SlideShare a Scribd company logo
1 of 55
PCIe Transaction Layer
24/04/17 2
Outline
Layering Diagram
Address space , Transaction type and usage
TLP Packet format overview
Transaction Layer protocol packet definition
TLP with Data payload rules
TLP Digest Rules
Packet Routing Techniques
Transaction Descriptor
Memory , I/O and Configuration Rules
Completion Rules
Handling of Received TLPs
Transaction Ordering Rules
Virtual Channel Mechanism and TC/VC Mapping
Data Integrity and ECRC rules
Completion Timeout Mechanism
Layering Diagram
Transaction
Physical
Data Link Data link
Transaction
Electrical Sub
Block
Electrical Sub Block
Logical Sub BlockLogical sub Block
Tx Rx TxRx
PhysicalPhysical
24/04/17 3
Framing
Sequence
Number
FramingHeader Data ECRC LCRC
Transaction Layer
Data link Layer
Physical Layer
Packet Flow Through The Layers
24/04/17 4
Transaction Layer Overview
Transaction
Physical
Data Link Data link
Transaction
Electrical Sub
Block
Electrical Sub Block
Logical Sub BlockLogical sub Block
Tx Rx TxRx
PhysicalPhysical
24/04/17 5
Address Spaces, Transaction Types, and
Usage
Address Space Transaction Types Basic Usage
Memory Read
Write
Transfer data to/from a memory –
mapped location.
I/O Read
Write
Transfer data to/from an I/O-mapped
location.
Configuration Read
Write
Device Function Configuration/Setup
Message Baseline-
(including Vendor-
defined)
From event signaling mechanism to
general purpose messaging.
Transaction Types for Different Address Spaces
24/04/17 6
Transaction types & Rules
ĂĽ
Memory Transactions
ĂĽ
I/O Transactions
ĂĽ
Configuration Transactions
ĂĽ
Message Transactions
24/04/17 7
Packet Format Overview
Serial view of TLP
24/04/17 8
Generic TLP Format
24/04/17 9
Transaction Layer Protocol – Packet
Definition
ĂĽ
PCI Express uses a packet based protocol to exchange
information between the Transaction Layers of the two
components communicating with each other over the Link
ĂĽ
Transactions are carried using Requests and
Completions.
24/04/17 10
Common Packet Header Fields
Fields Present in All TLP Headers
Fmt[2:0] Corresponding TLP Format
000b 3 DW header, no data
001b 4 DW header, no data
010b 3 DW header, with data
011b 4DW header, with data
100b TLP Prefix
Fmt[2:0] Field Values
24/04/17 11
24/04/17 12
Continued…
24/04/17 13
Continued…
Length[9:0] Field Encoding
24/04/17 14
Length[9:0] Field Encoding
TLPs with Data Payloads - Rules
ĂĽ
Length is specified as an integral number of DW.
ĂĽ
Length[9:0] is Reserved for all Messages except those which
explicitly refer to a Data Length.
ĂĽ
The Transmitter of a TLP with a data payload must not allow the
data payload length as given by the TLP’s Length field to exceed
the length specified by the value in the Max_Payload_Size field of
the Transmitter’s Device Control register taken as an integral
number of DW.
ĂĽ
The size of the data payload of a Received TLP as given by the
TLP’s Length field must not exceed the length specified by the
value in the Max_Payload_Size field of the Receiver’s Device
Control register taken as an integral number of DW.
24/04/17 15
24/04/17 16
Examples of Completer Target Memory Access for Fetchadd
TLP Digest Rules
ĂĽ
For any TLP, a value of 1b in the TD field indicates the
presence of the TLP Digest field including an ECRC value at the
end of the TLP.
ĂĽ
If an intermediate or ultimate PCI Express Receiver of the TLP
does not support ECRC checking, the Receiver must ignore the
TLP Digest.
24/04/17 17
24/04/17 18
Packet Routing technique
ĂĽ
There are three principal mechanisms for TLP routing:
§
Address Based Routing
§
Id based Routing
§
Implicit Routing
ĂĽ
Memory and IO requests use address based routing.
ĂĽ
Completion and Configuration requests use Id based routing.
ĂĽ
Implicit routing is used only with Message Requests.
Address Based Routing Rules
ĂĽ
Address routing is used with Memory and I/O Requests.
ĂĽ
Two address formats are specified, a 64-bit format used with a 4
DW header and a 32-bit format used with a 3 DW header.
ĂĽ
Memory Read, Memory Write, and AtomicOp Requests can use
either format.
ĂĽ
I/O Read Requests and I/O Write Requests use the 32-bit format.
24/04/17 19
24/04/17 20
Continued…
32-bit Address Routing
64-bit Address Routing
ID Based Routing
ĂĽ
ID routing is used with Configuration Requests, with ID Routed
Messages, and with Completions. This specification defines
Vendor Defined Messages that are ID Routed. Other
specifications are permitted to define additional ID Routed
Messages.
ĂĽ
ID routing uses the Bus, Device, and Function Numbers (as
applicable) to specify the destination for the TLP.
ĂĽ
Two ID routing formats are specified, one used with a 4 DW
header and one used with a 3 DW header.
24/04/17 21
24/04/17 22
Continued…
Header Field Locations for non-ARI ID Routing
Header Field Locations for ARI ID Routing
24/04/17 spandana@perfectvips.com 23ID based Routing with 3 DW Header
ID based Routing with 4 DW Header
Continued…
24/04/17 24
First/Last DW Byte Enables Rules
ĂĽ
Byte Enables are included with Memory, I/O, and Configuration
Requests.
ĂĽ
If the Length field for a Request indicates a length of greater
than 1 DW, then First DW byte enable field must not equal
0000b.
ĂĽ
If the Length field for a Request indicates a length of 1 DW, the
Last DW byte enable field must equal 0000b.
ĂĽ
If the Length field for a Request indicates a length of greater
than 1 DW, this field must not equal 0000b.
Transaction Descriptor
ĂĽ
The Transaction Descriptor is a mechanism for carrying
transaction information between the Requester and the
Completer.
ĂĽ
Transaction Descriptors are composed of three fields§
Transaction ID – identifies outstanding Transactions
§
Attributes field – specifies characteristics of the Transaction
§
Traffic Class (TC) field – associates Transaction with type of
required service
24/04/17 25
24/04/17 26
Continued…
Transaction descriptor
Transaction ID field
Transaction ID Field
ĂĽ
The Transaction ID field consists of two major sub-fields:
§
Requester ID
§
Tag
ĂĽ
Tag[7:0] is an 8-bit field generated by each Requester, and it
must be unique for all outstanding Requests that require a
Completion for that Requester.
ĂĽ
Transaction ID is included with all Requests and Completions.
ĂĽ
The Requester ID is a 16-bit value that is unique for every PCI
Express Function within a Hierarchy.
ĂĽ
A Switch must forward Requests without modifying the
Transaction ID.
24/04/17 27
Attributes Field
24/04/17 28
ĂĽ
The attribute field is used to provide additional information that
allows modification of default handling of transactions.
ĂĽ
These modifications apply to different aspects of handling the
ĂĽ
transactions within the system, such as:
§
Ordering
§
Hardware coherency management (snoop)
ĂĽ
Relaxed Ordering and ID-Based Ordering attributes are not adjacent
in location.
Relaxed Ordering & ID Based
Ordering Attributes
ĂĽ
Attr[1] is not applicable and must be set to 0b for configuration
requests, I/O requests , Memory requests that are Message
signalled Interrupts, and Message Requests.
ĂĽ
Attribute bit [2], IDO, is reserved for Configuration Requests and
I/O Requests. IDO is not reserved for all Memory Requests and
message requests.
24/04/17 29
No Snoop Attribute :
ĂĽ
No Snoop doesn't alter the Transaction Ordering.
ĂĽ
This attribute is not applicable and must be set to 0b for
Configuration , I/O and Memory Requests that are Message
Signalled Interrupts, and Message Requests (except where
specifically permitted).
24/04/17 30
TD – TC Field :
ĂĽ
The Traffic Class (TC) is a 3-bit field that allows differentiation of
transactions into eight traffic classes.
ĂĽ
TC information is used at every Link and within each Switch
element to make decisions with regards to proper servicing of the
traffic.
ĂĽ
The key aspect of servicing is the routing of the packets based on
their TC labels through corresponding VC's.
24/04/17 31
Memory, I/O and Configuration
Request Rules
24/04/17 32
24/04/17 33
Continued…
24/04/17 34
Continued…
24/04/17 35
Continued…
24/04/17 36
Continued…
24/04/17 37
Continued…
Request Header format for I/O Transaction
Request Header format for Configuration Transaction
24/04/17 38
Message Routing
ĂĽ
Message routing is determined using the r[2:0] sub-field of the
type field.
Message Routing
Error Signalling Messages
ĂĽ
Error signal messages do not include a data pay load.
ĂĽ
Length field is Reserved.
ĂĽ
Error signal messages must use the default TC. Receivers must check
for violations of this rule.
ĂĽ
Error Signalling messages :
-> ERR_COR
-> ERR_NONFATAL
-> ERR_FATAL
24/04/17 39
24/04/17 40
Continued…
ĂĽ
Completions route by ID, and use a 3 DW header.
ĂĽ
Completions contain the following additional fields
§
Completer ID[15:0] – Identifies the Completer
§
Completion Status[2:0] – Indicates the status for a Completion
§
BCM – Byte Count Modified – this bit must not set by PCI
Express Completers, and may only be set by PCI-X completers
§
Byte Count[11:0] – The remaining byte count for Request
§
Tag[7:0] – in combination with the Requester ID field,
corresponds to the Transaction ID
§
Lower Address[6:0] – lower byte address for starting byte of
Completion
24/04/17 41
Completion
Rules
24/04/17 42
Continued…
Completion Header format
Completion status Field value
24/04/17 43
Completion
ID[15:0]
Non-ARI Completion Header format
ARI Completion ID
24/04/17 44
Handling of Received TLPs
24/04/17 45
Handling of Received
request
24/04/17 spandana@perfectvips.com 46
Transaction Ordering And its Rules
The rules defined in this table apply uniformly to all types of
Transactions on PCI Express including Memory, I/O, Configuration,
and Messages. The ordering rules defined in this table apply within
a single Traffic Class (TC).
24/04/17 47
Virtual Channel (VC) Mechanism.
The Virtual Channel (VC) mechanism provides support for
carrying, throughout the fabric, traffic that is differentiated using
TC labels.
Components that do not implement the optional Virtual Channel
Capability structure or Multi-Function Virtual Channel Capability
structure must obey the following rules:
ĂĽ
A Requester must only generate requests with TC0 label.
ĂĽ
A Completer must accept requests with TC label other than
TC0, and must preserve the TC label.
ĂĽ
A Switch must map all TCs to VC0 and must forward all
transactions regardless of the TC label.
24/04/17 48
Continued…
ĂĽ
VCs are uniquely identified using the Virtual Channel
Identification (VC ID) mechanism.
ĂĽ
VC ID assignment must be unique per Port – The same VC ID
cannot be assigned to different VC hardware resources within
the same Port.
ĂĽ
VC ID assignment must be the same for the two Ports on both
sides of a Link.
ĂĽ
VC ID 0 is assigned and fixed to the default VC.
24/04/17 49
Virtual Channel Identification (VC
ID)
24/04/17 50
ĂĽ
The mapping of TCs other than TC0 is system software specific.
However, the mapping algorithm must obey the following rules:
ĂĽ
Every Traffic Class that is supported must be mapped to one of the
Virtual Channels. The mapping of TC0 to VC0 is fixed.
1. One or multiple TCs can be mapped to a VC.
2. One TC must not be mapped to multiple VCs in any Port or
Endpoint Function.
3. TC/VC mapping must be identical for Ports on both sides of
a Link.
TC to VC Mapping
24/04/17 51
TC/VC Configurations
24/04/17 52
Data Integrity & ECRC Rules
The basic data reliability mechanism in PCI Express is contained
within the Data Link Layer, which uses a 32-bit CRC (LCRC) code to
detect errors in TLPs on a Link-by-Link basis, and applies a Link-by-
Link retransmit mechanism for error recovery.
In some cases, the data in a TLP payload is known to be corrupt at the
time the TLP is generated, or may become corrupted while passing
through an intermediate component, such as a Switch. In these cases,
error forwarding, also known as data poisoning, can be used to
indicate the corruption to the device consuming the data.
24/04/17 53
The capability to generate and check ECRC is reported to
software, and the ability to do so is enabled by software.
ECRC RULES….
ĂĽ
If a device Function is enabled to generate ECRC, it must
calculate and apply ECRC for all TLPs originated by the Function.
ĂĽ
Switches must pass TLPs with ECRC unchanged from the Ingress
Port to the Egress Port.
ĂĽ
If a device supports ECRC generation/checking, at least one of
its Functions must support Advanced Error Reporting.
ĂĽ
If a device Function is enabled to check ECRC, it must do so for
all TLPs with ECRC where the device is the ultimate PCI Express
Receiver
24/04/17 54
ĂĽ
PCI Express device Functions that issue Requests requiring Completions
must implement the Completion Timeout mechanism. An exception is
made for Configuration Requests .
ĂĽ
The Completion Timeout mechanism is activated for each Request that
requires one or more Completions when the Request is transmitted.
Since Switches do not autonomously initiate Requests that need
Completions, the requirement for Completion Timeout support is limited
only to Root Complexes, PCI Express-PCI Bridges, and Endpoints.
ĂĽ
The Completion Timeout mechanism may be disabled by configuration
software. The Completion Timeout limit is set in the Completion Timeout
Value field of the Device Control register.
Completion Timeout Mechanism
47
Thank You…
spandana@perfectvips.com24/04/17

More Related Content

What's hot

Pci express modi
Pci express modiPci express modi
Pci express modiproma_goswami
 
PCIe and PCIe driver in WEC7 (Windows Embedded compact 7)
PCIe and PCIe driver in WEC7 (Windows Embedded compact 7)PCIe and PCIe driver in WEC7 (Windows Embedded compact 7)
PCIe and PCIe driver in WEC7 (Windows Embedded compact 7)gnkeshava
 
Creating Your Own PCI Express System Using FPGAs: Embedded World 2010
Creating Your Own PCI Express System Using FPGAs: Embedded World 2010Creating Your Own PCI Express System Using FPGAs: Embedded World 2010
Creating Your Own PCI Express System Using FPGAs: Embedded World 2010Altera Corporation
 
PCI Express Verification using Reference Modeling
PCI Express Verification using Reference ModelingPCI Express Verification using Reference Modeling
PCI Express Verification using Reference ModelingDVClub
 
UVM Methodology Tutorial
UVM Methodology TutorialUVM Methodology Tutorial
UVM Methodology TutorialArrow Devices
 
AXI Protocol.pptx
AXI Protocol.pptxAXI Protocol.pptx
AXI Protocol.pptxYazan Yousef
 
Axi protocol
Axi protocolAxi protocol
Axi protocolAzad Mishra
 
Design and Implementation of Axi-Apb Bridge based on Amba 4.0
Design and Implementation of Axi-Apb Bridge based on Amba 4.0Design and Implementation of Axi-Apb Bridge based on Amba 4.0
Design and Implementation of Axi-Apb Bridge based on Amba 4.0ijsrd.com
 
APB protocol v1.0
APB protocol v1.0APB protocol v1.0
APB protocol v1.0Azad Mishra
 
AMBA 5 COHERENT HUB INTERFACE.pptx
AMBA 5 COHERENT HUB INTERFACE.pptxAMBA 5 COHERENT HUB INTERFACE.pptx
AMBA 5 COHERENT HUB INTERFACE.pptxSairam Chebrolu
 
Amba axi 29 3_2015
Amba axi 29 3_2015Amba axi 29 3_2015
Amba axi 29 3_2015kiemnhatminh
 
Introduction about APB Protocol
Introduction about APB ProtocolIntroduction about APB Protocol
Introduction about APB ProtocolPushpa Yakkala
 
pciexpress-200220095945.pdf
pciexpress-200220095945.pdfpciexpress-200220095945.pdf
pciexpress-200220095945.pdfzahixdd
 

What's hot (20)

Pci express modi
Pci express modiPci express modi
Pci express modi
 
PCIe and PCIe driver in WEC7 (Windows Embedded compact 7)
PCIe and PCIe driver in WEC7 (Windows Embedded compact 7)PCIe and PCIe driver in WEC7 (Windows Embedded compact 7)
PCIe and PCIe driver in WEC7 (Windows Embedded compact 7)
 
Creating Your Own PCI Express System Using FPGAs: Embedded World 2010
Creating Your Own PCI Express System Using FPGAs: Embedded World 2010Creating Your Own PCI Express System Using FPGAs: Embedded World 2010
Creating Your Own PCI Express System Using FPGAs: Embedded World 2010
 
AMBA AHB 5
AMBA AHB 5AMBA AHB 5
AMBA AHB 5
 
PCI Express Verification using Reference Modeling
PCI Express Verification using Reference ModelingPCI Express Verification using Reference Modeling
PCI Express Verification using Reference Modeling
 
Axi protocol
Axi protocolAxi protocol
Axi protocol
 
PCI express
PCI expressPCI express
PCI express
 
UVM Methodology Tutorial
UVM Methodology TutorialUVM Methodology Tutorial
UVM Methodology Tutorial
 
AXI Protocol.pptx
AXI Protocol.pptxAXI Protocol.pptx
AXI Protocol.pptx
 
Apb
ApbApb
Apb
 
Axi protocol
Axi protocolAxi protocol
Axi protocol
 
Design and Implementation of Axi-Apb Bridge based on Amba 4.0
Design and Implementation of Axi-Apb Bridge based on Amba 4.0Design and Implementation of Axi-Apb Bridge based on Amba 4.0
Design and Implementation of Axi-Apb Bridge based on Amba 4.0
 
APB protocol v1.0
APB protocol v1.0APB protocol v1.0
APB protocol v1.0
 
Advance Peripheral Bus
Advance Peripheral Bus Advance Peripheral Bus
Advance Peripheral Bus
 
AMBA 5 COHERENT HUB INTERFACE.pptx
AMBA 5 COHERENT HUB INTERFACE.pptxAMBA 5 COHERENT HUB INTERFACE.pptx
AMBA 5 COHERENT HUB INTERFACE.pptx
 
Axi
AxiAxi
Axi
 
Amba axi 29 3_2015
Amba axi 29 3_2015Amba axi 29 3_2015
Amba axi 29 3_2015
 
Introduction about APB Protocol
Introduction about APB ProtocolIntroduction about APB Protocol
Introduction about APB Protocol
 
pciexpress-200220095945.pdf
pciexpress-200220095945.pdfpciexpress-200220095945.pdf
pciexpress-200220095945.pdf
 
CPU Verification
CPU VerificationCPU Verification
CPU Verification
 

Similar to Pc ie tl_layer (3)

Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3Roman Brovko
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesRhydham Joshi
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocolIshtdeep Hora
 
Micro HTTP Server Implemented in C @ COSCUP 2016
Micro HTTP Server Implemented in C @ COSCUP 2016Micro HTTP Server Implemented in C @ COSCUP 2016
Micro HTTP Server Implemented in C @ COSCUP 2016Jian-Hong Pan
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterVishal Vasudev
 
80386_ Bus Cycles & System Architecture.pdf
80386_ Bus Cycles & System Architecture.pdf80386_ Bus Cycles & System Architecture.pdf
80386_ Bus Cycles & System Architecture.pdfrupalidalvi10
 
13. peripheral component interconnect (pci)
13. peripheral component interconnect (pci)13. peripheral component interconnect (pci)
13. peripheral component interconnect (pci)Rumah Belajar
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)Kruti Niranjan
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network LayerManoj Kumar
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layerjamunaashok
 
IoT based Auto Manufacturing Body to Chassis Marriage
IoT based Auto Manufacturing Body to Chassis MarriageIoT based Auto Manufacturing Body to Chassis Marriage
IoT based Auto Manufacturing Body to Chassis MarriageSurendra Kancherla
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerFaizan Shaikh
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdfEnumulaBhargava1
 
Micro HTTP Server for Embedded
Micro HTTP Server for EmbeddedMicro HTTP Server for Embedded
Micro HTTP Server for Embeddedexeri0n1
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9Waqas Ahmed Nawaz
 
Introduction to 80386 microprocessor
Introduction to 80386 microprocessorIntroduction to 80386 microprocessor
Introduction to 80386 microprocessorShehrevar Davierwala
 

Similar to Pc ie tl_layer (3) (20)

Networking essentials lect3
Networking essentials lect3Networking essentials lect3
Networking essentials lect3
 
Final Presentation
Final PresentationFinal Presentation
Final Presentation
 
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & AnomaliesREMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
REMnux tutorial 4.1 - Datagrams, Fragmentation & Anomalies
 
User datagram protocol
User datagram protocolUser datagram protocol
User datagram protocol
 
Micro HTTP Server Implemented in C @ COSCUP 2016
Micro HTTP Server Implemented in C @ COSCUP 2016Micro HTTP Server Implemented in C @ COSCUP 2016
Micro HTTP Server Implemented in C @ COSCUP 2016
 
Custom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_RouterCustom_IP_Network_Protocol_and_Router
Custom_IP_Network_Protocol_and_Router
 
80386_ Bus Cycles & System Architecture.pdf
80386_ Bus Cycles & System Architecture.pdf80386_ Bus Cycles & System Architecture.pdf
80386_ Bus Cycles & System Architecture.pdf
 
13. peripheral component interconnect (pci)
13. peripheral component interconnect (pci)13. peripheral component interconnect (pci)
13. peripheral component interconnect (pci)
 
Tcp ip
Tcp ipTcp ip
Tcp ip
 
E cpri protocol stack
E cpri protocol stackE cpri protocol stack
E cpri protocol stack
 
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
TCP & UDP ( Transmission Control Protocol and User Datagram Protocol)
 
Computer Network - Network Layer
Computer Network - Network LayerComputer Network - Network Layer
Computer Network - Network Layer
 
Computer networks transport layer
Computer networks  transport layerComputer networks  transport layer
Computer networks transport layer
 
IoT based Auto Manufacturing Body to Chassis Marriage
IoT based Auto Manufacturing Body to Chassis MarriageIoT based Auto Manufacturing Body to Chassis Marriage
IoT based Auto Manufacturing Body to Chassis Marriage
 
Tcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication headerTcp header/IP Header/Authentication header
Tcp header/IP Header/Authentication header
 
tcpheader-151221111244.pdf
tcpheader-151221111244.pdftcpheader-151221111244.pdf
tcpheader-151221111244.pdf
 
Micro HTTP Server for Embedded
Micro HTTP Server for EmbeddedMicro HTTP Server for Embedded
Micro HTTP Server for Embedded
 
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
CCNA (R & S) Module 01 - Introduction to Networks - Chapter 9
 
Introduction to 80386
Introduction to 80386Introduction to 80386
Introduction to 80386
 
Introduction to 80386 microprocessor
Introduction to 80386 microprocessorIntroduction to 80386 microprocessor
Introduction to 80386 microprocessor
 

Recently uploaded

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacingjaychoudhary37
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AIabhishek36461
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and usesDevarapalliHaritha
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfAsst.prof M.Gokilavani
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLDeelipZope
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 

Recently uploaded (20)

OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
young call girls in Rajiv Chowk🔝 9953056974 🔝 Delhi escort Service
 
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
VIP Call Girls Service Kondapur Hyderabad Call +91-8250192130
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
microprocessor 8085 and its interfacing
microprocessor 8085  and its interfacingmicroprocessor 8085  and its interfacing
microprocessor 8085 and its interfacing
 
Past, Present and Future of Generative AI
Past, Present and Future of Generative AIPast, Present and Future of Generative AI
Past, Present and Future of Generative AI
 
power system scada applications and uses
power system scada applications and usespower system scada applications and uses
power system scada applications and uses
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdfCCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
CCS355 Neural Network & Deep Learning UNIT III notes and Question bank .pdf
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Current Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCLCurrent Transformer Drawing and GTP for MSETCL
Current Transformer Drawing and GTP for MSETCL
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 

Pc ie tl_layer (3)

  • 2. 24/04/17 2 Outline Layering Diagram Address space , Transaction type and usage TLP Packet format overview Transaction Layer protocol packet definition TLP with Data payload rules TLP Digest Rules Packet Routing Techniques Transaction Descriptor Memory , I/O and Configuration Rules Completion Rules Handling of Received TLPs Transaction Ordering Rules Virtual Channel Mechanism and TC/VC Mapping Data Integrity and ECRC rules Completion Timeout Mechanism
  • 3. Layering Diagram Transaction Physical Data Link Data link Transaction Electrical Sub Block Electrical Sub Block Logical Sub BlockLogical sub Block Tx Rx TxRx PhysicalPhysical 24/04/17 3
  • 4. Framing Sequence Number FramingHeader Data ECRC LCRC Transaction Layer Data link Layer Physical Layer Packet Flow Through The Layers 24/04/17 4
  • 5. Transaction Layer Overview Transaction Physical Data Link Data link Transaction Electrical Sub Block Electrical Sub Block Logical Sub BlockLogical sub Block Tx Rx TxRx PhysicalPhysical 24/04/17 5
  • 6. Address Spaces, Transaction Types, and Usage Address Space Transaction Types Basic Usage Memory Read Write Transfer data to/from a memory – mapped location. I/O Read Write Transfer data to/from an I/O-mapped location. Configuration Read Write Device Function Configuration/Setup Message Baseline- (including Vendor- defined) From event signaling mechanism to general purpose messaging. Transaction Types for Different Address Spaces 24/04/17 6
  • 7. Transaction types & Rules ĂĽ Memory Transactions ĂĽ I/O Transactions ĂĽ Configuration Transactions ĂĽ Message Transactions 24/04/17 7
  • 8. Packet Format Overview Serial view of TLP 24/04/17 8
  • 10. Transaction Layer Protocol – Packet Definition ĂĽ PCI Express uses a packet based protocol to exchange information between the Transaction Layers of the two components communicating with each other over the Link ĂĽ Transactions are carried using Requests and Completions. 24/04/17 10
  • 11. Common Packet Header Fields Fields Present in All TLP Headers Fmt[2:0] Corresponding TLP Format 000b 3 DW header, no data 001b 4 DW header, no data 010b 3 DW header, with data 011b 4DW header, with data 100b TLP Prefix Fmt[2:0] Field Values 24/04/17 11
  • 14. Length[9:0] Field Encoding 24/04/17 14 Length[9:0] Field Encoding
  • 15. TLPs with Data Payloads - Rules ĂĽ Length is specified as an integral number of DW. ĂĽ Length[9:0] is Reserved for all Messages except those which explicitly refer to a Data Length. ĂĽ The Transmitter of a TLP with a data payload must not allow the data payload length as given by the TLP’s Length field to exceed the length specified by the value in the Max_Payload_Size field of the Transmitter’s Device Control register taken as an integral number of DW. ĂĽ The size of the data payload of a Received TLP as given by the TLP’s Length field must not exceed the length specified by the value in the Max_Payload_Size field of the Receiver’s Device Control register taken as an integral number of DW. 24/04/17 15
  • 16. 24/04/17 16 Examples of Completer Target Memory Access for Fetchadd
  • 17. TLP Digest Rules ĂĽ For any TLP, a value of 1b in the TD field indicates the presence of the TLP Digest field including an ECRC value at the end of the TLP. ĂĽ If an intermediate or ultimate PCI Express Receiver of the TLP does not support ECRC checking, the Receiver must ignore the TLP Digest. 24/04/17 17
  • 18. 24/04/17 18 Packet Routing technique ĂĽ There are three principal mechanisms for TLP routing: § Address Based Routing § Id based Routing § Implicit Routing ĂĽ Memory and IO requests use address based routing. ĂĽ Completion and Configuration requests use Id based routing. ĂĽ Implicit routing is used only with Message Requests.
  • 19. Address Based Routing Rules ĂĽ Address routing is used with Memory and I/O Requests. ĂĽ Two address formats are specified, a 64-bit format used with a 4 DW header and a 32-bit format used with a 3 DW header. ĂĽ Memory Read, Memory Write, and AtomicOp Requests can use either format. ĂĽ I/O Read Requests and I/O Write Requests use the 32-bit format. 24/04/17 19
  • 20. 24/04/17 20 Continued… 32-bit Address Routing 64-bit Address Routing
  • 21. ID Based Routing ĂĽ ID routing is used with Configuration Requests, with ID Routed Messages, and with Completions. This specification defines Vendor Defined Messages that are ID Routed. Other specifications are permitted to define additional ID Routed Messages. ĂĽ ID routing uses the Bus, Device, and Function Numbers (as applicable) to specify the destination for the TLP. ĂĽ Two ID routing formats are specified, one used with a 4 DW header and one used with a 3 DW header. 24/04/17 21
  • 22. 24/04/17 22 Continued… Header Field Locations for non-ARI ID Routing Header Field Locations for ARI ID Routing
  • 23. 24/04/17 spandana@perfectvips.com 23ID based Routing with 3 DW Header ID based Routing with 4 DW Header Continued…
  • 24. 24/04/17 24 First/Last DW Byte Enables Rules ĂĽ Byte Enables are included with Memory, I/O, and Configuration Requests. ĂĽ If the Length field for a Request indicates a length of greater than 1 DW, then First DW byte enable field must not equal 0000b. ĂĽ If the Length field for a Request indicates a length of 1 DW, the Last DW byte enable field must equal 0000b. ĂĽ If the Length field for a Request indicates a length of greater than 1 DW, this field must not equal 0000b.
  • 25. Transaction Descriptor ĂĽ The Transaction Descriptor is a mechanism for carrying transaction information between the Requester and the Completer. ĂĽ Transaction Descriptors are composed of three fields§ Transaction ID – identifies outstanding Transactions § Attributes field – specifies characteristics of the Transaction § Traffic Class (TC) field – associates Transaction with type of required service 24/04/17 25
  • 27. Transaction ID Field ĂĽ The Transaction ID field consists of two major sub-fields: § Requester ID § Tag ĂĽ Tag[7:0] is an 8-bit field generated by each Requester, and it must be unique for all outstanding Requests that require a Completion for that Requester. ĂĽ Transaction ID is included with all Requests and Completions. ĂĽ The Requester ID is a 16-bit value that is unique for every PCI Express Function within a Hierarchy. ĂĽ A Switch must forward Requests without modifying the Transaction ID. 24/04/17 27
  • 28. Attributes Field 24/04/17 28 ĂĽ The attribute field is used to provide additional information that allows modification of default handling of transactions. ĂĽ These modifications apply to different aspects of handling the ĂĽ transactions within the system, such as: § Ordering § Hardware coherency management (snoop) ĂĽ Relaxed Ordering and ID-Based Ordering attributes are not adjacent in location.
  • 29. Relaxed Ordering & ID Based Ordering Attributes ĂĽ Attr[1] is not applicable and must be set to 0b for configuration requests, I/O requests , Memory requests that are Message signalled Interrupts, and Message Requests. ĂĽ Attribute bit [2], IDO, is reserved for Configuration Requests and I/O Requests. IDO is not reserved for all Memory Requests and message requests. 24/04/17 29
  • 30. No Snoop Attribute : ĂĽ No Snoop doesn't alter the Transaction Ordering. ĂĽ This attribute is not applicable and must be set to 0b for Configuration , I/O and Memory Requests that are Message Signalled Interrupts, and Message Requests (except where specifically permitted). 24/04/17 30
  • 31. TD – TC Field : ĂĽ The Traffic Class (TC) is a 3-bit field that allows differentiation of transactions into eight traffic classes. ĂĽ TC information is used at every Link and within each Switch element to make decisions with regards to proper servicing of the traffic. ĂĽ The key aspect of servicing is the routing of the packets based on their TC labels through corresponding VC's. 24/04/17 31
  • 32. Memory, I/O and Configuration Request Rules 24/04/17 32
  • 37. 24/04/17 37 Continued… Request Header format for I/O Transaction Request Header format for Configuration Transaction
  • 38. 24/04/17 38 Message Routing ĂĽ Message routing is determined using the r[2:0] sub-field of the type field. Message Routing
  • 39. Error Signalling Messages ĂĽ Error signal messages do not include a data pay load. ĂĽ Length field is Reserved. ĂĽ Error signal messages must use the default TC. Receivers must check for violations of this rule. ĂĽ Error Signalling messages : -> ERR_COR -> ERR_NONFATAL -> ERR_FATAL 24/04/17 39
  • 41. ĂĽ Completions route by ID, and use a 3 DW header. ĂĽ Completions contain the following additional fields § Completer ID[15:0] – Identifies the Completer § Completion Status[2:0] – Indicates the status for a Completion § BCM – Byte Count Modified – this bit must not set by PCI Express Completers, and may only be set by PCI-X completers § Byte Count[11:0] – The remaining byte count for Request § Tag[7:0] – in combination with the Requester ID field, corresponds to the Transaction ID § Lower Address[6:0] – lower byte address for starting byte of Completion 24/04/17 41 Completion Rules
  • 42. 24/04/17 42 Continued… Completion Header format Completion status Field value
  • 43. 24/04/17 43 Completion ID[15:0] Non-ARI Completion Header format ARI Completion ID
  • 44. 24/04/17 44 Handling of Received TLPs
  • 45. 24/04/17 45 Handling of Received request
  • 46. 24/04/17 spandana@perfectvips.com 46 Transaction Ordering And its Rules The rules defined in this table apply uniformly to all types of Transactions on PCI Express including Memory, I/O, Configuration, and Messages. The ordering rules defined in this table apply within a single Traffic Class (TC).
  • 47. 24/04/17 47 Virtual Channel (VC) Mechanism. The Virtual Channel (VC) mechanism provides support for carrying, throughout the fabric, traffic that is differentiated using TC labels.
  • 48. Components that do not implement the optional Virtual Channel Capability structure or Multi-Function Virtual Channel Capability structure must obey the following rules: ĂĽ A Requester must only generate requests with TC0 label. ĂĽ A Completer must accept requests with TC label other than TC0, and must preserve the TC label. ĂĽ A Switch must map all TCs to VC0 and must forward all transactions regardless of the TC label. 24/04/17 48 Continued…
  • 49. ĂĽ VCs are uniquely identified using the Virtual Channel Identification (VC ID) mechanism. ĂĽ VC ID assignment must be unique per Port – The same VC ID cannot be assigned to different VC hardware resources within the same Port. ĂĽ VC ID assignment must be the same for the two Ports on both sides of a Link. ĂĽ VC ID 0 is assigned and fixed to the default VC. 24/04/17 49 Virtual Channel Identification (VC ID)
  • 50. 24/04/17 50 ĂĽ The mapping of TCs other than TC0 is system software specific. However, the mapping algorithm must obey the following rules: ĂĽ Every Traffic Class that is supported must be mapped to one of the Virtual Channels. The mapping of TC0 to VC0 is fixed. 1. One or multiple TCs can be mapped to a VC. 2. One TC must not be mapped to multiple VCs in any Port or Endpoint Function. 3. TC/VC mapping must be identical for Ports on both sides of a Link. TC to VC Mapping
  • 52. 24/04/17 52 Data Integrity & ECRC Rules The basic data reliability mechanism in PCI Express is contained within the Data Link Layer, which uses a 32-bit CRC (LCRC) code to detect errors in TLPs on a Link-by-Link basis, and applies a Link-by- Link retransmit mechanism for error recovery. In some cases, the data in a TLP payload is known to be corrupt at the time the TLP is generated, or may become corrupted while passing through an intermediate component, such as a Switch. In these cases, error forwarding, also known as data poisoning, can be used to indicate the corruption to the device consuming the data.
  • 53. 24/04/17 53 The capability to generate and check ECRC is reported to software, and the ability to do so is enabled by software. ECRC RULES…. ĂĽ If a device Function is enabled to generate ECRC, it must calculate and apply ECRC for all TLPs originated by the Function. ĂĽ Switches must pass TLPs with ECRC unchanged from the Ingress Port to the Egress Port. ĂĽ If a device supports ECRC generation/checking, at least one of its Functions must support Advanced Error Reporting. ĂĽ If a device Function is enabled to check ECRC, it must do so for all TLPs with ECRC where the device is the ultimate PCI Express Receiver
  • 54. 24/04/17 54 ĂĽ PCI Express device Functions that issue Requests requiring Completions must implement the Completion Timeout mechanism. An exception is made for Configuration Requests . ĂĽ The Completion Timeout mechanism is activated for each Request that requires one or more Completions when the Request is transmitted. Since Switches do not autonomously initiate Requests that need Completions, the requirement for Completion Timeout support is limited only to Root Complexes, PCI Express-PCI Bridges, and Endpoints. ĂĽ The Completion Timeout mechanism may be disabled by configuration software. The Completion Timeout limit is set in the Completion Timeout Value field of the Device Control register. Completion Timeout Mechanism

Editor's Notes

  1. 1-byte start of frame//2-byte seq.no//16or 20 byte header//0 to 4096 byte Data field//0 to 4 byte ECRC field//4 byte LCRC // <number>
  2. <number>
  3. Depending on the type of packet ,the header for that packet will include following type of field . ->Format of the packet ->type of packet->transaction descriptor->Address/routing information->Byte enables ->byte enable ->completion status <number>
  4. The format field indicate the presence of one or more tlp prefixes nd typ field indicates the associated tlp prefix types. TH-1b indicates the presence of TLP processing Hints(TPH)…TD-1b indicates presence of TLP digest in the form of a single DW at the end of the TLP………….EP-indicates the TLP is poisoned…… <number>
  5. Data payload->Information following the header in some packets that is destined for consumption by the targeted function receiving the packet(eg- Write request and read comletions) <number>
  6. <number>
  7. <number>
  8. <number>