer Data Link Sublayers Network LLC Sublayer Data Link Physical MAC Sublayer 802.3 Ethernet 802.11
More informationChapter Six. Errors, Error Detection, and Error Control. Data Communications and Computer Networks: A Business User s Approach Seventh Edition
Chapter Six Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User s Approach Seventh Edition After reading this chapter, you should be able to: Identify
More information6 Remote memory access protocol (normative)
6 Remote memory access protocol (normative) 6.1 General 6.1.1 Purpose The remote memory access protocol (RMAP) has been designed to support a wide range of SpaceWire applications. Its primary purpose however
More informationWireless Modem Exchange (WMX) Protocol Description
Wireless Modem Exchange (WMX) Protocol Description Document Version D4 July 2013 Raveon Technologies Corporation 2320 Cousteau Court Vista, CA 92081 www.raveon.com 1 Raveon Technologies Corp. Table of
More information11 Serial Communications
11.1 COMMUNICATIONS PACKAGES There are a number of communication packages that can be used with the Quantum III to facilitate setup, record parameter data, view internal activity on a soft-scope and permit
More informationModbus Remote Communication Protocol for REM 54_. Technical Description
Modbus Remote Communication Protocol for REM 54_ 1MRS 750781-MUM Issued: 08.03.2002 Version: A/18.06.2002 Checked: ML Approved: AF Remote Communication Protocol for REM 54_ Modbus We reserve the right
More informationGE Fanuc Interfacing. ENGINEERING REPORT No: Introduction. Installing ESTeem Utility Software A: INSTALL
Interfacing ENGINEERING REPORT No: 91-010 Introduction This report describes interfacing the modem to General Electric (GE) Fanuc programmable controllers. These programmable logic controllers () consist
More informationFPU-16 A-B PROTOCOL/DATA LOGGER MANUAL
FPU-6 A-B PROTOCOL/DATA LOGGER MANUAL FEBRUARY 26, 22 PRELIMINARY Copyright 22 by Startco Engineering Ltd. All rights reserved. Publication: FPU-6-AB-M Document: S95-F6-AB Printed in Canada. Startco Engineering
More informationPBOT Data Distribution System
FINANCIAL AUTOMATION PBOT Data Distribution System Vendor Interface Specification Document No.: OTS -04-668-SPEC Revision History Version Date Comments Approval Draft 5/25/05 Draft Note: This document
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 8
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 8 Announcements Reminder: Project 1 is due on tonight by midnight. Midterm 1 will be held next Thursday, Feb. 8th. Example midterms
More informationTransmission SIGNALs
Chapter 6 Digital Communications Basics 6.1 Introduction 6.2 Transmission media 6.3 Source of signal impairment 6.4 Asynchronous Transmission 6.5 Synchronous Transmission 6.6 Error Detection Methods 6.7
More informationComputer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2009 Lecture 6 Announcements First project: Due: 6 Feb. 2009 at 11:59 p.m. http://www.cis.upenn.edu/~cis551/project1.html Plan for Today: Networks:
More informationWiMOD LR Base Host Controller Interface
WiMOD LR Base Host Controller Interface Specification Version 1.7 Document ID: 4100/40140/0062 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information File
More informationCIS 551 / TCOM 401 Computer and Network Security. Spring 2007 Lecture 7
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 7 Announcements Reminder: Project 1 is due on Thursday. 2/1/07 CIS/TCOM 551 2 Network Architecture General blueprints that guide the
More informationData Link Layer. Srinidhi Varadarajan
Data Link Layer Srinidhi Varadarajan Data Link Layer: Functionality The data link layer must: Detect errors (using redundancy bits) Request retransmission if data is lost (using automatic repeat request
More informationUniversal Asynchronous Receiver Transmitter Communication
Universal Asynchronous Receiver Transmitter Communication 13 October 2011 Synchronous Serial Standard SPI I 2 C Asynchronous Serial Standard UART Asynchronous Resynchronization Asynchronous Data Transmission
More informationData Representation and Binary Arithmetic. Lecture 2
Data Representation and Binary Arithmetic Lecture 2 Computer Data Data is stored as binary; 0 s and 1 s Because two-state ( 0 & 1 ) logic elements can be manufactured easily Bit: binary digit (smallest
More informationVanguard Managed Solutions
Vanguard Managed Solutions Vanguard Applications Ware Serial Feature Protocols Transparent Character-Oriented Protocol Notice 2002 Vanguard Managed Solutions, LLC 575 West Street Mansfield, Massachusetts
More informationCS422 Computer Networks
CS422 Computer Networks Lecture 3 Data Link Layer Dr. Xiaobo Zhou Department of Computer Science CS422 DataLinkLayer.1 Data Link Layer Design Issues Services Provided to the Network Layer Provide service
More informationPART III. Data Link Layer MGH T MGH C I 204
PART III Data Link Layer Position of the data-link layer Data link layer duties LLC and MAC sublayers IEEE standards for LANs Chapters Chapter 10 Error Detection and Correction Chapter 11 Data Link Control
More informationThe Transport Layer: TCP & Reliable Data Transfer
The Transport Layer: TCP & Reliable Data Transfer Smith College, CSC 249 February 15, 2018 1 Chapter 3: Transport Layer q TCP Transport layer services: v Multiplexing/demultiplexing v Connection management
More informationEZ Protocol. Communication Protocol for EZPLC. For use of EZAutomation and AVG Customers with EZPLC Products. Copyright 2005 AVG
EZ Protocol Communication Protocol for EZPLC For use of EZAutomation and AVG Customers with EZPLC Products Copyright 2005 AVG EZAutomation www.ezautomation.net 1-877-774-EASY EZ Protocol... 3 1. Intoduction...
More informationData Link Layer: Overview, operations
Data Link Layer: Overview, operations Chapter 3 1 Outlines 1. Data Link Layer Functions. Data Link Services 3. Framing 4. Error Detection/Correction. Flow Control 6. Medium Access 1 1. Data Link Layer
More informationXi2000-BT Series Configuration Guide
U.S. Default Settings Sequence Reset Scanner Xi2000-BT Series Configuration Guide Auto-Sense Mode ON UPC-A Convert to EAN-13 OFF UPC-E Lead Zero ON Save Changes POS-X, Inc. 2130 Grant St. Bellingham, WA
More informationC1098 JPEG Module User Manual
C1098 JPEG Module User Manual General Description C1098 is VGA camera module performs as a JPEG compressed still camera that can be attached to a wireless or PDA host. Users can send out a snapshot command
More informationAnnouncements. No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine Computer Science Department 1 / 33 1 COS 140: Foundations
More informationDepartment of Computer and IT Engineering University of Kurdistan. Data Communication Netwotks (Graduate level) Data Link Layer
Department of Computer and IT Engineering University of Kurdistan Data Communication Netwotks (Graduate level) Data Link Layer By: Dr. Alireza Abdollahpouri Data Link Layer 2 Data Link Layer Application
More informationNo book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6
Announcements No book chapter for this topic! Slides are posted online as usual Homework: Will be posted online Due 12/6 Copyright c 2002 2017 UMaine School of Computing and Information S 1 / 33 COS 140:
More informationWiMOD LoRaWAN EndNode Modem HCI Specification
WiMOD LoRaWAN EndNode Modem HCI Specification Specification Version 1.13 Document ID: 4100/40140/0073 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information
More informationUsing UART in radio data transmission with the CDP-02 module By Tomihiko Uchikawa
Using UART in radio data transmission with the CDP-02 module By Tomihiko Uchikawa Abstract: The first time a customer uses the CDP-TX-02N/RX-02N (called CDP-02 module) radio module, they are often uncertain
More informationSTEVEN R. BAGLEY PACKETS
STEVEN R. BAGLEY PACKETS INTRODUCTION Talked about how data is split into packets Allows it to be multiplexed onto the network with data from other machines But exactly how is it split into packets and
More informationPositional Number System
Positional Number System A number is represented by a string of digits where each digit position has an associated weight. The weight is based on the radix of the number system. Some common radices: Decimal.
More informationGNetPlus Communication Protocol
GNetPlus Communication Protocol 1 TM970013 REV.C April 26, 2006 Basic Package (BINARY VERSION) Master Query Package (HOST) Field Header Address Query Function Data length DATA BYTES Error Check Desc SOH
More informationBASE STATION CONFIGURATION 4
BASE STATION CONFIGURATION 4 4.1 Overview...47 4.2 Interfaces...49 4.2.1 TekLAN Parameters....................49 4.2.1.1 Radio.........................50 4.2.1.2 Wireless LAN Parameters..............52
More informationFrames, Packets and Topologies
Frames, Packets and Topologies Info 341 Networking and Distributed Applications Frames and Packets 1 Motivating Packets What if a network required everything to be sent as a single chunk What happens when
More informationInput-Output Organization
Ted Borys - CSI 404 5/1/2004 Page 11-1 Section 11 Input-Output Organization ASCII Character Set 94 printable characters Upper & lowercase letters 10 numerals Special characters such as $, @, #, % 34 control
More informationC-MAX CME8000-BUS. Module Layout CME8000-BUS-LP02 RS232. Industrial Module with CME8000 receiver IC. Short Description
Industrial Module with CME8000 receiver IC RF Technology Specialist Short Description The CME8000 is a BiCMOS integrated straight through receiver with build in very high sensitivity and a pre-decoding
More informationEthernet IP Datalink. Introduction
Object Dictionary 1 Ethernet IP Datalink Introduction The Ethernet Internet Protocol (IP) Datalink object manages the Ethernet communications bus and the messages transmitted on it. This object allows
More informationSerial I/O. 4: Serial I/O. CET360 Microprocessor Engineering. J. Sumey
4: Serial I/O CET360 Microprocessor Engineering J. Sumey Introduction serial, i.e. bit-at-a-time, interfacing techniques are useful when parallel interfacing limitations become problematic distance limitations
More informationItem 2) In clause PL_OC2:Overall_Control state frame transmission cancellations: change the text to be as follows:
a Maxtor Corporation 500 McCarthy Boulevard Milpitas, CA 95035 USA To: T10 SAS Protocol Working Group Contact: Mark Evans Phone: 408-894-5310 Email: mark_evans@maxtor.com Date: 23 February 2004 Subject:
More informationLeica LP C (Laser Printer for Cassettes) System Requirement & Specifications
Leica LP C (Laser Printer for Cassettes) System Requirement & Specifications LP C Req. & Spec. Page 1 of 9 Version 1.1 Copyright 2010 Leica Microsystems All rights reserved All company names, product names,
More informationAppendix. Pioneering Protocols
Appendix Pioneering Protocols STUDENTS STUDYING ancient civilizations and languages often wonder what is the point in studying cultures that no longer exist. How will the way people lived hundreds and
More informationData Link Technology. Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science
Data Link Technology Suguru Yamaguchi Nara Institute of Science and Technology Department of Information Science Agenda Functions of the data link layer Technologies concept and design error control flow
More informationINTELLIS. Modbus Direct Network Monitor
INTELLIS Modbus Direct Network Monitor System Installation and Operation Manual Phone: (201) 794-7650 Fax: (201)794-0913 Chapter 1 Modbus Protocol Revision History Revision 1.0 30 April, 2002 Initial Version
More informationPacket/Frame, Error Detection How to send data efficiently & reliably?
Packet/Frame, Error Detection How to send data efficiently & reliably? Packet and Packet Communication - Shared Network Resource, Fairness, Reliability Frame - Byte Oriented Frame and Bit Oriented Frame
More informationCard Issuing Machine for Magnetic, Contact & IC Card
SPECIFICATION L 1 OF 68 2006. 10. 31. Card Issuing Machine for Magnetic, Contact & IC Card SPECIFICATION L 2 OF 68 2006. 10. 31. REVISION HISTORY No DATE DESCRIPTION REV PAGE F/W Name 1 2001.01.. Ver 2.00
More informationChapter 3. The Data Link Layer. Wesam A. Hatamleh
Chapter 3 The Data Link Layer The Data Link Layer Data Link Layer Design Issues Error Detection and Correction Elementary Data Link Protocols Sliding Window Protocols Example Data Link Protocols The Data
More informationWiMOD LR Base Host Controller Interface
WiMOD LR Base Host Controller Interface Specification Version 1.10 Document ID: 4100/40140/0062 IMST GmbH Carl-Friedrich-Gauß-Str. 2-4 47475 KAMP-LINTFORT GERMANY Introduction Document Information File
More informationImplementation and Verification of a Pollingbased MAC Layer Protocol for PLC
Implementation and Verification of a Pollingbased Layer Protocol for PLC Project Work by Luis Lax Cortina at the Institute of the Industrial Information Technology Zeitraum: 11.12.2009 12.06.2010 Hauptreferent:
More informationThe MMDVM Specification ( )
The MMDVM Specification (20150922) Introduction The MMDVM is intended to be an open-source Multi-Mode Digital Voice Modem, which utilises the power of an ARM processor and a simple analogue interface board.
More informationplc numbers Encoded values; BCD and ASCII Error detection; parity, gray code and checksums
plc numbers - 3. 3. NUMBERS AND DATA Topics: Number bases; binary, octal,, hexa Binary calculations; s compliments, addition, subtraction and Boolean operations Encoded values; BCD and ASCII Error detection;
More informationLecture 5. Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1
Lecture 5 Homework 2 posted, due September 15. Reminder: Homework 1 due today. Questions? Thursday, September 8 CS 475 Networks - Lecture 5 1 Outline Chapter 2 - Getting Connected 2.1 Perspectives on Connecting
More informationELEG3923 Microprocessor Ch.6 Arithmetic and Logics
Department of Electrical Engineering University of Arkansas ELEG3923 Microprocessor Ch.6 Arithmetic and Logics Dr. Jingxian Wu wuj@uark.edu OUTLINE 2 Arithmetic instructions Signed number operations Logic
More informationDatraxRF Spread Spectrum Wireless Modem
DatraxRF Spread Spectrum Wireless Modem Overview The DatraxRF 12, 96, and 192 modules are 100-milliwatt, frequency-hopping wireless modules that allow wireless communication between equipment using a standard
More informationData Link Control Layer, Error Detection, Error Correction, and Framing
Data Link Control Layer, Error Detection, Error Correction, and Framing EEE 538, WEEK 2 Dr. Nail Akar Bilkent University Electrical and Electronics Engineering Department 1 Error Detection Techniques Used
More informationMeshX [Firmware Version 801(x)] MaxStream Wireless Mesh Networking
MeshX [Firmware Version 801(x)] MaxStream Wireless Mesh Networking Introduction 2 MeshX Feature Set 2 Communications 3 Transparent Operation 3 API Operation 3 Data Transmission 4 Unicast Addressing 4 Broadcast
More information03-186r5 SAS-1.1 Transport layer retries 13 January 2004
To: T10 Technical Committee From: Rob Elliott, HP (elliott@hp.com) Date: 13 January 2004 Subject: 03-186r5 SAS-1.1 Transport layer retries Revision history Revision 0 (6 May 2003) first revision Revision
More informationInternet II. CS10 : Beauty and Joy of Computing. cs10.berkeley.edu. !!Senior Lecturer SOE Dan Garcia!!! Garcia UCB!
cs10.berkeley.edu CS10 : Beauty and Joy of Computing Internet II!!Senior Lecturer SOE Dan Garcia!!!www.cs.berkeley.edu/~ddgarcia CS10 L17 Internet II (1)! Why Networks?! Originally sharing I/O devices
More informationIn modern computers data is usually stored in files, that can be small or very, very large. One might assume that, when we transfer a file from one
In modern computers data is usually stored in files, that can be small or very, very large. One might assume that, when we transfer a file from one computer to another, the whole file is sent as a continuous
More information03-186r3r3 SAS-1.1 Transport layer retries 25 October 2003
To: T10 Technical Committee From: Rob Elliott, HP (elliott@hp.com) Date: 25 October 2003 Subject: 03-186r3r3 SAS-1.1 Transport layer retries Revision history Revision 0 (6 May 2003) first revision Revision
More informationI. INTRODUCTION. each station (i.e., computer, telephone, etc.) directly connected to all other stations
I. INTRODUCTION (a) Network Topologies (i) point-to-point communication each station (i.e., computer, telephone, etc.) directly connected to all other stations (ii) switched networks (1) circuit switched
More informationHAI Network Communication Protocol Description
Home Automation, Inc. HAI Network Communication Protocol Description This document contains the intellectual property of Home Automation, Inc. (HAI). HAI authorizes the use of this information for the
More informationGeneral Remote Interface Description. en General Remote Interface Description
General Remote Interface Description en General Remote Interface Description General Remote Interface Description en 2 Table of Contents 1 Introduction...3 1.1 Purpose...3 1.2 Scope...3 1.3 Definitions,
More informationThe data link layer has a number of specific functions it can carry out. These functions include. Figure 2-1. Relationship between packets and frames.
Module 2 Data Link Layer: - Data link Layer design issues - Error Detection and correction Elementary Data link protocols, Sliding window protocols- Basic Concept, One Bit Sliding window protocol, Concept
More information3.1. Unit 3. Binary Representation
3.1 Unit 3 Binary Representation ANALOG VS. DIGITAL 3.2 3.3 Analog vs. Digital The analog world is based on continuous events. Observations can take on (real) any value. The digital world is based on discrete
More informationSpecification. for. Serial Interface DN-C635
Date 2003-01-28 1 page of 39 Specification for Serial Interface DN-C635 Denon, Ltd. Date 2003-01-28 2 page of 39 Histories Rev. Date Name Description 1.0 Jan.,28, 03 J.Watanabe Date 2003-01-28 3 page of
More informationRS485 INSTRUCTION MANUAL. DM4500 Series. Page 1 of 6
RS485 INSTRUCTION MANUAL DM4500 Series Page 1 of 6 INDEX 1.1. RS485 OUTPUT...3 1.1.1. Introduction... 1.1.2. RS output menu diagram... Page 2 of 6 1.1 RS4 OUTPUT 1.1.1 Introduction The RS485 output option
More informationFundamentals of Programming (C)
Borrowed from lecturer notes by Omid Jafarinezhad Fundamentals of Programming (C) Group 8 Lecturer: Vahid Khodabakhshi Lecture Number Systems Department of Computer Engineering Outline Numeral Systems
More informationModule : ServerIron ADX Packet Capture
Module : ServerIron ADX Packet Capture Objectives Upon completion of this module, you will be able to: Describe Brocade ServerIron ADX (ADX) Packet Capture feature Configure and verify the Packet Capture
More informationCard Issuing Station For Magnetic, Contact & IC Card
91000090 SPECIFICATION B 1 OF 56 2007. 10. 01. Card Issuing Station For Magnetic, Contact & IC Card KYTronics Corp.,Ltd 3 rd Floor, A-Dong, Twin Town-Bldg, 703-2. Gojan-Dong, AnSan-City, Kyung Ki-Do, Korea
More informationEthereal Exercise 2 (Part A): Link Control Protocol
Course: Semester: ELE437 Ethereal Exercise 2 (Part A): Link Control Protocol Introduction In this exercise some details at the data link layer will be examined. In particular, the Link Control Protocol
More informationOverview. Data Link Technology. Role of the data-link layer. Role of the data-link layer. Function of the physical layer
Overview Data Link Technology Functions of the data link layer Technologies concept and design error control flow control fundamental protocols Suguru Yamaguchi Nara Institute of Science and Technology
More informationCRC. Implementation. Error control. Software schemes. Packet errors. Types of packet errors
CRC Implementation Error control An Engineering Approach to Computer Networking Detects all single bit errors almost all 2-bit errors any odd number of errors all bursts up to M, where generator length
More informationUNIT-II 1. Discuss the issues in the data link layer. Answer:
UNIT-II 1. Discuss the issues in the data link layer. Answer: Data Link Layer Design Issues: The data link layer has a number of specific functions it can carry out. These functions include 1. Providing
More information(Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1.
Data Link Layer (cont.) (Sicherungsschicht) Chapter 5 (part 2) [Wa0001] HDLC - 1 LOGICAL LINK CONTROL MEDIUM ACCESS CONTROL PHYSICAL SIGNALING DATA LINK LAYER PHYSICAL LAYER ACCESS UNIT INTERFACE PHYSICAL
More informationOPERATION MANUAL Card Reader Communication
KC-0001-06-SI 2001-Apr.-2 OPERATION MANUAL Card Reader Communication Protocol SCR-9xxF 9xxF-xR xr-xxxx xxxx NEURON Corporation Copying is prohibited without NEURON Corporation s permission This specification
More information2D BARCODE SCANNER CA-SC-20200B
D BARCODE SCANNER CA-SC-B Quick Start Guide Getting Familiar with Your Device Thank you for choosing Capture Bar Code Scanner. All Devices deliver world-class performance for a broad range of applications
More informationViewing Status and Statistics
CHAPTER 7 This chapter explains how to use ADU to view the client adapter s status and its transmit and receive statistics. The following topics are covered in this chapter: Overview of ADU and Statistics
More informationRS485/RS232 Communications Interface
EUROTHERM DRIVES RS485/RS232 Communications Interface Technical Manual HA466357U001 Issue 3 Compatible with Version 4.x Software Copyright Eurotherm Drives Limited 2002 All rights strictly reserved. No
More informationCSE 461: Framing, Error Detection and Correction
CSE 461: Framing, Error Detection and Correction Next Topics Framing Focus: How does a receiver know where a message begins/ends Error detection and correction Focus: How do we detect and correct messages
More informationNumber Systems for Computers. Outline of Introduction. Binary, Octal and Hexadecimal numbers. Issues for Binary Representation of Numbers
Outline of Introduction Administrivia What is computer architecture? What do computers do? Representing high level things in binary Data objects: integers, decimals, characters, etc. Memory locations (We
More informationINSTRUCTION MANUAL FOR GCS-300 COMMUNICATION [OPTION CODE: C5] GCSC3E
INSTRUCTION MANUAL FOR COMMUNICATION [OPTION CODE C5] GCSC3E1 2002.04 To prevent the accidents by mishandling of this controller, please arrange to give this manual into the hands of the operator who actually
More informationCHAPTER 6 ARITHMETIC, LOGIC INSTRUCTIONS, AND PROGRAMS
CHAPTER 6 ARITHMETIC, LOGIC INSTRUCTIONS, AND PROGRAMS Addition of Unsigned Numbers The instruction ADD is used to add two operands Destination operand is always in register A Source operand can be a register,
More informationInterconnecting Networks with TCP/IP
Chapter 8 Interconnecting s with TCP/IP 1999, Cisco Systems, Inc. 8-1 Introduction to TCP/IP Internet TCP/IP Early protocol suite Universal 1999, Cisco Systems, Inc. www.cisco.com ICND 8-2 TCP/IP Protocol
More informationCCNA 1 Chapter 7 v5.0 Exam Answers 2013
CCNA 1 Chapter 7 v5.0 Exam Answers 2013 1 A PC is downloading a large file from a server. The TCP window is 1000 bytes. The server is sending the file using 100-byte segments. How many segments will the
More informationChapter 2 Number System
Chapter 2 Number System Embedded Systems with ARM Cortext-M Updated: Tuesday, January 16, 2018 What you should know.. Before coming to this class Decimal Binary Octal Hex 0 0000 00 0x0 1 0001 01 0x1 2
More informationADVANCED VEHICLE TECHNOLOGIES, Inc. AV. AVT-718 KIE Support. Introduction. Hardware. Firmware. Inc.
ADVANCED VEHICLE TECHNOLOGIES, Inc. AV Inc. AVT-718 KIE Support 6 February 2003 This document describes KIE (K-line Inverted Echo) mode of operation for the AVT-718 unit. KIE mode was first released in
More informationComputer Network. Direct Link Networks Reliable Transmission. rev /2/2004 1
Computer Network Direct Link Networks Reliable Transmission rev 1.01 24/2/2004 1 Outline Direct link networks (Ch. 2) Encoding Framing Error detection Reliable delivery Media access control Network Adapter
More informationJCL-33A (C5) Warning. 1. System Configuration COMMUNICATION INSTRUCTION MANUAL
COMMUNICATION INSTRUCTION MANUAL JCL-33A (C5) No.JCL3CE3 2018.11 This manual contains instructions for the communication functions, operations and notes when operating the JCL-33A. To prevent accidents
More informationYour favorite blog :www.vijay-jotani.weebly.com (popularly known as VIJAY JOTANI S BLOG..now in facebook.join ON FB VIJAY
VISIT: Course Code : MCS-042 Course Title : Data Communication and Computer Network Assignment Number : MCA (4)/042/Assign/2014-15 Maximum Marks : 100 Weightage : 25% Last Dates for Submission : 15 th
More informationD0 DCM Module Setup Direct
D0 DCM Module Setup 3 In This Chapter.... Important Module Information Using DirectSOFT5 to Configure s 1 and Port 2 Registers Using Ladder Logic to Configure s (DL05) Using Ladder Logic to Configure s
More informationChapter 10 Error Detection and Correction. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Chapter 10 Error Detection and Correction 0. Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Note The Hamming distance between two words is the number of differences
More informationThe Transport Layer Reliability
The Transport Layer Reliability CS 3, Lecture 7 http://www.cs.rutgers.edu/~sn4/3-s9 Srinivas Narayana (slides heavily adapted from text authors material) Quick recap: Transport Provide logical communication
More information