IDT Theory of Operation
PES48T12G2 User Manual
8 - 4
April 5, 2013
Notes
Figure 8.1 ACS Source Validation Example
Figure 8.2 shows an example of ACS peer-to-peer request re-direct at a downstream port. In this case,
the offending TLP received by the downstream port is re-directed towards the root-complex.
Figure 8.2 ACS Peer-to-Peer Request Re-direct at a Downstream Port
Figure 8.3 shows an example of ACS upstream forwarding at a downstream port. As with ACS Peer-to-
Peer forwarding, the offending TLP received by the downstream port is re-directed towards the root-
complex.
Virtual PCI Bus
P2P
Bridge
Upstream
Port
P2P
Bridge
P2P
Bridge
Downstream Ports
TLP route
Completion with
completer-abort status
ACS Source
Validation
(TLP is
dropped at this
point)
Intended TLP Route
ACS Re-directed Route
Virtual PCI Bus
P2P
Bridge
Upstream
Port
P2P
Bridge
P2P
Bridge
Downstream Ports
ACS Peer-to-
Peer Request
Re-direct
Summary of Contents for 89HPES48T12G2
Page 14: ...IDT Table of Contents PES48T12G2 User Manual vi April 5 2013 Notes...
Page 22: ...IDT Register List PES48T12G2 User Manual xiv April 5 2013 Notes...
Page 38: ...IDT PES48T12G2 Device Overview PES48T12G2 User Manual 1 16 April 5 2013 Notes...
Page 64: ...IDT Reset and Initialization PES48T12G2 User Manual 5 8 April 5 2013 Notes...
Page 82: ...IDT Link Operation PES48T12G2 User Manual 6 18 April 5 2013 Notes...
Page 98: ...IDT SerDes PES48T12G2 User Manual 7 16 April 5 2013 Notes...
Page 118: ...IDT Theory of Operation PES48T12G2 User Manual 8 20 April 5 2013 Notes...
Page 152: ...IDT SMBus Interfaces PES48T12G2 User Manual 12 20 April 5 2013 Notes...
Page 158: ...IDT Multicast PES48T12G2 User Manual 13 6 April 5 2013 Notes...