Flylib.com
Designing Embedded Communications Software
Designing Embedded Communications Software
ISBN: 157820125X
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
T. Sridhar
BUY ON AMAZON
Table of Contents
BackCover
Designing Embedded Communications Software
Foreword
Preface
Organization of the Book
Acknowledgements
Updates
Chapter 1: Introduction
1.2 Communication Devices
1.3 Types of Software Components
1.4 Design Considerations-A Prelude
1.5 Summary
1.6 For Further Study
1.7 Exercises
Chapter 2: Software Considerations in Communications Systems
2.2 Embedded Communications Software
2.3 Summary
2.4 For Further Study
2.6 Exercises
Chapter 3: Software Partitioning
3.2 Tasks and Modules
3.3 Module and Task Decomposition
3.4 Partitioning Case Study--Layer 2 Switch
3.5 Layer 3 SwitchRouter
3.6 Module and Task Interfaces
3.7 Summary
3.8 For Further Study
3.9 Exercises
Chapter 4: Protocol Software
4.2 Summary
4.3 For Further Study
4.4 Exercises
Chapter 5: Tables and Other Data Structures
5.2 Partitioning the StructuresTables
5.3 Implementation
5.4 Speeding up Access
5.5 Table Resizing
5.6 Table Access Routines
5.7 Summary
5.8 For Further Study
5.9 Exercises
Chapter 6: Buffer and Timer Management
6.2 Timer Management
6.3 Summary
6.4 For Further Study
6.5 Exercises
Chapter 7: Management Software
7.2 Management Schemes
7.3 Router Management
7.4 Management Subsystem Architecture
7.5 Agent-to-Protocol Interface
7.6 Device-to-Manager Communication
7.7 System Setup and Configuration
7.8 Saving and Restoring the Configuration
7.9 Summary
7.10 For Further Study
7.11 Exercises
Chapter 8: Multi-Board Communications Software Design
8.1 Common Architectures for Communications Equipment
8.2 Multi-Board Architectures
8.3 Single Control Card Multiple Line Card Architecture
8.4 RTOS Support for Distribution
8.5 Data Structure Changes for Distribution
8.6 State Machine Changes for Distribution
8.7 Management Interfaces for Multi-Board Software
8.8 A Checklist for Multi-Board Software Development
8.9 Evaluating the Single Control Card Multiple Line Card Architecture
8.10 Multiple Line Card, Fully Distributed Architecture
8.11 Failures and Fault Tolerance in Multi-Board Systems
8.12 Summary
8.13 For Further Study
8.14 Exercises
Chapter 9: Going About the Development
9.2 Hardware-Independent Development
9.3 Using a COTS Board
9.4 Development Environments and Tools
9.5 Test Tools and Equipment
9.6 Summary
9.7 For Further Study
9.8 Exercises
Appendix A: Examples from Commercial Systems
Cisco Systems 12000-Series Routers
Glossary of Common Terms and Acronyms
A-B
C
D-E
F-G
H-I
K-M
N-P
Q-S
T-U
V-X
References
Index
Index_A
Index_B
Index_C
Index_D
Index_E
Index_F
Index_G
Index_H
Index_I
Index_J
Index_K
Index_L
Index_M
Index_N
Index_O
Index_P
Index_Q
Index_R
Index_S
Index_T
Index_U
Index_V
Index_W
Index_X
Index_Z
List of Figures
List of Tables
List of Listings
List of Sidebars
Designing Embedded Communications Software
ISBN: 157820125X
EAN: 2147483647
Year: 2003
Pages: 126
Authors:
T. Sridhar
BUY ON AMAZON
Systematic Software Testing (Artech House Computer Library)
Risk Analysis
Master Test Planning
Detailed Test Planning
Analysis and Design
Some Final Thoughts…
Microsoft Windows Server 2003(c) TCP/IP Protocols and Services (c) Technical Reference
Point-to-Point Protocol (PPP)
Internet Protocol (IP) Basics
Internet Control Message Protocol (ICMP)
Internet Protocol Version 6 (IPv6)
User Datagram Protocol
C & Data Structures (Charles River Media Computer Engineering)
Data Types
Arrays
Linked Lists
Graphs
Problems in Stacks and Queues
101 Microsoft Visual Basic .NET Applications
Working with Microsoft Visual Studio .NET 2003 and Microsoft .NET Framework 1.1
Building Windows Forms User Interfaces
Working with Console Applications
Building Enterprise Services Applications
Windows Server 2003 for .NET Developers
Microsoft Office Visio 2007 Step by Step (Step By Step (Microsoft))
Adding Shapes to Diagrams
Formatting Shapes and Diagrams
Applying Themes to Entire Diagrams
Laying Out Office Spaces
Glossary
The Oracle Hackers Handbook: Hacking and Defending Oracle
Overview of the Oracle RDBMS
Attacking the TNS Listener and Dispatchers
Attacking the Authentication Process
Indirect Privilege Escalation
Accessing the File System
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies