ECE Department: University of Massachusetts, Amherst ECE 354 Lab 4: Remote Control of a Digital Camera.

Slides:



Advertisements
Similar presentations
1 ICS 156: Lecture 2 (part 2) Data link layer protocols Address resolution protocol Notes on lab 2.
Advertisements

ECE Department: University of Massachusetts, Amherst ECE 354 Lab 3: Transmitting and Receiving Ethernet Packets.
1 Data Link Protocols Relates to Lab 2. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet,
Ensuring the Reliability of Data Delivery © 2004 Cisco Systems, Inc. All rights reserved. Establishing a TCP Connection INTRO v2.0—6-1.
Answers of Exercise 7 1. Explain what are the connection-oriented communication and the connectionless communication. Give some examples for each of the.
Csc333 Data communication & Networking Credit: 2.
Chapter 6 Errors, Error Detection, and Error Control.
Lecture 2 Protocol Layers CPE 401 / 601 Computer Network Systems slides are modified from Dave Hollinger.
D Channel Data Link Protocol Link access procedure on the D channel - LAPD.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Protocols and the TCP/IP Suite Chapter 4 (Stallings Book)
Networking Theory (Part 1). Introduction Overview of the basic concepts of networking Also discusses essential topics of networking theory.
Semester 4 - Chapter 4 – PPP WAN connections are controlled by protocols In a LAN environment, in order to move data between any two nodes or routers two.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
ECE Department: University of Massachusetts, Amherst ECE 354 Spring 2009 Lab 3: Transmitting and Receiving Ethernet Packets.
Ethernet: CSMA/CD (Carrier Sense Multiple Access with Collision Detection) Access method: method of controlling how network nodes access communications.
Chapter 6: Errors, Error Detection, and Error Control
Chapter 6 Errors, Error Detection, and Error Control
ECE Department: University of Massachusetts, Amherst ECE 354 Spring 2006 Lab 2: Capturing and Displaying Digital Image.
WXES2106 Network Technology Semester /2005 Chapter 8 Intermediate TCP CCNA2: Module 10.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Serial Communications Standards (Partly Excerpted from Simpl Primer) Cabling Configuration Protocol.
Gursharan Singh Tatla Transport Layer 16-May
Introduction to Information and Computer Science Networks Lecture e This material (Comp4_Unit7e) was developed by Oregon Health and Science University,
Protocols and the TCP/IP Suite Chapter 4. Multilayer communication. A series of layers, each built upon the one below it. The purpose of each layer is.
Process-to-Process Delivery:
Data Communications and Networks
MODULE I NETWORKING CONCEPTS.
Lab 2: Capturing and Displaying Digital Image
ISO Layer Model Lecture 9 October 16, The Need for Protocols Multiple hardware platforms need to have the ability to communicate. Writing communications.
1 Semester 2 Module 10 Intermediate TCP/IP Yuda college of business James Chen
15 - Winter 2006 ECE ECE 766 Computer Interfacing and Protocols 1 Data Link Control Physical layer is only responsible for data transmission Data link.
Chapter 7 Low-Level Protocols
Chapter 11: Flow Control – can occur at layer 2 (data link) and at layer 4 (transport)  You saw the need in the most recent assignment.  Data packets.
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Introduction Slide 1 A Communications Model Source: generates.
DEVICES AND COMMUNICATION BUSES FOR DEVICES NETWORK
ECE Department: University of Massachusetts, Amherst ECE 354 Lab 5: Data Compression.
Chapter 6-2 the TCP/IP Layers. The four layers of the TCP/IP model are listed in Table 6-2. The layers are The four layers of the TCP/IP model are listed.
Transport Layer Moving Segments. Transport Layer Protocols Provide a logical communication link between processes running on different hosts as if directly.
CCNA 1 v3.0 Module 11 TCP/IP Transport and Application Layers.
COP 4930 Computer Network Projects Summer C 2004 Prof. Roy B. Levow Lecture 3.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 14.
Networks. Common Xmit Media Shared Media Networks are a shared communication resource Only one user can access at a time.
1 Chapter Six - Errors, Error Detection, and Error Control Chapter Six.
Data Communications & Computer Networks, Second Edition1 Chapter 6 Errors, Error Detection, and Error Control.
Chapter 6: Errors, Error Detection, and Error Control Data Communications and Computer Networks: A Business User’s Approach Third Edition.
Chapter Six The Data Link Layer. Objectives Learn about physical addressing on the network. Explore the MAC and LLC sublayers of Data Link. Get introduced.
Networking Fundamentals. Basics Network – collection of nodes and links that cooperate for communication Nodes – computer systems –Internal (routers,
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
1 Presented By: Eyal Enav and Tal Rath Eyal Enav and Tal Rath Supervisor: Mike Sumszyk Mike Sumszyk.
Wide Area Networks (WAN) Terms that are commonly used by service providers: Customer premises equipment (CPE) Equipment that’s owned by the subscriber.
Component 4: Introduction to Information and Computer Science Unit 7: Networks & Networking Lecture 5 This material was developed by Oregon Health & Science.
ISDS 4120 Project 1 DWAYNE CARRAL JR 3/27/15. There are seven layers which make up the OSI (Open Systems Interconnection Model) which is the model for.
Protocol Layering Chapter 11.
Communication Architecture and Network Protocol Layering Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by:
© N. Ganesan, Ph.D., All rights reserved. Chapter Formatting of Data for Transmission.
© Janice Regan, CMPT 128, CMPT 371 Data Communications and Networking Principles of reliable data transfer 0.
4343 X2 – The Transport Layer Tanenbaum Ch.6.
UDP : User Datagram Protocol 백 일 우
© 2002, Cisco Systems, Inc. All rights reserved..
McGraw-Hill Chapter 23 Process-to-Process Delivery: UDP, TCP Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Data Link Layer. Link Layer The data unit to be transmited at the link layer is called a frame. Why link layer? How can it know where a frame begins and.
Week #8 OBJECTIVES Chapter #5. CHAPTER 5 Making Networks Work Two Networking Models –OSI OPEN SYSTEMS INTERCONNECTION PROPOSED BY ISO –INTERNATIONAL STANDARDS.
Data Link Protocols Relates to Lab 2.
Cisco Routers Routers collectively provide the main feature of the network layer—the capability to forward packets end-to-end through a network. routers.
Lesson 6 Point to Point Protocol
Local Area Networks: Topologies
PPP PROTOCOL The First semester
Chapter 2: Point-to-Point Connections
Data Link Issues Relates to Lab 2.
Presentation transcript:

ECE Department: University of Massachusetts, Amherst ECE 354 Lab 4: Remote Control of a Digital Camera

2 ECE 354 Big Picture Introduction  Transmit and Receive Ethernet packets between two DE2 boards  Use the 5-layer Internet model you implemented in lab 3 to communicate picture data between two DE2 boards  Use serial protocol developed in lab 2 to acquire picture data and perform image processing  Use a preexisting SOPC system from the DE2_NET project.

3 ECE 354 Skills to learn  Re-use previously written code  Understand simple network handshaking  Conform to a protocol specified by a third party  Inter-group communication  Implement a half-duplex Data-Link layer with error control

4 ECE 354 Additional Hardware  Two DE2 boards  Ethernet cable  Digital camera used in Lab 2  Extra VGA monitor

5 ECE 354 Overview of Lab  Similar procedure to lab 3  Request a snapshot (640x480 1-bit grey-scale) to be taken by a remotely located DE2 board  Also have the option of having the remote device do image processing before transmitting (as in lab 2 but now relayed over a network interface)

6 ECE 354 Modes of Operation  Device will run in 1 of 2 modes: Master Sends commands/requests to the slave, to take pictures or get pictures. Will use switches to select command codes. And a button will transmit command. Display images from the Slave on a VGA monitor. Slave Process commands/requests from the master. Be able to take pictures from the camera used in lab2  You are required to support both modes of operation in your code.

7 ECE 354 Handshaking Protocol  Slave mode is required to support 8 commands. These can be specified by the 3 least-significant switches on the master device. The command is sent by pressing a key of your choice.  Commands include: take snapshot, get image, and various forms of image processing  You are only required to implement 2 forms of image processing. Ambitious groups can do more.  A slave, on receiving an unsupported command, must reply to the master with a NAK (no acknowledge)

8 ECE 354 Commands / Requests (Layer 5) Bit# Switch position Command Name xxxACK xxxNAK Take snapshot Get raw image Image Processing Image Processing Image Processing Image Processing Image Processing Image Processing

9 ECE 354 Handshaking Protocol  The master and slave device will indicate an ACK or NAK by lighting all of the green or red LEDs respectively.  The commands specified on the previous slide will be the payload of a 64 byte UDP-packet. Please see lab 3 for packet format information.

10 ECE 354 Example session of Handshaking Protocol MasterSlave Time Key: 1: Take snapshot 2: Get Data 3: Data 4: ACK 5: NAK or ACK

11 ECE 354 Data-link Layer Error Control  You will implement layer 2 error-control by acknowledging individual packets  Transmission may take place over multiple packets; each individual packet must be acknowledged  Set the payload of an ACK frame to: 0b (0xF0)  IMPORTANT: The ACK specified above is for layer 2 error control and has nothing to do with the handshaking protocol described earlier

12 ECE 354 Handshaking - Detailed View MasterSlave Time Key: 1: Take snapshot 2: Get Data 3: Data 4: ACK 5: NAK or ACK 6: Layer2 ACK * 6

13 ECE 354 Data-link Layer Error Control  After sending a packet, the master/slave will u_sleep for a fixed amount of time and then look for an ACK packet in their receive buffer.  If an ACK is not found, the frame recipient assumes data was corrupted.  This is similar to a busy-wait protocol with a fixed timeout.  Please calculate a suitable time-out value based on transmission size and link speed.  This process occurs within a receive or transmit function, and the handshaking protocol will never be aware of data-loss.

14 ECE 354 Error Control MasterSlave Time Key: 1: Take snapshot 2: Get Data 3: Data 4: ACK 5: NAK or ACK 6: Layer2 ACK 1 6 1

15 ECE 354 Gotchas  Image transmitted over network must follow a specific format to minimize network transmission time and avoid confusion  Format required is a 640x480 1-bit grey scale image, where each pixel is represented by 1-bit One byte contains 8 pixels. 640x480 Image is of size bytes. (76800 / 2)  Carefully adhere to the protocol defined by these slides  bytes is too large for one packet. Sending an image will require more then one packet. Make sure to read headers to get size of data when reading an image off the network.

16 ECE 354 Image Display  The image sent to the master by the slave will be displayed on the VGA monitor attached to each device.  This is accomplished using the code from lab 2.  REMEMBER: The image you send across the data link must conform to the standard specified previously.

17 ECE 354 Comments and/or Questions