Title | Authors | Category | Updated | ||
---|---|---|---|---|---|
PoE Technical FAQ |
PoE FAQ's |
External Links | September 23, 2014 | ||
SCSI Command Overview | IOL |
Overview of the basic SCSI information needed to identify each command. |
Tutorials | September 23, 2014 | |
SAS_Clause_5_Considerations | IOL |
Topics of transmission Speeds and Unit Intervals, OOB Construction, and Differential Signaling. |
Tutorials | September 23, 2014 | |
SAS_Clause_6 | IOL |
Discussing OOB State Machine, speed negotiation, 8b10B Encoding and Synchronization State Machine. |
Tutorials | September 23, 2014 | |
SAS_Clause_7 | IOL |
Presenting Clause 7 with a primitive Overview, Primitive Types and definitions, and open Connection Handshake. |
Tutorials | September 23, 2014 | |
SAS_Clause_9 | IOL |
Presenting the topics of Transport Layer Protocols: SSP, SMP and STP. |
Tutorials | September 23, 2014 | |
SAS_Testing | IOL |
Overview of the physical Layer Test Suites and Equipment, Protocol test suites and equipment and Interop testing. |
Tutorials | September 23, 2014 | |
SAS_Use_Cases | IOL |
Overview of the types of SAS Devices, SAS/SATA Interop, and cables and Connector Types. |
Tutorials | September 23, 2014 | |
SATA_Use_Cases_Presentation | IOL |
SATA uses in the enterprise |
Tutorials | September 23, 2014 | |
SATA_Use_Cases_2 | IOL |
SATA uses in the enterprise |
Tutorials | September 23, 2014 | |
SATA_Use_Cases | IOL |
SATA uses in the enterprise |
Tutorials | September 23, 2014 | |
SATA_Protocol_Chapter_11_and_12 | IOL |
Overview on the device command Layer Protocols. |
Tutorials | September 23, 2014 | |
SATA_Protocol_Chapter_10 | IOL |
Transport layer overview. |
Tutorials | September 23, 2014 | |
SATA_Protocol_Chapter_9 | IOL |
Presenting the topics: 8b10b Encoding, SATA Primitive, ALIGN use in SATA, Hold use, & Cont use. |
Tutorials | September 23, 2014 | |
SATA_Protocol_Chapter_8 | IOL |
Overview of the Chapter 8 OOB and Phy Power States. |
Tutorials | September 23, 2014 | |
SATA_Phy_Layer | IOL |
Overview of the SATA PHY Layer. |
Tutorials | September 23, 2014 | |
SATA_Application_Layer | IOL |
Overview on the application layer. |
Tutorials | September 23, 2014 | |
PCIe_Express_Overview | Raju Mishra |
Step by step overview on the PCIe Express. |
Tutorials | September 23, 2014 | |
Wireless Networking Overview | Kevin Karcz, Jeremy Kent |
An overview of various wireless networking technologies, their relationship to one another, and a look at emerging standards. |
Tutorials | September 18, 2014 | |
RSP: Development of an 802.11 MAC | Richard L. Lynch |
In the growing world of ubiquitous networking, people often take for granted that interoperability exists between their network devices and the networks they are connecting to. Consortium vendors and international standards bodies are formed to establish standards on how devices should behave if they wish to communicate with each other. However, verifying conformance to these standards is no trivial task. The RSP was developed to add to the Wireless LAN Consortium's testing capabilities. The RSP has the capability of reacting to wireless traffic in a manner that tests a device's handling of uncommon, but very important conditions. The RSP Consists of an 802.11 MAC'less card from Intersil, interfaced to an Altera programmable logic device, which in turn communicates with a PC through a USB microcontroller. |
White Papers | September 18, 2014 | |
Comparison of Environments on 802.11 Throughput Performance | Diana Lewis, Justin Rebe, Jeremy deVries |
The chaotic nature of the radio frequency medium of 802.11 wireless networks makes it problematic to obtain accurate and precise repetition of performance tests and measurements. Environmental variables that deeply influence link performance must be addressed before throughput testing can be accurately measured across various devices. An RF shielded room with anechoic foam provides the most ideal environment for throughput tests compared to either an RF shielded room without foam or an open air laboratory. Location within the RF shielded room with anechoic foam was shown to have a negligible effect on performance, but using an RF absorbing rubber mat under a device was shown to reduce reflections, producing an optimal environment for throughput testing. |
White Papers | September 18, 2014 | |
IEEE 802.11 TGe - QoS Enhancements (D6.0) | Chris Polanec |
Overview of Quality of Service (QoS) Enhancements for the MAC based on TGe draft 6.0. |
Tutorials | September 18, 2014 | |
Tutorial: The Time-Synchronization Standard from the AVB/TSN suite IEEE STd 802.1AS-2011 and following | Kevin Stanton, Intel |
This presentation provides an overview of clock and time synchronization across heterogeneous networks using the published standards: With special focus on wireless / 802.11 links |
External Links | July 17, 2014 | |
An Efficient Method for Stream Semantics over RDMA | P. MacArthur and R. Russell |
Most network applications today are written to use TCP/IP via sockets. Remote Direct Memory Access (RDMA) is gaining popularity because its zero-copy, kernel-bypass features provide a high throughput, low latency reliable transport. Unlike TCP, which is a stream-oriented protocol, RDMA is a message-oriented protocol, and the OFA verbs library for writing RDMA application programs is more complex than the TCP sockets interface. UNH EXS is one of several libraries designed to give applications more convenient, high-level access to RDMA features. Recent work has shown that RDMA is viable both in the data center and over distance. One potential bottleneck in libraries that use RDMA is the requirement to wait for message advertisements in order to send large zero-copy messages. By sending messages first to an internal, hidden buffer and copying the message later, latency can be reduced at the expense of higher CPU usage at the receiver. This paper presents a communication algorithm that has been implemented in the UNH EXS stream-oriented mode to allow dynamic switching between sending transfers directly to user memory and sending transfers indirectly via an internal, hidden buffer depending on the state of the sender and receiver. Based on preliminary results, we see that this algorithm performs well under a variety of application requirements. |
White Papers | May 21, 2014 | |
Epoch Converter |
Epoch & Unix Timestamp Conversion Tools |
External Links | October 7, 2013 |