|Title||Authors||Last Update||Category||Post date|
Overview on the application layer.
|September 23, 2014||Tutorials||Mon, 2012-06-25 00:00|
Step by step overview on the PCIe Express.
|September 23, 2014||Tutorials||Wed, 2012-06-27 00:00|
|Wireless Networking Overview||Kevin Karcz, Jeremy Kent||
An overview of various wireless networking technologies, their relationship to one another, and a look at emerging standards.
|September 18, 2014||Tutorials||Sun, 2006-01-01 00:00|
|RSP: Development of an 802.11 MAC||Richard L. Lynch||
In the growing world of ubiquitous networking, people often take for granted that interoperability exists between their network devices and the networks they are connecting to. Consortium vendors and international standards bodies are formed to establish standards on how devices should behave if they wish to communicate with each other. However, verifying conformance to these standards is no trivial task. The RSP was developed to add to the Wireless LAN Consortium's testing capabilities. The RSP has the capability of reacting to wireless traffic in a manner that tests a device's handling of uncommon, but very important conditions. The RSP Consists of an 802.11 MAC'less card from Intersil, interfaced to an Altera programmable logic device, which in turn communicates with a PC through a USB microcontroller.
|September 18, 2014||White Papers||Fri, 2001-05-11 00:00|
|Comparison of Environments on 802.11 Throughput Performance||Diana Lewis, Justin Rebe, Jeremy deVries||
The chaotic nature of the radio frequency medium of 802.11 wireless networks makes it problematic to obtain accurate and precise repetition of performance tests and measurements. Environmental variables that deeply influence link performance must be addressed before throughput testing can be accurately measured across various devices. An RF shielded room with anechoic foam provides the most ideal environment for throughput tests compared to either an RF shielded room without foam or an open air laboratory. Location within the RF shielded room with anechoic foam was shown to have a negligible effect on performance, but using an RF absorbing rubber mat under a device was shown to reduce reflections, producing an optimal environment for throughput testing.
|September 18, 2014||White Papers||Thu, 2006-01-05 00:00|
|IEEE 802.11 TGe - QoS Enhancements (D6.0)||Chris Polanec||
Overview of Quality of Service (QoS) Enhancements for the MAC based on TGe draft 6.0.
|September 18, 2014||Tutorials||Sun, 2003-06-01 00:00|
|Tutorial: The Time-Synchronization Standard from the AVB/TSN suite IEEE STd 802.1AS-2011 and following||Kevin Stanton, Intel||
This presentation provides an overview of clock and time synchronization across heterogeneous networks using the published standards:
With special focus on wireless / 802.11 links
|July 17, 2014||External Links||Thu, 2014-07-17 00:00|
|An Efficient Method for Stream Semantics over RDMA||P. MacArthur and R. Russell||
Most network applications today are written to use TCP/IP via sockets. Remote Direct Memory Access (RDMA) is gaining popularity because its zero-copy, kernel-bypass features provide a high throughput, low latency reliable transport. Unlike TCP, which is a stream-oriented protocol, RDMA is a message-oriented protocol, and the OFA verbs library for writing RDMA application programs is more complex than the TCP sockets interface. UNH EXS is one of several libraries designed to give applications more convenient, high-level access to RDMA features. Recent work has shown that RDMA is viable both in the data center and over distance.
One potential bottleneck in libraries that use RDMA is the requirement to wait for message advertisements in order to send large zero-copy messages. By sending messages first to an internal, hidden buffer and copying the message later, latency can be reduced at the expense of higher CPU usage at the receiver. This paper presents a communication algorithm that has been implemented in the UNH EXS stream-oriented mode to allow dynamic switching between sending transfers directly to user memory and sending transfers indirectly via an internal, hidden buffer depending on the state of the sender and receiver. Based on preliminary results, we see that this algorithm performs well under a variety of application requirements.
|May 21, 2014||White Papers||Wed, 2014-05-21 00:00|
Epoch & Unix Timestamp Conversion Tools
|October 7, 2013||External Links||Mon, 2013-10-07 00:00|
|10Gig Link Fault Signaling||Eric Lynskey||
Short overview of how 10Gig link fault signaling works.
|September 5, 2013||Tutorials||Thu, 2013-09-05 00:00|