Usb communication - computer architecture, Computer Engineering

Data packets:

USB communication takes the form of packets. Originally, all packets are sent from the host, using the root hub and possibly more hubs, to components. Some of those packets direct a device to send some packets in reply.

After the sync field discussed above, all packets are made of 8-bit bytes, transmitted least-significant bit first. First byte is a packet identifier (PID) byte. The PID is in fact 4 bits; the byte consists of the 4-bit PID followed by its bitwise complement. It redundancy helps detect errors. (Note that a PID byte contains at most 4 consecutive 1 bits, and consequently will never require bit-stuffing, even when combined with the last 1 bit in the sync byte. though, trailing 1 bits in the PID may need bit-stuffing within the first few bits of the payload.)

1173_USB communication.png

 

Posted Date: 10/13/2012 7:46:52 AM | Location : United States







Related Discussions:- Usb communication - computer architecture, Assignment Help, Ask Question on Usb communication - computer architecture, Get Answer, Expert's Help, Usb communication - computer architecture Discussions

Write discussion on Usb communication - computer architecture
Your posts are moderated
Related Questions
Q. Instruction Queue in Bus Interface Unit? Instruction queue is employed to store the instruction ‘bytes' fetched. Please conceren two points here: that it's (1) A Byte (2) Qu

Problem (a) Explain the difference between the real mode and the protected mode in the 80x86 family of processors. (b) The 32-bit physical address 047C:0048 is to be conv

What is data mining? Data Mining: It is an analytic process designed to explore data and after that to validate the findings through applying the detected patterns to lat


SQL Injection includes entering SQL code into web forms, eg. login fields, or into the browser address field, to access and manipulate the database across the site, application or

Trunks are the lines that run between (A)  Subscribers and exchange (B)  Switching system and power plant (C) Local area network (D) Switching stations Ans:

What are types of firewalls? There are conceptually two types of firewalls as: 1. Network Level 2. Application Level

Distributivity of Connectives : In our last analogy with arithmetic will involve a very well-technique need for playing around with algebraic properties. But assume there if w

The devices on the I2C bus are either masters or slaves. The master is the device that is responsible for driving the SCL clock line, while the slaves are the devices that respond

Which loader is executed when a system is first turned on or restarted? Ans. Bootstrap loader executed while a system is first turned on or restarted.