Data Flow Model of USB 3.0. Presented By: Tania Malik

Similar documents
Voice over IP: RTP/RTCP The transport layer

Advanced Networking Voice over IP: RTP/RTCP The transport layer

An Analysis of Wireless Device Implementations on Universal Serial Bus

1500 bytes Universal Serial Bus Bandwidth Analysis

Communication Networks. MAP-TELE 2011/12 José Ruela

Computer Networks. Data Link Layer

Project 4: Pseudo USB Simulation Introduction to UNIVERSAL SERIAL BUS (USB) STANDARD

Introduction to USB 3.0

Real-time Operating Systems Lecture 27.1

WAN Data Link Protocols

Channel Bonding in DOCSIS 3.0. Greg White Lead Architect Broadband Access CableLabs

RTP / RTCP. Announcements. Today s Lecture. RTP Info RTP (RFC 3550) I. Final Exam study guide online. Signup for project demos

IP-Telephony Real-Time & Multimedia Protocols

Network Simulation Traffic, Paths and Impairment

Chapter 11. User Datagram Protocol (UDP)

Question: 3 When using Application Intelligence, Server Time may be defined as.

12K Support Training 2001, Cisc 200 o S 1, Cisc 2, Cisc y tems, Inc. tems, In A l rights reserv s rese ed.

Unit 23. RTP, VoIP. Shyam Parekh

IP - The Internet Protocol

Transport Layer Protocols

Introduce Quality of Service in your IP_to_IP unreliable infrastructure

Final for ECE374 05/06/13 Solution!!

VOICE over IP H.323 Advanced Computer Network SS2005 Presenter : Vu Thi Anh Nguyet

04 Internet Protocol (IP)

First Midterm for ECE374 03/09/12 Solution!!

point to point and point to multi point calls over IP

Status Monitoring. Using Drivers by Seagull to Display Printer Status Information WHITE PAPER

An Introduction to VoIP Protocols

CMPE 150 Winter 2009

Best Practices for Role Based Video Streams (RBVS) in SIP. IMTC SIP Parity Group. Version 33. July 13, 2011

Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Auxiliary Protocols

ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK

Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)

Networking Test 4 Study Guide

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

This topic lists the key mechanisms use to implement QoS in an IP network.

PCI Express Overview. And, by the way, they need to do it in less time.

ESPA Nov 1984 PROPOSAL FOR SERIAL DATA INTERFACE FOR PAGING EQUIPMENT CONTENTS 1. INTRODUCTION 2. CHARACTER DESCRIPTION

Note! The problem set consists of two parts: Part I: The problem specifications pages Part II: The answer pages

DeviceMaster UP Modbus Controller to Controller Communication

Internet Firewall CSIS Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS net15 1. Routers can implement packet filtering

Transport and Network Layer

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Network Programming TDC 561

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

2. IP Networks, IP Hosts and IP Ports

Network Layer: Network Layer and IP Protocol

The OSI Model and the TCP/IP Protocol Suite

First Semester Examinations 2011/12 INTERNET PRINCIPLES

Data Link Layer Overview

Voice over IP. Demonstration 1: VoIP Protocols. Network Environment

Multimedia Communications Voice over IP

IP Network Layer. Datagram ID FLAG Fragment Offset. IP Datagrams. IP Addresses. IP Addresses. CSCE 515: Computer Network Programming TCP/IP

CCNA R&S: Introduction to Networks. Chapter 5: Ethernet

Per-Packet Load Balancing

SuperSpeed USB 3.0: Ubiquitous Interconnect for Next Generation Consumer Applications

The network we see so far. Internet Best Effort Service. Is best-effort good enough? An Audio Example. Network Support for Playback

Quality of Service in the Internet. QoS Parameters. Keeping the QoS. Traffic Shaping: Leaky Bucket Algorithm

Kiwi SyslogGen. A Freeware Syslog message generator for Windows. by SolarWinds, Inc.

Listeners. Formats. Free Form. Formatted

CSE331: Introduction to Networks and Security. Lecture 6 Fall 2006

Application Note. Onsight TeamLink And Firewall Detect v6.3

DeltaV System Health Monitoring Networking and Security

1. Overview. 2. F-bit Utilization

CONTROL MICROSYSTEMS DNP3. User and Reference Manual

Subnetting,Supernetting, VLSM & CIDR

NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes

Internet Protocols. Addressing & Services. Updated:

GlobalSCAPE DMZ Gateway, v1. User Guide

Protocol Data Units and Encapsulation

Asynchronous Transfer Mode

Lecture 15. IP address space managed by Internet Assigned Numbers Authority (IANA)

NB3H5150 I2C Programming Guide. I2C/SMBus Custom Configuration Application Note

Written examination in Computer Networks

LoRa FAQs. 1 of 4 Semtech. Semtech Corporation LoRa FAQ

SIP: Protocol Overview

Multimedia Requirements. Multimedia and Networks. Quality of Service

MBP_MSTR: Modbus Plus Master 12

Interprocess Communication Message Passing

Internet Packets. Forwarding Datagrams

IP videoconferencing solution with ProCurve switches and Tandberg terminals

Ethernet. Ethernet. Network Devices

Lab Exercise Objective. Requirements. Step 1: Fetch a Trace

First Midterm for ECE374 03/24/11 Solution!!

Voice Over IP Per Call Bandwidth Consumption

8. 網路流量管理 Network Traffic Management


BCS THE CHARTERED INSTITUTE FOR IT. BCS HIGHER EDUCATION QUALIFICATIONS BCS Level 5 Diploma in IT COMPUTER NETWORKS

Basic processes in IEEE networks

Network administrators must be aware that delay exists, and then design their network to bring end-to-end delay within acceptable limits.

Real-time apps and Quality of Service

Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP

Nortel Technology Standards and Protocol for IP Telephony Solutions

TECHNICAL CHALLENGES OF VoIP BYPASS

Using IPM to Measure Network Performance

LOW OVERHEAD CONTINUOUS MONITORING OF IP NETWORK PERFORMANCE

Microsoft TV Test. Technology Background. ICC Technology. Application Note. by John Williams

The changes in each specification and how they compare is shown in the table below. Following the table is a discussion of each of these changes.

Configuring an efficient QoS Map

Transcription:

Data Flow Model of USB 3.0 Presented By: Tania Malik

Agenda Basic Definitions Data Flow Model of USB SuperSpeed Packets Basic Transactions Difference from USB 2.0

Basic Definitions: Device Endpoints Pipes Stream Pipes Message Pipes Packets Burst Transaction Streaming Polling

Device Endpoints Uniquely identifiable portion of USB Use for Communication flow b/w Host and device Simplex connection, support data in one direction Logical device is composed of collection of independent endpoints End point has unique device- determined identifier called end point number. End pint descriptor { Device address, Endpoint No, Direction} End point characteristics( Max packet size, Burst Size, Transfer type, direction, bus access frequency)

Device Endpoints Two types of endpoints Endpoint zero Default endpoint, use both input, output endpoint Use to provide access to device configuration information and allow generic USB status and control access. Non-endpoint zero Additional endpoints required for implementation In an unknown state before being configured and not accessible.

Pipes Association b/w endpoint and software Are able to move data b/w host and device Pipe consist of two endpoints with endpoint zero is called default control pipe Default control pipe also used by device specific software USB Host USB Device Two type of Pipes Stream Pipes Message pipes

Pipes communication

Pipe types 1. Stream Pipes No USB- required structure Unidirectional Data transfer is in sequential order Is bounded to a single device endpoint No. in appropriate direction. Support bulk, isochronous, interrupt transfer type 2. Message Pipes Has USB defined structure Bidirectional Default control pipe is always a message pipe Device can service only a single message request at a time per message pipe Support control transfer type

Basic Definitions cont. Packets Sequence of data bytes with specific control sequence. Burst Transaction Allow host to continuously send or receive data No of packets send/ receive without intermediate ACK packet reported by device. Streaming Transmission of digital audio or video, or the listening and viewing of such data without first storing it. Require some mechanism for establishing a channel b/w sender and receiver. Polling A polling model is a system of multiple queues accessed by a single server in cyclic order.

USB Communication Flow Concepts of endpoints, pipes, transfer types are same as USB 2.0.

USB communication Flow

How to transfer and what transfer? Transfer types Control Transfer Isochronous Transfer Interrupt Transfer Bulk transfer Transfer unit Packet SuperSpeed packets start with 16 byte header, 16- bit CRC Most packets contain routing information (routing String) and device address triple. Routing string is use to direct packets on directed path

SuperSpeed packets types Link Management Packets Traverses only the pair of directly connecting ports Use to manage that link Transaction packet Traverse all links in the path directly connecting the host and a device Use to control the flow of data packets, configure device and hub. Data Packet Traverse all links in the path directly connecting the host and a device Consist of two parts Data Packet Header (DPH) Similar to TP Data Packet Payload (DPP) Data Block Isochronous Timestamp Packet Multicast packet sent by host to all active links

Basic In Transfer

Basic Out Transfer

USB Transaction

Comparison b/w 2.0 and SuperSpeed

Conclusion SuperSpeed data flow model retains the familiar concepts and mechanisms for endpoints, pipes, and transfer types. Only difference is when endpoint in Super Speed is busy it returns a NRDY response and send ERADY notification when want to serve again. SuperSpeed support streaming for bulk transfer.

Conclusion cont.