Universal serial bus - computer architecture, Computer Engineering

Assignment Help:

Universal Serial Bus - computer architecture:

USB

  Universal Serial Bus

  Speed

  • Low-speed(1.5 Mb/s)
  • High-speed(480 Mb/s)
  • Full-speed(12 Mb/s)

  Device Characteristics

  Port Limitation

  Plug-and-play

Universal Serial Bus Tree Structure

1326_usb.png

USB (Universal Serial Bus) is a specification to establish communication among components and a host controller (typically personal computers). USB is intended to replace several varieties of parallel and serial ports. USB can attach computer peripherals likewise, keyboards, digital cameras, mice, printers, flash drives, external hard drives, and personal media players. For several of those devices, USB has become the usual connection method. USB was designed for PC[citation needed], but it has become commonplace on other components such as PDAs ,smart phones and video game consoles, and as a power cord among a device and an AC adapter plugged into a wall plug for charging. As of the year 2008, there are approximate 2 billion USB devices sold per year, and about 6 billion totals sold to date.


Related Discussions:- Universal serial bus - computer architecture

Variable-partition multiprogramming, Choose the descriptions below with the...

Choose the descriptions below with the most appropriate memory management scheme (A through D).  Solutions may be used once, more than once, or not at all. A.     Fixed-partitio

Define the architectural framework for electronic commerce, Define the Arch...

Define the Architectural framework for electronic commerce. An application independent framework to categorize service interaction relies onto four fundamental dimensions a.

Physics, derive an expression for vandar wall equation of state?

derive an expression for vandar wall equation of state?

What are the disadvantages of public key cryptography, What are the disadva...

What are the disadvantages of Public Key Cryptography? Disadvantages of Public Key Cryptography are as given below: a) It is used to encrypt a secret key that is used to e

Origin of RISC, Q. Origin of RISC? In the 1980s a new philosophy develo...

Q. Origin of RISC? In the 1980s a new philosophy developed having optimizing compilers which could be used to compile 'normal' programming languages down to instructions which

What is script-fu in gimp, Sript-Fu is the first GIMP scripting extension. ...

Sript-Fu is the first GIMP scripting extension. Extensions are split processes that communicate with the GIMP in the similar way that plug-ins do. The distinction is that extension

Search methods and heuristics - artificial intelligence, Search Methods and...

Search Methods and Heuristics - Artificial intelligence: Here now we come to the question of how constraint solvers search for solutions -constraint preserving coursework of v

Unencoded micro-instructions, Unencoded micro-instructions One bit ...

Unencoded micro-instructions One bit is required for each control signal; so number of bits needed in a micro-instruction is high. It represents a detailed hardware vi

Dimensionality of interconnection network, Dimensionality of Interconnectio...

Dimensionality of Interconnection Network Dimensionality signify the arrangement of nodes or processing elements in an interconnection network. In linear network or one dimensi

Explain fundamental models of inter process communication, Explain the two ...

Explain the two fundamental models of inter process communication. Two kinds of message passing system are given as: (a) Direct Communication : Along with direct communicat

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd