Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Communications system using rings architecture

a communication system and ring architecture technology, applied in the field of communication system using ring architecture, can solve the problems of requiring a considerable revamping of the system, unable to connect, and a large number of mechanisms needing debuggers

Inactive Publication Date: 2003-10-09
GLOBESPANVIRATA
View PDF24 Cites 33 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In addition to the drawbacks presented by the expense of implementing such circuits, clock synchronization is of continuing concern in switched networks.
If the necessary bandwidth is not available, the connection is refused.
The challenge currently faced by system designers is integrate the modules into a cohesive system.
Other challenges to designing a SOC, among others, include: heterogeneous peripheral devices; several active modules (CPU, DMA); performance bottlenecks; performance organization of connectivity and busses; customer reality changes over life of a project; design verification bottleneck, both intra-module and inter-module; and application verification.
As demonstrated, these challenges result in a considerable number of mechanisms needing to be debugged during the design of a SOC.
Although the traditional bus oriented approach is extensively utilized, such an approach typically has the following problems: a number interfaces to debug for both timing and logic; architectural decisions typically need to be done early in design; busses often create unpredictable timing and loadings; changing anything, like adding peripheral or deleting CPU requires considerable revamping of the system; and so on.
The disadvantages of using such general purpose cores in packet processing applications include: costs incurred from license fee and royalties; limited customization--a special license is usually required to modify the core; create dependency on the core provider roadmap and technical support; over featured--FPU (Floating Point Units), MMU (Memory Management Units]; etc.
Failing it will result in races--which are crippling or at least inefficient.
While other undesirable clocking artifacts sometimes can be eliminated by lowering the frequency, cooling the chip, exposing it to light, etc., races typically are much more difficult to resolve.
However if one or more members are packet processors or other modules having considerable processing tasks, the clock entering such modules often is delayed considerably when the clock is regenerated to drive the big compound.
However, as illustrated by FIG. 12, considerable ring latency may be introduced.
However, if member 120 is to pass data to member 122, the data must pass through four modules (i.e., four clock cycles), resulting in considerably more latency.
Another problem is peak latency.
A stray message usually is a result of a software bug.
Unchecked, stray messages may slowly choke the ring network, while such messages are difficult to detect and / or debug.
However, not every member of the ring is required to know about much less have the capability to detect or remove stray messages.
However it is unconditionally flip-floped at each ring member.
Write Ahead Mode--Read operations in a rings-based architecture typically is much more time consuming than write operations.
The delay of two-way trip from CPU to peripheral and back often is unacceptable.
As such, no matter how they are placed on a ring, one direction is bound to suffer.
Therefore, it may be unreasonable to add this amount of pins (twice) to implement the external ring interface.
However, Ethernet access does not solve the issue of how to deal with corporate voice.
This approach takes extra cycles.
This approach reduces the number of cycles, but complicates the interface to the memory (the Tricore CPU from Siemens uses this approach).
This approach has the disadvantage of limiting the number of tasks to the number of register files, and this is also a costly and limiting solution.
The large number of register files can also impact the frequency of operation due to fan-out limitations.
Tasks for which nothing has requested their service are dormant, and they will not be enabled for execution and will not run.
Also, when a DMA instruction is executed, and there is no place in the pending DMA transactions queue, it is possible that the network processor may be stalled.
The other performance issue is the time it takes to restore the registers of the new task.
Even in the case when there are no parameters passed, these registers do not preserve their value over any function call.
They can be used without saving in level1 functions, and they do not preserve their value over level1 function calls.
The alternative solution of not yielding while in the critical section is not efficient.
The alternative solution of having a dedicated task responsible for the resource, and thus serializing the actions performed on the resource, is in some cases complicated to implement and is in some cases inefficient.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Communications system using rings architecture
  • Communications system using rings architecture
  • Communications system using rings architecture

Examples

Experimental program
Comparison scheme
Effect test

example b

[0807] Example B--The network processor asks for read DMA access:

[0808] (1) The host has to initialize the DMA context table with all the channel configurations. This should be done at one time for all the possible configurations.

[0809] (2) The network processor issues a DMA command on the agent bus.

[0810] (3) The DMA agent registers the request in the request entries and extracts parameters.

[0811] (4) The DMA agent checks whether there is an available token from the DMA controller to start processing the request. If there is no token available, the processing is stalled until there will be an available token.

[0812] (5) Assuming there is an available token, the processing of the request begins. The DMA agent sends the DMA controller two messages which contain all the parameters of the transfer.

[0813] (6) When the transfer is finished, the DMA controller sends a message to the doorbell. The DMA controller can now send a new token to the DMA agent.

[0814] Software / Hardware restrictions...

example c

[0854] Example C--calculating CRC of receive data: The CRC machine can calculate the CRC of the receive data by snooping the S and L bits of the agent write bus messages. The network processor initializes the CRC agent as follows:(1) CRC type.

[0855] (2) A new residue if the current residue is to be overwritten. The data and the data size will be taken from the message data and type parts, respectively (the data of the agent bus is ignored in the snoop mode).

[0856] (3) The operational mode must be set to work in the snoop mode.

[0857] (4) One or two cycles after the last data has arrived at the CRC (depending on the number of valid bytes in the data, the CRC machine can calculate CRC on 32 bits in one cycle) the network processor can read the CRC result.

[0858] Timer Agent 526

[0859] Referring now to FIG. 57, an exemplary embodiment of the timer agent 526 is illustrated in accordance with one embodiment of the present invention. The timer module is designed to allow the assignment of ti...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Systems and methods are provided for implementing: a rings architecture for communications and data handling systems; an enumeration process for automatically configuring the ring topology; automatic routing of messages through bridges; extending a ring topology to external devices; write-ahead functionality to promote efficiency; wait-till-reset operation resumption; in-vivo scan through rings topology; staggered clocking arrangement; and stray message detection and eradication. Other inventive elements conveyed include: an architectural overview of a packet processor; a programming model for a packet processor; an instruction pipeline for a packet processor; and use of a packet processor as a module on a rings-based architecture. Additional inventive elements conveyed include: an architectural overview of a communications processor; a data path protocol support model for a communications processor; an exemplary network processor employed as the core packet processor for the communications processor; an exemplary rings-based SOC switch fabric architecture; and a variety of quality of support features.

Description

[0001] Priority is claimed based on U.S. Provisional Application No. 60 / 301,843 entitled Communication System Using Rings Architecture, filed Jul. 2, 2001, U.S. Provisional Application No. 60 / 333,516 entitled Flexible Packet Processor For Use in Communications System, filed Nov. 28, 2001, and U.S. Provisional Application No. 60 / 347,235 entitled High Performance Communications Processor Supporting Multiple Communications Applications, filed Jan. 14, 2002.[0002] The present invention relates generally to data communication networks and, more particularly, to receiving and transmitting systems, including ATM and other types of communications platforms and including such components as communications processors, packet processors, network processors, DMAs, FPGAs and other devices and peripheral devices.[0003] The number of business and private home users of computers continues to rapidly grow, with these users typically being connected to local area networks (LANs), wide area networks (W...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): G06F7/38G06F9/00G06F15/00G06F15/16G06F15/78H04L12/28H04L12/42H04L12/427H04L12/433H04L12/437H04L12/46H04L12/56H04L29/06
CPCG06F15/78Y02B60/1225H04L12/422H04L12/427H04L12/433H04L12/437H04L12/4625H04L12/4637H04L12/5601H04L45/04H04L45/18H04L45/22H04L45/302H04L45/306H04L45/50H04L49/102H04L49/1553H04L49/25H04L49/30H04L49/3063H04L49/3081H04L49/40H04L2012/5612H04L2012/5618H04L2012/5627H04L2012/5638H04L2012/5656H04L2012/5665H04W28/06H04W40/00H04W80/00H04W84/00H04L69/12G06F15/7825H04L12/42Y02D10/00
Inventor GREENBLAT, LLIA
Owner GLOBESPANVIRATA
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products