Registers are always 32 bit / 4 byte memory is accessed directly when memory cannot be accessed kind of flag is on.

Slides:



Advertisements
Similar presentations
Categories of I/O Devices
Advertisements

Cache Memory Exercises. Questions I Given: –memory is little-endian and byte addressable; memory size; –number of cache blocks, size of cache block –An.
Network and Application Attacks Contributed by- Chandra Prakash Suryawanshi CISSP, CEH, SANS-GSEC, CISA, ISO 27001LI, BS 25999LA, ERM (ISB) June 2006.
系 統 程 式 System Programming
Bit Field.
Lecture 12 Layer 2 – Data Link Layer Protocols
Framing and Stuffing Advanced Computer Networks. Framing & Stuffing Outline  Synchronous vs Asynchronous Transmissions  Asynchronous Character Transmissions.
Internet Control Message Protocol (ICMP)
Tutorials 2 A programmer can use two approaches when designing a distributed application. Describe what are they? Communication-Oriented Design Begin with.
The Structure of the CPU
VLAN Trunking protocol- Chapter 4
Firmware implementation of Integer Array Sorter Characterization presentation Dec, 2010 Elad Barzilay Uri Natanzon Supervisor: Moshe Porian.
Circuit Switching (a) Circuit switching. (b) Packet switching.
The Basics of communication LectureII. Processing Techniques.
1 27-Jun-15 S Ward Abingdon and Witney College VLAN Trunking protocol CCNA Exploration Semester 3 Chapter 4.
TRD dcs workshop, Heidelberg, Jan 22, TRD Feeserver/controlEngine Kai Schweda, University of Heidelberg R. Bramm, B. Doenigus, T. Dietel, D. Emschermann,
What Is TCP/IP? The large collection of networking protocols and services called TCP/IP denotes far more than the combination of the two key protocols.
Network Management: SNMP
Sasken Confidential © 2007 Sasken Communication Technologies Host Configuration Protocol By Manikanta Velaga.
UNIVERSITY OF BERGEN DEPARTMENT OF PHYSICS 1 UiB DR 2003 High Level API for the TPC-FEE control and configuration.
21.1 Chapter 21 Network Layer: Address Mapping, Error Reporting, and Multicasting Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction.
Bootstrap and Autoconfiguration (DHCP)
1 Transport Layer Computer Networks. 2 Where are we?
Multicasting  A message can be unicast, multicast, or broadcast.
Computer Networks.  The OSI model is a framework containing seven layers that defines the protocols and devices used at each stage of the process when.
RFid Technology TELE 480 Presentation. What is RFid? RFid is an ADC technology that uses radio- frequency waves to transfer data between a reader and.
Internet Concept and Terminology. The Internet The Internet is the largest computer system in the world. The Internet is often called the Net, the Information.
Chapter 7 Low-Level Protocols
ITIS 1210 Introduction to Web-Based Information Systems Chapter 23 How Web Host Servers Work.
Point-to-Point Access: PPP PPP Between Routers  Used for Point-to-Point Connections only  Used as data link control (encapsulates network layer.
FALL 2005CSI 4118 – UNIVERSITY OF OTTAWA1 Part 2.6 UDP Principles (Chapter 24) (User Datagram Protocol)
Bootstrap and Autoconfiguration Chapter 23. Introduction Each computer attached to a TCP/IP internet needs to know: –its IP address –the address of a.
Internet Protocol Internetworking Lab 1. Why Internet?
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Network Protocols A network protocol defines the structure of messages sent over the network We will only talk about the Internet Network protocols need.
The Socket Interface Chapter 21. Application Program Interface (API) Interface used between application programs and TCP/IP protocols Interface used between.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved RPC Tanenbaum.
AS Computing Data Transmission and Networks. Transmission error Detecting errors in data transmission is very important for data integrity. There are.
Computer Science 101 Computer Systems Organization.
Communication Layers Protocol Commands Results Command Specs Command Framework Database Access PVSS Server TOC ,
1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Dynamic Host Configuration Protocol (DHCP)
Chapter 18 Host Configuration : DHCP
Chapter 22 Bootstrap and Auto configuration (DHCP) History of Bootstrap -Bootstrap is used to assign IP address to the computer. -Constant changes in the.
1 Client-Server Interaction. 2 Functionality Transport layer and layers below –Basic communication –Reliability Application layer –Abstractions Files.
HOW a Computer Works ? Anatomy of Microprocessor.
1 Conventional Procedure Call read(fd,buf,nbytes) a)Parameter passing in a local procedure call: the stack before the call to read b)The stack while the.
PHOS APD Bias Control Goal: To develop software for the PHOS APD bias control that uses the agreed ALICE standards for detctor control and coniguration.
Status of InterCommunication on FeeControl Meeting Report Communication between DCS-Layers State of Sebastian Bablok Christian Kofler Ralf Keidel.
1 Chapter 7 Switching, Packets, Frames, Parity, Checksums, and CRCs.
Multicasting  A message can be unicast, multicast, or broadcast. Let us clarify these terms as they relate to the Internet.
Dcs meeting, CERN, Mar 13  14, HV Control box HV Box from Athens Kai Schweda, University of Heidelberg P. Mantzaridis, A. Markouizos, P. Mitseas,
Microsoft Windows Server 2003 TCP/IP Protocols and Services Technical Reference Slide: 1 Lesson 18 Windows Internet Name Service (WINS)
Framing and Stuffing Advanced Computer Networks. Framing & Stuffing Outline  Synchronous vs Asynchronous Transmissions  Asynchronous Character Transmissions.
NETWORKING (2) Dr. Andy Wu BCIS 4630 Fundamentals of IT Security.
Direct Memory Access (DMA) Department of Computer Engineering, M.S.P.V.L. Polytechnic College, Pavoorchatram. A Presentation On.
1 Kyung Hee University Chapter 11 User Datagram Protocol.
FEE Control DIM (Distributed Information Management ) as communication layer between TPC/TRD and FEE control/monitoring application at ALICE.
Introduction to Number Representation A451 GCSE Computing.
1 15-Mar-16 VLAN Trunking protocol CCNA Exploration Semester 3 Chapter 4.
Image Builder/Data Handling System Design Tao Qian UIUC April 10, 2007.
CS2100 Computer Organization
BOOTP and DHCP Objectives
CS703 - Advanced Operating Systems
Chapter 18 Host Configuration : DHCP
Help! How does cache work?
The University of Adelaide, School of Computer Science
46 to 1500 bytes TYPE CODE CHECKSUM IDENTIFIER SEQUENCE NUMBER OPTIONAL DATA ICMP Echo message.
Chapter 18 Host Configuration : DHCP
Network Addressing.
MIPS Assembly.
Presentation transcript:

Registers are always 32 bit / 4 byte memory is accessed directly when memory cannot be accessed kind of flag is on

Command IDBlock Nr.Nr. of Words Command Word 1 Command Word 2 … MarkerChecksum Command IDBlock Nr.Nr. of Words Command Word 1... End Marker Word SW HW Protocol for RCU-specific Commands

Command IDBlock Nr.Nr. of Words Status Word Result Word 1 … MarkerChecksum Command IDBlock Nr.Nr. of Words Status Word Result Word... End Marker Word SW HW Protocol for RCU-specific Results

Command ID: (8 bit) Command identifier (for details, see 7.2.1) Command identifier Safety message identifier (1 if the message is a safety message, 0 if not) Packed format bit (1 if the message contains packed 3 * 10 bit words. Used for Pedestal Data) Not used/Don’t care. Available for future use IdentifierMeaning 0001Single read 0010Single write 0011Multiple read 0100Multiple write 0101Random read 0110Random write

Block Nr: (8 bit) The block number reflects if there are more instructions to handle. It is decremented inbetween one collection of instructions / blocks Number of Words: (16 bit) Number (Integer) of 32 bit data words in command block. Including information word and marker word. Marker: (16 bit) Marker word id, coded as AA55 (hex). Checksum: (16 bit) Checksum, which will be compared with the checksum computed by the Configuration Module/DCS IM End Marker Word: (32 bit) End marker id, coded as DD33 (hex).

IdentifierMeaning 0001Single read: - address word 0010Single write: - address word - Data 0011Multiple read - address word - number of data words to read 0100Multiple write - address word - number of data words - data word 1 : - data word N 0101Random read - address word 1 - address word 2 : - address word N 0110Random write - address word 1 - data word 1 - address word 2 - data word 2 : - address word N - data word N Possible Commands: (TPC-RCU)

FEE Server (DIM - Server on RCU - Card) PVSS Server (DIM - Server) FEE Client (DIM - Client) InterCom Layer (Application layer) Database Access PVSS Client (DIM - Client) Communication Layers