Data Transfer System for Host Computer and Fpga Communication

Total Page:16

File Type:pdf, Size:1020Kb

Data Transfer System for Host Computer and Fpga Communication DATA TRANSFER SYSTEM FOR HOST COMPUTER AND FPGA COMMUNICATION Thesis Submitted to The School of Engineering of the UNIVERSITY OF DAYTON In Partial Fulfillment of the Requirements for The Degree of Master of Science in Electrical Engineering By Michael T. Barnard UNIVERSITY OF DAYTON Dayton, Ohio December, 2015 DATA TRANSFER SYSTEM FOR HOST COMPUTER AND FPGA COMMUNICATION Name: Barnard, Michael T. APPROVED BY: Eric Balster, Ph.D. John G. Weber, Ph.D. Advisor Committee Chairman Committee Member Associate Professor, Department of Professor, Department of Electrical and Electrical and Computer Engineering Computer Engineering Tarek M. Taha, Ph.D. Committee Member Associate Professor, Department of Electrical and Computer Engineering John G. Weber, Ph.D. Eddy M. Rojas, Ph.D., M.A., P.E. Associate Dean Dean, School of Engineering School of Engineering ii c Copyright by Michael T. Barnard All rights reserved 2015 ABSTRACT DATA TRANSFER SYSTEM FOR HOST COMPUTER AND FPGA COMMUNICATION Name: Barnard, Michael T. University of Dayton Advisor: Dr. Eric Balster This Thesis describes a communication system to allow for the transmission of data between a host computer and a DE2-115 FPGA board over an Ethernet connection. This is achieved by using a socket between the host computer and a NIOS II embedded processor that accepts the data from the host computer and transfers it to the FPGA fabric. The host computer uses a C++ program to open a file and send the data over the socket to the NIOS II processor. The NIOS II acts as memory controller for the Synchronous Dynamic Random Access Memory (SDRAM) on the board with separate input and output data sections for the Hardware Description Language (HDL) processing module. A HDL module then processes the data and sends it back to the NIOS II to be returned to the host computer over the socket. The data transfer system is tested with three basic image processing functions performed on three sample images to verify its functionality. This data transfer system allows for easier testing of digital designs on the DE2-115 board by providing test data to the digital design in an efficient manner. iii To Myself... ...for all of your hard work. iv ACKNOWLEDGMENTS I would like to thank everyone in my life during the completion of both the design and docu- mentation; you all helped in your own way. I would like to especially thank the following people for their contributions. • Dr. Eric Balster, PhD: I would like to thank your for all of your advice and guidance throughout my time at UD both undergrad and graduate. I can confidently say that you are the reason that I both attempted and completed a Masters Degree. • Dr. John Weber, PhD and Dr. Tarek Taha, PhD: Thank you to Dr. Weber and Dr. Taha for your advice and input on the writing of my thesis and for being on my thesis committee. I know you have busy schedules, so thank you for allowing me to take up some of your valuable time. • David and Judy Barnard: I would like to thank you both for allowing me to pursue a Masters degree without balancing a budget on top of course work. Thank you again for all of the love and support you have given me all of my life. v TABLE OF CONTENTS ABSTRACT . iii DEDICATION . iv ACKNOWLEDGMENTS . v LIST OF FIGURES . viii LIST OF TABLES . x I. INTRODUCTION . 1 II. FPGA COST . 3 III. BACKGROUND TECHNOLOGIES . 6 3.1 Sockets and Socket Communication . 6 3.2 NIOS II Embedded Processor . 7 3.2.1 NIOS II/f Features . 8 3.2.2 NIOS II/s Features . 8 3.2.3 NIOS II/e Features . 8 IV. SYSTEM DESIGN AND IMPLEMENTATION . 10 4.1 Socket Client Program . 11 4.2 Communications Management Module . 13 4.3 Hardware Description Language Modules . 15 V. RESULTS . 20 5.1 Image Inverter . 21 5.2 Image Flipper and Inverter . 23 vi 5.3 Moving Average Filter . 24 5.4 Logic Utilization . 26 VI. CONCLUSION AND FUTURE WORK . 34 BIBLIOGRAPHY . 36 vii LIST OF FIGURES 2.1 DE2-115 Board . 4 4.1 Transfer System Data Flow . 11 4.2 Example of Console Output With Multiple Files Processed . 12 4.3 Map of Hardware and Important Connections . 16 4.4 Logic Diagram of Positive Edge Detector . 17 4.5 Positive Edge Detector Signals . 18 4.6 The Processing Module State Machine . 19 5.1 512x512 Grayscale Input Image . 21 5.2 1024x1024 Grayscale Input Image . 22 5.3 560x420 Color Input Image . 23 5.4 Console Output of Image Inverter With All Three Input Files . 24 5.5 512x512 Grayscale Inverted Output Image . 25 5.6 1024x1024 Grayscale Inverted Output Image . 26 5.7 560x420 Color Inverted Output Image . 27 5.8 Console Output of Image Inverter and Flipper With All Three Input Files . 28 5.9 512x512 Grayscale Inverted and Flipped Output Image . 28 viii 5.10 1024x1024 Grayscale Inverted and Flipped Output Image . 29 5.11 560x420 Color Inverted and Flipped Output Image . 29 5.12 Console Output of Moving Average Filter With All Three Input Files . 30 5.13 512x512 Grayscale Moving Average Output Image . 30 5.14 1024x1024 Grayscale Moving Average Output Image . 31 5.15 560x420 Color Moving Average Output Image . 31 5.16 Compilation Report for the Communication System . 32 5.17 Compilation Report for the Image Inverter . 32 5.18 Compilation Report for the Image Inverter and Flipper . 33 5.19 Compilation Report for the Moving Average Filter . 33 ix LIST OF TABLES 2.1 FPGA Boards Owned and Cost . 5 x CHAPTER I INTRODUCTION The flexibility of Field Programmable Gate Arrays (FPGAs) has allowed them to become preva- lent in many fields including digital design and control systems. These devices can be programmed with a wide range of digital logic designs leading to large amounts of possible research topics and design projects utilizing FPGAs [1]. An FPGA is a chip that contains hundreds of thousands of digital logic elements that can be connected in numerous ways to create any digital logic structure. FPGAs can be programmed as many times as needed, so improvements can be made to a design and the design can be updated without replacing any hardware. Designs may be prototyped on one chip and then programmed on to other FPGAs once the design is ready for production; one chip can also be used to prototype many designs one after the other. The main restriction to widespread FPGA prototyping is cost: the cost of the board hosting the FPGA, the cost of the software licenses required to program the board, and the cost of software development kits (SDKs) used for data trans- fer to and from the board. To be able to transfer data to the board most of the more expensive FPGA models have a dedicated SDK that takes care of connecting with the board and transferring the data while the less expensive models do not. These SDKs allow designers to focus on their specific en- gineering problem without having to worry about the complexities of data transfer. Less expensive FPGA models typically lack SDKs making them less capable and flexible in solving engineering 1 problems. This Thesis describes a communication system which allows designers to communicate data to the DE2-115 FPGA development board with ease. Chapter II discusses the impact that this data transfer design will have on the campus research community. Next, Chapter III is a discussion on the backgrounds of a few technologies significant to the design in addition to FPGAs and HDLs. How the design is created and implemented is explained in Chapter IV; covering all three sections of the design: the host PC program, the NIOS II program, and the HDL modules. Chapter V follows with a section on the results of three test functions on three test images and the data transfer system’s overall performance during these tests. Chapter VII concludes by summarizing this paper and discussing future work based on this research. 2 CHAPTER II FPGA COST Widespread FPGA prototyping would be more prevalent if the costs could be reduced: cost of the board hosting the FPGA, cost of software licenses required to program the board, and cost of software development kits (SDKs) for data transfer to and from the board. Most of the more expen- sive FPGA models have a dedicated SDK to transfer data to the FPGA board while less expensive models do not. These SDKs allow designers to focus on their specific engineering problem without having to worry about the complexities of data transfer. The SDKs for data transfer can cost up- wards of $4,000 per year alone, and Altera’s Quartus II software can also cost $2,000 per year [2]. That $6,000 a year allows for the use of the FPGA but does not include the cost of the FPGA itself. The FPGAs with this type of support software can cost up to $50,000 per board. Alternatively, there are inexpensive boards, like the DE2-115 shown in Figure 2.1, that can be programmed with license free software but do not have any SDKs to transfer data [3]. These inexpensive boards are limited to switches and buttons for data input which are not realistic input methods for large scale data transfer. The development of this data transfer system allows for communications between the inexpensive board and a host PC. The development of such a system allows for the possible $56,000 investment to be replaced with a $300 investment for prototyping purposes. 3 Figure 2.1: DE2-115 Board 4 FPGA Board NAME Number Owned Unit Cost Total Cost Gidel Proce V [5] 57 $12,450 $709,650 Gidel PROCStar III 110 [6] 3 $7,500 $22,500 Gidel PROCStar III 150 [6] 32 $14,150 $452,800 Total 92 $1,184,950 Table 2.1: FPGA Boards Owned and Cost This data transfer design will serve as the basis for other research projects.
Recommended publications
  • A Secure Peer-To-Peer Web Framework
    A Secure Peer-to-Peer Web Framework Joakim Koskela Andrei Gurtov Helsinki Institute for Information Technology Helsinki Institute for Information Technology PO Box 19800, 00076 Aalto PO Box 19800, 00076 Aalto Email: joakim.koskela@hiit.fi Email: andrei.gurtov@hiit.fi Abstract—We present the design and evaluation of a se- application, that can be deployed without investing in dedi- cure peer-to-peer HTTP middleware framework that enables cated infrastructure while addressing issues such as middlebox a multitude of web applications without relying on service traversal, mobility, security and identity management. providers. The framework is designed to be deployed in existing network environments, allowing ordinary users to create private II. PEER-TO-PEER HTTP services without investing in network infrastructure. Compared to previous work, scalability, NAT/firewall traversal and peer From its launch in the early 1990s, the HyperText Transfer mobility is achieved without the need for maintaining dedicated Protocol (HTTP) had grown to be one of the most popular servers by utilizing new network protocols and re-using existing protocols on the Internet today. It is used daily for everything network resources. from past-time activities, such as recreational browsing, gam- I. INTRODUCTION ing and media downloads, to business- and security-critical Peer-to-peer (P2P) systems have been popular within net- applications such as payment systems and on-line banking. work research during the past years as they have the potential The success of HTTP has clearly grown beyond its original to offer more reliable, fault-tolerant and cost-efficient network- design as a simple, easy to manage protocol for exchanging ing.
    [Show full text]
  • I.L. 40-614A 1 1. INTRODUCTION the Basic Interface to Remote Terminal, Or BIRT, Is an INCOM Network Master. BIRT Gives Users An
    I.L. 40-614A 1. INTRODUCTION 3. DESCRIPTION The Basic Interface to Remote Terminal, or BIRT, is 3.1. Power Requirements an INCOM Network Master. BIRT gives users an economical way of getting information from their Range: 48 Vdc to 250 Vdc and 120 Vac INCOM-compatible devices since it connects directly between a user’s external MODEM or personal com- Burden: 3.5 W @ 48 Vdc puter and the INCOM network. 9 W @ 250 Vdc 5 W @ 120 Vac BIRT can directly replace Westinghouse MINTs, talk- ing to all INCOM-based communication devices. 3.2. Temperature Range BIRTs also include a special high-speed mode for communicating with SADIs – allowing users to collect For Operation: 0˚ to +55˚ C data from other manufacturer’s relays more rapidly For Storage: -20˚ to +80˚ C than ever before. 3.3. Physical Dimensions BIRTs are built to handle the abuse of substation environment; their “hardened” RS-232 serial port can The BIRT enclosure dimensions are identical to the handle surges and sustained high voltages that ERNI and SADI, as shown in figure 1. would destroy ordinary serial ports, and BIRTs can run on a wide range of voltages, from 48 to 250 Vdc Dimensions and weight of chassis or even 120 Vac, with no jumpers or adjustments needed. Height: 5.26” (133.6) mm) Width: 3.32” (84.3) mm) Depth: 5.92” (150.4) mm) 2. FEATURES Weight: 2.0 lbs (0.9 kg) BIRT is designed to be very flexible in its RS-232 External Wiring: See figures 2 and 3.
    [Show full text]
  • Introduction to Peer-To-Peer Networks
    Introduction to Peer-to-Peer Networks The Story of Peer-to-Peer The Nature of Peer-to-Peer: Generals & Paradigms Unstructured Peer-to-Peer Systems Sample Applications 1 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt A Peer-to-Peer system is a self-organizing system of equal, autonomous entities (peers) which aims for the shared usage of distributed resources in a networked environment avoiding central services. Andy Oram 2 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt The Old Days NetNews (nntp) Usenet since 1979, initially based on UUCP Exchange (replication) of news articles by subscription Group creation/deletion decentralised DNS Distributed delegation of name authorities: file sharing of host tables Name “Servers” act as peers Hierarchical information space permits exponential growth Systems are manually configured distributed peers 3 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt SETI@home: Distributed Computing Search for Extraterrestrial Intelligence (SETI) Analyse radio sig- nals from space Globally shared computing res. Idea 1995 First version 1998 2002 ≈ 4 Mio clnt E.g. Screensaver From Anderson et. al.: SETI@home, Comm. ACM, 45 (11), Nov. 2002 http://setiathome.berkeley.edu/ - ongoing 4 Prof. Dr. Thomas Schmidt http:/www.informatik.haw-hamburg.de/~schmidt SETI@home (2) http-based client-server model No client-client communication Data chunks: load & return N-redundancy for fault detection Attacks: bogus code From Anderson
    [Show full text]
  • Peer-To-Peer Networks
    Peer-to-Peer Networks 14-740: Fundamentals of Computer Networks Credit to Bill Nace, 14-740, Fall 2017 Material from Computer Networking: A Top Down Approach, 6th edition. J.F. Kurose and K.W. Ross traceroute • P2P Overview • Architecture components • Napster (Centralized) • Gnutella (Distributed) • Skype and KaZaA (Hybrid, Hierarchical) • KaZaA Reverse Engineering Study 14-740: Spring 2018 2 What is P2P? • Client / Server interaction • Client: any end-host • Server: specific end-host • P2P: Peer-to-peer • Any end-host • Aim to leverage resources available on “clients” (peers) • Hard drive space • Bandwidth (especially upload) • Computational power • Anonymity (i.e. Zombie botnets) • “Edge-ness” (i.e. being distributed at network edges) • Clients are particularly fickle • Users have not agreed to provide any particular level of service • Users are not altruistic -- algorithm must force participation without allowing cheating • Clients are not trusted • Client code may be modified • And yet, availability of resources must be assured P2P History • Proto-P2P systems exist • DNS, Netnews/Usenet • Xerox Grapevine (~1982): name, mail delivery service • Kicked into high gear in 1999 • Many users had “always-on” broadband net connections • 1st Generation: Napster (music exchange) • 2nd Generation: Freenet, Gnutella, Kazaa, BitTorrent • More scalable, designed for anonymity, fault-tolerant • 3rd Generation: Middleware -- Pastry, Chord • Provide for overlay routing to place/find resources 14-740: Spring 2018 6 P2P Architecture • Content Directory
    [Show full text]
  • Secure Shell- Its Significance in Networking (Ssh)
    International Journal of Application or Innovation in Engineering & Management (IJAIEM) Web Site: www.ijaiem.org Email: [email protected] Volume 4, Issue 3, March 2015 ISSN 2319 - 4847 SECURE SHELL- ITS SIGNIFICANCE IN NETWORKING (SSH) ANOOSHA GARIMELLA , D.RAKESH KUMAR 1. B. TECH, COMPUTER SCIENCE AND ENGINEERING Student, 3rd year-2nd Semester GITAM UNIVERSITY Visakhapatnam, Andhra Pradesh India 2.Assistant Professor Computer Science and Engineering GITAM UNIVERSITY Visakhapatnam, Andhra Pradesh India ABSTRACT This paper is focused on the evolution of SSH, the need for SSH, working of SSH, its major components and features of SSH. As the number of users over the Internet is increasing, there is a greater threat of your data being vulnerable. Secure Shell (SSH) Protocol provides a secure method for remote login and other secure network services over an insecure network. The SSH protocol has been designed to support many features along with proper security. This architecture with the help of its inbuilt layers which are independent of each other provides user authentication, integrity, and confidentiality, connection- oriented end to end delivery, multiplexes encrypted tunnel into several logical channels, provides datagram delivery across multiple networks and may optionally provide compression. Here, we have also described in detail what every layer of the architecture does along with the connection establishment. Some of the threats which Ssh can encounter, applications, advantages and disadvantages have also been mentioned in this document. Keywords: SSH, Cryptography, Port Forwarding, Secure SSH Tunnel, Key Exchange, IP spoofing, Connection- Hijacking. 1. INTRODUCTION SSH Secure Shell was first created in 1995 by Tatu Ylonen with the release of version 1.0 of SSH Secure Shell and the Internet Draft “The SSH Secure Shell Remote Login Protocol”.
    [Show full text]
  • Technical Competencies and Professional Skills
    TECHNICAL COMPETENCIES AND PROFESSIONAL SKILLS Applied Mathematics Technical Skills: data visualization and analysis, SQL, finance and accounting Programming Languages: R, MATLAB, C++, Java, Python Markup Languages: LaTeX, HTML, CSS Software: Microsoft Office (Excel, Office, Word), XCode, Visual Studio Note: Skills, software, and languages are dependent on elective taken, computer selection, and class year. Applied Sciences Instrumentation: UV/Vis spectroscopy, NMR spectroscopy, IR spectroscopy, GC-MS, LC-MS, thermocycler, nucleic acid sequencer, microplate reader, cryocooler Lab Techniques: Gel electrophoresis and SDS-PAGE, Western blotting, primer design and Polymerase Chain Reaction (PCR), QPCR, sterile lab technique, cell culture, nucleic acid isolation and purification, protein isolation and purification (chromatography, centrifugation, dialysis), enzyme thermodynamics and kinetics, transfection and transformation, chemical synthesis and purification (distillation, extraction, chromatography, rotary evaporator, crystallization), inert atmosphere and Schlenk line techniques, titration, dissection of preserved specimens, four-probe electrical measurement, Bragg diffraction Competencies: Application of the scientific method, Scientific writing and oral communication Software and computational skills: Microsoft Office (Word, Excel, Powerpoint), ChemDraw, PyMol, TopSpin, Java, Protein DataBank (PDB), NCBI suite (including BLAST, GenBank), Orca Quantum Chemistry software, LoggerPro, LabView Architecture Design Skills: Multi-scale civic
    [Show full text]
  • Terminal Services Manager Getting Started
    Terminal Services Manager Getting Started LizardSystems Table of Contents Introduction 3 Installing Terminal Services Manager 3 Before starting the application 4 Starting the application 5 Connect to a Remote Desktop Services Servers 6 User Interface 10 Main Window 10 Main menu 11 Administrative tools 16 Network tools 16 Toolbar 17 Computer list 18 Servers tab 19 Users tab 20 Sessions tab 22 Processes tab 23 Dialog boxes 25 Add Computer 25 Create New Group 26 Add Computers Wizard 26 Import computers from network 27 Import computers from Active Directory 28 Import computers from IP Range 28 Import computers from file 30 Search for computers 30 Select grouping type for computers 31 Add computers to list 32 Preferences 33 General 33 Computer list 34 Terminal services 35 2 Terminal Services Manager - Getting Started Introduction Using Terminal Services Manager, you can see the details of users connected to a remote host, their sessions, and their active processes. For several hosts simultaneously, you can monitor each user, session, and process's usage of remote host resources (CPU, memory, etc.) in real-time. Using Terminal Services Manager, you can easily perform various administrative tasks to manage resources and users on a remote host, for example, disconnecting all inactive users, closing inactive users' sessions, or terminating a remote host process. You may use Terminal Services Manager to view information and monitor servers, users, sessions, and processes on servers running Windows Server. You can also perform certain administrative tasks; for example, you can disconnect or log off users from their Remote Desktop Services sessions. Installing Terminal Services Manager • You can install Terminal Services Manager after downloading it from the Download page.
    [Show full text]
  • Security with SSH.Pdf
    Security with SSH Network Startup Resource Center http://www.nsrc.org/ These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/) Topics • What is SSH • Where to get SSH • How to enable and configure SSH • Where to get SSH clients for Windows • Host keys: authentication of server to client • Issues to do with changing of the host key • Password authentication of client to server • Cryptographic authentication client to server • hostkey exchange, scp, and sftp labs What is SSH? From Wikipedia: Secure Shell (SSH) is a cryptographic network protocol for secure data communication, remote command-line login, remote command execution, and other secure network services between two networked computers that connects, via a secure channel over an insecure network, a server and a client (running SSH server and SSH client programs, respectively). i.e., ssh gives you a secure command line interface on remote machines… Topics • Where SSH applies directly to dealing with these two areas of security: - Confidentiality - Keeping our data safe from prying eyes • Authentication and Authorization - Is this person who they claim to be? - With keys alternative method to passwords Where to get SSH • First see if SSH is installed on your system and what version. Easiest way is: $ ssh ±V • Commonly used SSH in Linux and FreeBSD is OpenSSH. You can find the home page here: http://www.openssh.org/ • You can install OpenSSH via packages on Linux and FreeBSD. Ubuntu 12.04.3 LTS currently installs version 5.9p1 of OpenSSH. Obtain SSH Client for Windows There are several free, shareware, and commercial ssh clients for Windows.
    [Show full text]
  • Networking Telnet
    IBM i Version 7.2 Networking Telnet IBM Note Before using this information and the product it supports, read the information in “Notices” on page 99. This edition applies to IBM i 7.2 (product number 5770-SS1) and to all subsequent releases and modifications until otherwise indicated in new editions. This version does not run on all reduced instruction set computer (RISC) models nor does it run on CISC models. This document may contain references to Licensed Internal Code. Licensed Internal Code is Machine Code and is licensed to you under the terms of the IBM License Agreement for Machine Code. © Copyright International Business Machines Corporation 1998, 2013. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Telnet................................................................................................................... 1 What's new for IBM i 7.2..............................................................................................................................1 PDF file for Telnet........................................................................................................................................ 1 Telnet scenarios...........................................................................................................................................2 Telnet scenario: Telnet server configuration.........................................................................................2 Telnet scenario: Cascaded Telnet
    [Show full text]
  • LAB MANUAL for Computer Network
    LAB MANUAL for Computer Network CSE-310 F Computer Network Lab L T P - - 3 Class Work : 25 Marks Exam : 25 MARKS Total : 50 Marks This course provides students with hands on training regarding the design, troubleshooting, modeling and evaluation of computer networks. In this course, students are going to experiment in a real test-bed networking environment, and learn about network design and troubleshooting topics and tools such as: network addressing, Address Resolution Protocol (ARP), basic troubleshooting tools (e.g. ping, ICMP), IP routing (e,g, RIP), route discovery (e.g. traceroute), TCP and UDP, IP fragmentation and many others. Student will also be introduced to the network modeling and simulation, and they will have the opportunity to build some simple networking models using the tool and perform simulations that will help them evaluate their design approaches and expected network performance. S.No Experiment 1 Study of different types of Network cables and Practically implement the cross-wired cable and straight through cable using clamping tool. 2 Study of Network Devices in Detail. 3 Study of network IP. 4 Connect the computers in Local Area Network. 5 Study of basic network command and Network configuration commands. 6 Configure a Network topology using packet tracer software. 7 Configure a Network topology using packet tracer software. 8 Configure a Network using Distance Vector Routing protocol. 9 Configure Network using Link State Vector Routing protocol. Hardware and Software Requirement Hardware Requirement RJ-45 connector, Climping Tool, Twisted pair Cable Software Requirement Command Prompt And Packet Tracer. EXPERIMENT-1 Aim: Study of different types of Network cables and Practically implement the cross-wired cable and straight through cable using clamping tool.
    [Show full text]
  • Chapter 7, “Configuring Telnet”
    Send document comments to [email protected]. CHAPTER 7 Configuring Telnet This chapter describes how to configure Telnet on Nexus 1000V and includes the following topics: • Information About the Telnet Server, page 7-1 • Prerequisites for Telnet, page 7-1 • Guidelines and Limitations, page 7-2 • Configuring Telnet, page 7-2 • Verifying the Telnet Configuration, page 7-5 • Default Setting, page 7-5 • Additional References, page 7-5 • Feature History for Telnet, page 7-6 Information About the Telnet Server The Telnet protocol enables you to set up TCP/IP connections to a host. Telnet allows a person at one site to establish a TCP connection to a login server at another site and then passes the keystrokes from one device to the other. Telnet can accept either an IP address or a domain name as the remote device address. Note On Nexus 1000V, the Telnet server is enabled by default. Prerequisites for Telnet Telnet has the following prerequisites: • You have configured IP on a Layer 3 interface, out-of-band on the mgmt 0 interface, or inband on an Ethernet interface. Cisco Nexus 1000V Security Configuration Guide, Release 4.0(4)SV1(1) OL-19418-01 7-1 Chapter 7 Configuring Telnet Guidelines and Limitations Send document comments to [email protected]. Guidelines and Limitations • By default, the Telnet server is enabled. Note Be aware that the Nexus 1000V commands might differ from the Cisco IOS commands. Configuring Telnet This section includes the following topics: • Enabling the Telnet Server, page 7-2 • Starting an IP Telnet Session to a Remote Device, page 7-3 • Clearing Telnet Sessions, page 7-4 Enabling the Telnet Server Use this procedure to enable the Telnet server.
    [Show full text]
  • NESS Esk a 2005.0034090 a 22005 Sato Et
    US007 185309B1 (12) United States Patent (10) Patent No.: US 7,185,309 B1 Kulkarni et al. (45) Date of Patent: Feb. 27, 2007 (54) METHOD AND APPARATUS FOR 2004/0006584 A1 1/2004 Vandeweerd APPLICATION-SPECIFIC PROGRAMMABLE 2004/O128120 A1 7/2004 Coburn et al. NESS Esk A 2005.00340902005/0114593 A1A 220055/2005 SatoCassell et al.et al. (75) Inventors: Chidamber R. Kulkarni, San Jose, CA 2005/0172085 A1 8/2005 Klingman (US); Gordon J. Brebner, Monte 2005/0172087 A1 8/2005 Klingman Sereno, CA (US); Eric R. Keller, 2005/0172088 A1 8/2005 Klingman Boulder, CO (US); Philip B. 2005/0172089 A1 8/2005 Klingman James-Roxby, Longmont, CO (US) 2005/0172090 A1 8/2005 Klingman O O 2005/0172289 A1 8/2005 Klingman (73) Assignee: Xilinx, Inc., San Jose, CA (US) 2005/0172290 A1 8/2005 Klingman (*) Notice: Subject to any disclaimer, the term of this patent is extended or adjusted under 35 (21) Appl. No.: 10/769,591 OTHER PUBLICATIONS (22) Filed: Jan. 30, 2004 U.S. Appl. No. 10/769,330, filed Jan. 30, 2004, James-Roxby et al. (51) Int. Cl. (Continued) G06F 7/50 (2006.01) Primary Examiner Thuan Do (52) U.S. Cl. ............................................. 716/18: 718/2 Assistant Examiner Binh Tat (58) Field of Classification Search .................. 716/18, (74) Attorney, Agent, or Firm—Robert Brush 716/2, 3: 709/217: 71.9/313 See application file for complete search history. (57) ABSTRACT (56) References Cited U.S. PATENT DOCUMENTS Programmable architecture for implementing a message 5,867,180 A * 2/1999 Katayama et al.
    [Show full text]