Data Link Networks

Total Page:16

File Type:pdf, Size:1020Kb

Data Link Networks Data Link Networks Hardware Building Blocks Nodes & Links CS565 Data Link Networks 1 PROBLEM: Physically connecting Hosts 5 Issues 4 Technologies • Encoding • Point-to-point Links - encoding for physical medium • CSMA (Carrier Sense • Framing Multiple Access) - delineation of bit stream - Ethernet • Error Detection Network Card - IEEE 802.3 - identify frame errors • Token Ring • Reliable Delivery - FDDI - link integrity despite errors - IEEE 802.5 • Media Access Control •Wireless - multiple host access - IEEE 802.11 CS565 Data Link Networks 2 Nodes general-purpose computers; e.g., desktop workstations, special- purpose hardware, CPU PC Network Cache (To network) adaptor I/O bus • Finite memory Memory • Connects to network via a network adaptor • Fast processor, slow memory CS565 Data Link Networks 3 Network Node Memory • Moore’s Law – Doubling processor speeds in 18 months • Memory Latency – Only 7% improvement each year • Network nodes run at memory speeds, not CPU speeds • Memory accesses needed to be considered carefully • Two scarce resources: bandwidth and memory CS565 Data Link Networks 4 Links f (Hz) 100 102 104 106 108 1010 1012 1014 1016 1018 1020 1022 1024 RadioMicrowave Infrared UV X ray Gamma ray 104 105 106 107 108 109 1010 1011 1012 1013 1014 1015 1016 Satellite Fiber optics Coax AMFM Terrestrial microwave TV Electromagnetic Spectrum CS565 Data Link Networks 5 Links Sometimes you install your own Category 5 twisted pair 10-100Mbps, 1 50-ohm coax (ThinNet) 10-100Mbps, 2 75-ohm coax (ThickNet) 10-100Mbps, 5 Multimode fiber 100Mbps, 2km Single-mode fiber 100-2400Mbps Sometimes leased from the phone company Service to ask for Bandwidth you get ISDN 64 Kbps T1 1.544 Mbps T3 44.736 Mbps STS-1 51.840 Mbps STS-3 155.250 Mbps STS-12 622.080 Mbps STS-24 1.244160 Gbps STS-48 2.488320 Gbps (Note: T1 also called DS1, STS-1 also called OC-1) CS565 Data Link Networks 6 Last-Mile Links • From home to the network service provider. Service Bandwidth POTS 28.8-56 Kbps (Plain Old Telephone Service) ISDN 64-128 Kbps (Integrated Services Digital Network) xDSL 16 Kbps-55.2Mbps (Digital Subscriber Line) CATV 20-40 Mbps (CAble TV) CS565 Data Link Networks 7 Point-to-Point Links • Encoding • Framing • Error Detection • Reliable Transmission CS565 Data Link Networks 8 Encoding • Signals propagate over a physical medium – modulate electromagnetic waves by varying the voltage • Network adaptor handles encoding – Encoded bits to signals (sending) – Decodes signals to bits (receiving) CS565 Data Link Networks 9 Adaptors Signalling component Signal NodeAdaptor Adaptor Node Bits Signal travel between signalling components; Bits flow between adaptors CS565 Data Link Networks 10 Modem and Codec Modem = Modulator + Demodulator Codec = Encoder + Decoder Encoder Modulator Demodulator Decoder Media CS565 Data Link Networks 11 NRZ Encoding • Encode binary data onto signals – e.g., 0 as low signal and 1 as high signal – known as Non-Return to zero (NRZ) Bits 0010111101000010 NRZ Problem: Consecutive 1s or 0s – Low signal (0) may be interpreted as no signal – High signal (1) leads to baseline wander – Unable to recover clock CS565 Data Link Networks 12 Alternative Encodings • Non-return to Zero Inverted (NRZI) – make a transition from current signal to encode a one; stay at current signal to encode a zero – solves the problem of consecutive ones • Manchester – transmit XOR of the NRZ encoded data and the clock – only 50% efficient. CS565 Data Link Networks 13 4-Bit 5-bit Symbol Code Encodings (cont) 0000 11110 0001 01001 •4B/5B 0010 10100 0011 10101 – every 4 bits of data encoded in 0100 01010 a 5-bit code 0101 01011 0110 01110 – 5-bit codes selected to have no 0111 01111 1000 10010 more than one leading 0 and 1001 10011 no more than two trailing 0s 1010 10110 1011 10111 – thus, never get more than 1100 11010 three consecutive 0s 1101 11011 1110 11100 – resulting 5-bit codes are 1111 11101 transmitted using NRZI Others: 11111 – idle – achieves 80% efficiency 00000 – dead … CS565 Data Link Networks 14 Encodings (cont) Bits 0010111101000010 NRZ Clock Manchester NRZI CS565 Data Link Networks 15 Framing Bits Node A Adaptor Adaptor Node B Frames • Packet-switched networks – Break sequence of bits into frames (blocks of data) • What set of bits constitute a frame? – Where the frame begins? Central challenge – Where the frame ends? - Use different protocols • Typically implemented by network adaptor • Adaptor fetches (deposits) frames out of (into) host memory CS565 Data Link Networks 16 Framing Protocol • Byte-oriented – View each frame as a collection of bytes (characters) – Sentinel approach • BISYNC (Binary Synchronous Communication) protocol - IBM – Byte counting • DDCMP ( Digital Data Communication Message Protocol) protocol - DEC • Bit-oriented – HDLC (High-Level Data Link Control) Protocol – IBM and then ISO • Clock-based – SONET (Synchronous Optical Network) – Bellcore and then ANSI CS565 Data Link Networks 17 Byte-Oriented - Sentinel Approach – Frame begins at SYN (Synchronization) – Sentinel values between body • STX = Start of text • ETX = End of text – CRC (Cycle Redundancy Check) – checks for errors 888 8 816 Header Body CRC ETX STX SYN SYN SOH BISYNC frame format (Binary Synchronous Communication) – IBM – problem: ETX character might appear in the data portion of the frame • solution: Character stuffing – Escape the ETX character with a DLE (data line escape) character in BISYNC CS565 Data Link Networks 18 Byte-Oriented – Byte-Counting Approach – COUNT field specifies how many bytes contained in a frame 888 14 42 16 Count Header Body CRC SYN SYN Class DDCMP frame format ( Digital Data Communication Message Protocol) - DEC CS565 Data Link Networks 19 Bit-Oriented – Denote the beginning/end of a frame with the distinguished bit sequence 0111110 816 16 8 Beginning Ending Header Body CRC sequence sequence HDLC frame format (High-level Data Link Control) – IBM and then ISO – problem: the pattern 01111110 could appear anywhere in the body of the frame • solution: Bit Stuffing - When it is located in the body, it is preceded with an escape sequence of bits (like an escape character in C) CS565 Data Link Networks 20 Clock-Based – each frame is 125s long At STS-1 (= 51.84 Mbps) rate, 810B long – e.g., SONET: Synchronous Optical Network – ITU standard for transmission over fiber –STS-n (STS-1 = 51.84 Mbps) Overhead Payload STS-1 STS-1 STS-1 Hdr Hdr Hdr 9 rows Hdr STS-3c 90 columns c - concatenated – Each frame is 810 bytes long Data Link Networks 21 CS565 Error • Long history of dealing with bit errors – Hamming – Reed/Solomon • Detecting Error is only one part of the problem, the other part is correcting errors • Two methods of error correction – Have the message retransmitted – Error-correcting codes (algorithms that all the recipient to reconstruct the correct message) CS565 Data Link Networks 22 Error Detection • Basic idea – add extra (redundant) bits to a frame that can be used to determine if errors have been introduced. • Ethernet: 1500B data requires only 32-bits (CRC-32) • Sender applies algorithm to the message to come up with the extra bits • Receiver uses the same algorithm to check if the calculation comes up with the same result • Common error-detecting codes – Two-dimensional parity (ASCII) (link-level) – Checksum (internet) (not link-level) – CRC, Cyclic Redundancy Check, (link-level) CS565 Data Link Networks 23 Two-Dimensional Parity 0101001 1 • Catch all 1,2,3-bit 1101001 0 and most 4-bit errors 1011110 1 Used by BISYNC • In this example, use Data protocol (IBM) to 14 redundant bits for 0001110 1 transmitting ASCII characters a 42-bit message, 0110100 1 which is much better than the obvious way 1011111 0 of sending two Parity copies of the same 1111011 0 data byte Parity bits CS565 Data Link Networks 24 Internet Checksum Algorithm • Not used in link-level (unlike parity and CRC) • Sender adds up all the word and then transmit the result of that sum (Checksum) • Received adds up all the words and compares its checksum to the sender’s checksum • Algorithm for the Internet 1. Treat the data as a sequence of 16-bit integers. Add the 16-bit integers using 16-bit ones complement arithmetic 2. take the ones complement of the result. That 16-bit number is the checksum. CS565 Data Link Networks 25 CRC - Cyclic Redundancy Check • Add k bits of redundant data to an n-bit message –want k << n – e.g., Ethernet: k = 32 and n = 12,000 (1500 bytes) •Represent n-bit message as n-1 degree polynomial – e.g., MSG=10011010 as M(x) = x7 + x4 + x3 + x1 • Let k be the degree of some divisor polynomial – e.g., C(x) = x3 + x2 + 1 when k = 3 CS565 Data Link Networks 26 CRC - Cyclic Redundancy Check • Transmit polynomial P(x) that is evenly divisible by C(x) – shift left k bits, i.e., M(x)xk – subtract remainder of M(x)xk / C(x) from M(x)xk • Receiver polynomial P(x) + E(x) (E(x) – error in the transmission) – E(x) = 0 implies no errors • Divide (P(x) + E(x)) by C(x); remainder zero if: – E(x) was zero (no error), or – E(x) is exactly divisible by C(x) CS565 Data Link Networks 27 CRC Example: k=3 Original Message M(x) 11111001 Generator 1101 10011010000 Message & k bits of 0 C(x) 1101 M(x)xk 1001 • Perform logical XOR 1101 • Once the reminder is obtained, 1000 subtract it from M(x)xk, this can 1101 be accomplished with the XOR 1011 10011010000 – 101 1101 = 10011010101 1100 • Send this message 1101 • Recipient divides received 1000 message by C(x), if the reminder 1101 is 0 no error (most likely) 101 Remainder M(x)xk / C(x) CS565 Data Link Networks 28 Selecting C(x) • All single-bit errors, as long as the xk and x0 terms have non-zero coefficients.
Recommended publications
  • 16-Channel DAS with 16-Bit, Bipolar Input, Dual Simultaneous Sampling
    16-Channel DAS with 16-Bit, Bipolar Input, Dual Simultaneous Sampling ADC Data Sheet AD7616 FEATURES APPLICATIONS 16-channel, dual, simultaneously sampled inputs Power line monitoring Independently selectable channel input ranges Protective relays True bipolar: ±10 V, ±5 V, ±2.5 V Multiphase motor control Single 5 V analog supply and 2.3 V to 3.6 V VDRIVE supply Instrumentation and control systems Fully integrated data acquisition solution Data acquisition systems (DASs) Analog input clamp protection GENERAL DESCRIPTION Input buffer with 1 MΩ analog input impedance First-order antialiasing analog filter The AD7616 is a 16-bit, DAS that supports dual simultaneous On-chip accurate reference and reference buffer sampling of 16 channels. The AD7616 operates from a single 5 V Dual 16-bit successive approximation register (SAR) ADC supply and can accommodate ±10 V, ±5 V, and ±2.5 V true bipolar Throughput rate: 2 × 1 MSPS input signals while sampling at throughput rates up to 1 MSPS Oversampling capability with digital filter per channel pair with 90.5 dB SNR. Higher SNR performance can Flexible sequencer with burst mode be achieved with the on-chip oversampling mode (92 dB for an Flexible parallel/serial interface oversampling ratio (OSR) of 2). SPI/QSPI/MICROWIRE/DSP compatible The input clamp protection circuitry can tolerate voltages up to Optional cyclic redundancy check (CRC) error checking ±21 V. T h e AD7616 has 1 MΩ analog input impedance, regardless Hardware/software configuration of sampling frequency. The single-supply operation, on-chip Performance filtering, and high input impedance eliminate the need for 92 dB SNR at 500 kSPS (2× oversampling) driver op amps and external bipolar supplies.
    [Show full text]
  • Communications
    The Essentials of Datalink Communications The origins and course of Air-to-Ground Messaging The Essentials of Datalink Communications Contents international Trip Support | international Trip The Technology that HR Created 02 Inmarsat Satellite 06 Growing into an Operational Necessity 03 Iridium Satellite 07 UAS Communications Mechanisms 04 Upcoming Regulations 10 VHF Radio 05 The Future of ACARS 11 © Copyright 2016 Page 1/12 The Technology that HR Created t one time in the not-so-distant past, pilots and other ARINC’s solution was an automated system, called the A flight crew members were paid different rates for the ARINC Communications Addressing and Reporting System, time they were airborne versus the time they were performing or ACARS for short, which sent short text data from the ground operations. Events like aircraft pushback, taxi, takeoff, avionics of the aircraft directly to the ground-based entities landing, and gate arrival were transmitted via voice over radio through Very High Frequency (VHF) radio frequencies frequencies to operators who would relay this information back without any crewmember involvement. The aircraft was to the airlines. The pilots were responsible for self-reporting programmed to take advantage of switches and automation their own times and movements. Understanding that people points on the aircraft, resulting in the creation of a set of can sometimes be forgetful, or worse, willfully manipulative, messages referred to as the OOOI report. An OOOI report is the major airlines began searching for a solution that tracked any of four messages: Out, Off, On and In. Still in wide-scale crewmember pay in a more structured and accurate way.
    [Show full text]
  • Data Networks
    Second Ed ition Data Networks DIMITRI BERTSEKAS Massachusetts Institute of Technology ROBERT GALLAGER Massachusetts Institute ofTechnology PRENTICE HALL, Englewood Cliffs, New Jersey 07632 2 Node A Node B Time at B --------- Packet 0 Point-to-Point Protocols and Links 2.1 INTRODUCTION This chapter first provides an introduction to the physical communication links that constitute the building blocks of data networks. The major focus of the chapter is then data link control (i.e., the point-to-point protocols needed to control the passage of data over a communication link). Finally, a number of point-to-point protocols at the network, transport, and physical layers are discussed. There are many similarities between the point-to-point protocols at these different layers, and it is desirable to discuss them together before addressing the more complex network-wide protocols for routing, flow control, and multiaccess control. The treatment of physical links in Section 2.2 is a brief introduction to a very large topic. The reason for the brevity is not that the subject lacks importance or inherent interest, but rather, that a thorough understanding requires a background in linear system theory, random processes, and modem communication theory. In this section we pro­ vide a sufficient overview for those lacking this background and provide a review and perspective for those with more background. 37 38 Point-to-Point Protocols and Links Chap. 2 In dealing with the physical layer in Section 2.2, we discuss both the actual com­ munication channels used by the network and whatever interface modules are required at the ends of the channels to transmit and receive digital data (see Fig 2.1).
    [Show full text]
  • Radio Communications in the Digital Age
    Radio Communications In the Digital Age Volume 1 HF TECHNOLOGY Edition 2 First Edition: September 1996 Second Edition: October 2005 © Harris Corporation 2005 All rights reserved Library of Congress Catalog Card Number: 96-94476 Harris Corporation, RF Communications Division Radio Communications in the Digital Age Volume One: HF Technology, Edition 2 Printed in USA © 10/05 R.O. 10K B1006A All Harris RF Communications products and systems included herein are registered trademarks of the Harris Corporation. TABLE OF CONTENTS INTRODUCTION...............................................................................1 CHAPTER 1 PRINCIPLES OF RADIO COMMUNICATIONS .....................................6 CHAPTER 2 THE IONOSPHERE AND HF RADIO PROPAGATION..........................16 CHAPTER 3 ELEMENTS IN AN HF RADIO ..........................................................24 CHAPTER 4 NOISE AND INTERFERENCE............................................................36 CHAPTER 5 HF MODEMS .................................................................................40 CHAPTER 6 AUTOMATIC LINK ESTABLISHMENT (ALE) TECHNOLOGY...............48 CHAPTER 7 DIGITAL VOICE ..............................................................................55 CHAPTER 8 DATA SYSTEMS .............................................................................59 CHAPTER 9 SECURING COMMUNICATIONS.....................................................71 CHAPTER 10 FUTURE DIRECTIONS .....................................................................77 APPENDIX A STANDARDS
    [Show full text]
  • Global Operational Data Link Document (GOLD)
    Global Operational Data Link Document (GOLD) This edition has been issued by the GOLD ad hoc Working Group for the Asia/Pacific Air Navigation Planning and Implementation Regional Group (APANPIRG), the North Atlantic Systems Planning Group (NAT SPG), the European Air Navigation Planning Group (EANPG), the South American Region Implementation Group (SAM/IG) and the African-Indian Ocean Planning and Implementation Regional Group (APIRG). Second Edition — 26 April 2013 International Civil Aviation Organization GOLD (1) Second Edition — 26 April 2013 This document is available by accessing any of the following ICAO regional websites. Asia and Pacific (APAC) Office http://www.icao.int/apac Eastern and Southern African (ESAF) Office www.icao.int/esaf European and North Atlantic (EUR/NAT) Office http://www.paris.icao.int Middle East (MID) Office www.icao.int/mid North American, Central American and Caribbean (NACC) Office http://www.mexico.icao.int South American (SAM) Office http://www.lima.icao.int Western and Central African (WACAF) Office http://www.icao.int/wacaf For more information, contact the ICAO regional office. Global Operational Data Link Document (GOLD) This edition has been issued by the GOLD ad hoc Working Group for the Asia/Pacific Air Navigation Planning and Implementation Regional Group (APANPIRG), the North Atlantic Systems Planning Group (NAT SPG), the European Air Navigation Planning Group (EANPG), the South American Region Implementation Group (SAM/IG) and the African-Indian Ocean Planning and Implementation Regional Group (APIRG). Second Edition — 26 April 2013 International Civil Aviation Organization GOLD (i) Second Edition — 26 April 2013 (ii) Global Operational Data Link Document (GOLD) AMENDMENTS The issue of amendments is announced by the ICAO Regional Offices concerned, which holders of this publication should consult.
    [Show full text]
  • The CLASP Application Security Process
    The CLASP Application Security Process Secure Software, Inc. Copyright (c) 2005, Secure Software, Inc. The CLASP Application Security Process The CLASP Application Security Process TABLE OF CONTENTS CHAPTER 1 Introduction 1 CLASP Status 4 An Activity-Centric Approach 4 The CLASP Implementation Guide 5 The Root-Cause Database 6 Supporting Material 7 CHAPTER 2 Implementation Guide 9 The CLASP Activities 11 Institute security awareness program 11 Monitor security metrics 12 Specify operational environment 13 Identify global security policy 14 Identify resources and trust boundaries 15 Identify user roles and resource capabilities 16 Document security-relevant requirements 17 Detail misuse cases 18 Identify attack surface 19 Apply security principles to design 20 Research and assess security posture of technology solutions 21 Annotate class designs with security properties 22 Specify database security configuration 23 Perform security analysis of system requirements and design (threat modeling) 24 Integrate security analysis into source management process 25 Implement interface contracts 26 Implement and elaborate resource policies and security technologies 27 Address reported security issues 28 Perform source-level security review 29 Identify, implement and perform security tests 30 The CLASP Application Security Process i Verify security attributes of resources 31 Perform code signing 32 Build operational security guide 33 Manage security issue disclosure process 34 Developing a Process Engineering Plan 35 Business objectives 35 Process
    [Show full text]
  • IS 13737 (1993): Isoinformation Technology
    इंटरनेट मानक Disclosure to Promote the Right To Information Whereas the Parliament of India has set out to provide a practical regime of right to information for citizens to secure access to information under the control of public authorities, in order to promote transparency and accountability in the working of every public authority, and whereas the attached publication of the Bureau of Indian Standards is of particular interest to the public, particularly disadvantaged communities and those engaged in the pursuit of education and knowledge, the attached public safety standard is made available to promote the timely dissemination of this information in an accurate manner to the public. “जान का अधकार, जी का अधकार” “परा को छोड न 5 तरफ” Mazdoor Kisan Shakti Sangathan Jawaharlal Nehru “The Right to Information, The Right to Live” “Step Out From the Old to the New” IS 13737 (1993): ISOInformation Technology - 130 mm Rewritable optical disk cartridges for information interchange [LITD 16: Computer Hardware, Peripherals and Identification Cards] “ान $ एक न भारत का नमण” Satyanarayan Gangaram Pitroda “Invent a New India Using Knowledge” “ान एक ऐसा खजाना > जो कभी चराया नह जा सकताह ै”ै Bhartṛhari—Nītiśatakam “Knowledge is such a treasure which cannot be stolen” IS 13737 : 1993 ISO/IEC 10089 : 1991 CONTENTS Page NationalForeword..........,..........................................‘.““““’ . (vii) 1 Scope 1 2 Conformance 1 3 Normative references 1 4 Conventions and notations 1 5 List of acronyms 2 6 Definitions 2 2 6. I case 2 6.2 Clamping Zone 6.3
    [Show full text]
  • 1. Background This Paper Is About a Method for Recovering Data from Floppy Disks That Are Failing Due to “Weak Bits”
    A Method for Recovering Data From Failing Floppy Disks with a Practical Example Dr. Frederick B. Cohen, Ph.D. and Charles M. Preston Fred Cohen & Associates and California Sciences Institute Abstract: As floppy disks and other similar media age, they have a tendency to lose data because of the reduction in retention of electromagnetic fields over time associated with various environmental degradation factors. In attempting to read these disks, the coding techniques used to write them can be exploited along with the proposed fault mechanisms to demonstrate that repetitions of read attempts under proper conditions yield valid data subject to specific error modes. In many cases those errors can be partially or completely reversed by analysis of read results. A practical example involving a case of substantial legal value is used as an example of the application of these methods. Keywords: weak bits, floppy disks, digital forensics, coding, field density loss, the birthday problem, error inversion 1. Background This paper is about a method for recovering data from floppy disks that are failing due to “weak bits”. It describes a repetitive read technique that has successfully recovered data from failing floppy disks in forensic cases and describes analysis of the results of such repetitive reads in terms of yielding forensically sound data values. These techniques are not new or particularly unique; however, they are not widely published and analysis necessary to support their use in legal matters has not been found elsewhere. The particular matter used as an example in this analysis involved a floppy disk that was more than 15 years old and that contained the only copy of a binary assembled version of a software program that was subject to intellectual property claims of sufficient value to warrant recovery beyond the means normally used by commercial recovery firms.
    [Show full text]
  • Data Links Functions, Attributes and Latency
    Nichols, Ryan, Mumm, Lonstein, & Carter Chapter 13: Data Links Functions, Attributes and Latency Student Learning Objectives The student will learn about the data-link function of the UAS which allows for bi-directional communication and data transmissions between UAV and its ground station. The Data Link is a vital component of an UAS. The student will learn the respective functions of each component part and considerations are necessary and how to evaluate their importance when developing a UAS. While the focus of the lesson will be on military applications, the considerations will be equally important for those designing and deploying UAS for civilian purposes. While the design of the Datalink must have requisite attributes that allow the system to function as intended in various environments globally, it must be able to do so securely and effectively. Issues such as Data Link security, interception, deception and signal latency are all attributes that must be balanced to achieve fast and secure data communications between the components of the UAS. What are the Types of UAV’s and how are they Categorized? UAV’s are most often divided into four categories based upon their mission duration and operational radius. High Altitude, Long Endurance (“HALE”) most often deployed for reconnaissance, interception or attack; Medium altitude, moderate range most often used for reconnaissance and combat effect assessment; Low cost, short range small UAV’s. (See Figure 13-1.) Components of the UAS Data-Link and their functions The UAV and Ground Control Station There are four essential communication and data processing operations the UAS must be able to efficiently and effectively carry out.
    [Show full text]
  • Floppy Disc Controller Instruction Manual
    Part Number 2120-0067 OQ419 FLOPPY DISC CONTROLLER INSTRUCTION MANUAL March 1985 DISTRIBUTED LOGIC CORPORATION 1555 S. Sinclair Street P.O. Box 6270 ~R Anaheim, California 92806 I nmmI Telephone: (714) 937·5700 Telex: 6836051 Contents SECTION 1 - GENERAL INFORMATION 1.1 INTRODUCTION 1 1.2 GENERAL DESCRIPTION 2 1.3 COMPATIBILITY 2 1.4 LOGICAL TRACK FORMAT 3 1.4.1 Sector Header Field 3 1.4.2 Data Field 5 1.4.3 CRC - Cyclic Redundancy Check 5 1.5 RECORDING SCHEME 6 1.6 SPECIFICATIONS 6 SECTION 2 - INSTALLATION 2.1 CONTROLLER JUMPER CONFIGURATIONS 7 2.1.1 Device and Vector Address Selection 8 2.1.2 Device Interrupt Priority 9 2.1.3 Bootstrap 10 2.1.4 Wri te Precompensati on 10 2.1.5 Write Current Control 11 2.1.6 Drive Step Rate 11 2.2 DRIVE CONFIGURATIONS 11 2.3 CABLING 19 2.4 CONTROLLER INSTALLATION 21 2.5 INITIAL CHECKOUT 21 SECTION 3 - OPERATION 3.1 GENERAL INFORHATION 23 3.2 BOOTSTRAPPING 23 3.3 FORMATTING 24 3.4 FILL/WRITE OPERATION 25 3.5 READ/EMPTY OPERATION 27 3.6 OPERATION USING RT-ll 27 SECTION 4 - PROGRAMMING 4.1 GENERAL INFORMATION 29 4.2 COMMAND AND STATUS REGISTER - RXVCS (177170) 30 4.3 DATA BUFFER (177172) 31 4.3.1 Data Buffer Register (RXVDB) 32 4.3.2 Trace Address Register (RXVTA) 32 4.3.3 Sector Address Register (RXVSA) 32 4.3.4 Word Count Register (RXVWC) 32 4.3.5 Bus Address Register (RXVBA) 33 4.3.6 Error and Status Register (RXVES) 33 4.3.7 Bus Address Extension Register (RXVBAE) 35 i i ; 4.4 EXTENDED STATUS REGISTERS 35 4.5 COMMAND PROTOCOL 36 4.5.1 Fill Buffer (000) 36 4.5.2 Empty Buffer (001) 37 4.5.3 Write Buffer
    [Show full text]
  • High Performance Table-Based Algorithm for Pipelined CRC Calculation
    High Performance Table-Based Algorithm for Pipelined CRC Calculation Yan Sun and Min Sik Kim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A. Email: fysun,[email protected] Abstract—In this paper, we present a fast cyclic redun- for message length detection of variable-length message dancy check (CRC) algorithm that performs CRC compu- communications [4], [5]. tation for an arbitrary length of message in parallel. For a Communication networks use protocols with ever in- given message with any length, the algorithm first chunks the message into blocks, each of which has a fixed size equal creasing demands on speed. The increasing performance to the degree of the generator polynomial. Then it computes needs can be fulfilled by using ASICs (Application Spe- CRC for the chunked blocks in parallel using lookup tables, cific Integrated Circuits) and this will probably also be and the results are combined together with XOR operations. the case in the future. Meeting the speed requirement In the traditional implementation, it is the feedback that is crucial because packets will be dropped if processing makes pipelining problematic. In the proposed algorithm, we solve this problem by taking advantage of CRC’s properties is not completed at wire speed. Recently, protocols for and pipelining the feedback loop. The short pipeline latency high throughput have emerged, such as IEEE 802.11n of our algorithm enables a faster clock frequency than WLAN and UWB (Ultra Wide Band), and new protocols previous approaches, and it also allows easy scaling of the with even higher throughput requirement are on the way.
    [Show full text]
  • A Method for Recovering Data from Failing Floppy Disk Drives
    A Method for Recovering Data From Failing Floppy Disk Drives Dr. Frederick B. Cohen, Ph.D. and Charles Preston Background: This paper is about a method for recovering data from floppy disks that are failing due to weak bits. It describes a repetitive read technique that has successfully recovered data from failing floppies in forensic cases and describes other related techniques. None of these techniques are new or particularly unique, however, they are not widely published to the best of the authors knowledge and some of the related analysis may be helpful in making more definitive determinations in some cases. The nature of 'weak' bits and failure modes: Floppy disks tend to degrade in various ways over time and under various environmental conditions such as temperature, humidity, and so forth. In some cases this results in the presence of so-called “weak” bits on the media. Weak bits are bits that are sufficiently degraded in their electromagnetic field so as to yield voltages between the values for a '1' and a '0' when read by the read heads on most floppy disks. This is a result of reduced flux density in the electromagnetic media. In particular, the floppy disk coding used in most current disks is identified in: http://cma.zdnet.com/book/upgraderepair/ch14/ch14.htm as Modified Frequency Modulation (MFM) which uses timed flux density transitions to indicate bits. In particular, it uses a “No transition, Transition” (NT) sequence to indicate a “1”, a TN to indicate a '0' preceded by a '0', and an NN to indicate a '0' preceded by a '1'.
    [Show full text]