Patents
Literature
Patsnap Copilot is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Patsnap Copilot

105 results about "Token ring" patented technology

Token Ring local area network (LAN) technology is a communications protocol for local area networks. It uses a special three-byte frame called a "token" that travels around a logical "ring" of workstations or servers. This token passing is a channel access method providing fair access for all stations, and eliminating the collisions of contention-based access methods.

Inter-chip communication system

The complexity of user designs, the limited capacity of FPGA chips, and the limited number of chip pinouts have resulted in the development of inter-chip communication technology that necessitates the transfer of a large amount of data across a limited number of pins in the shortest amount of time. The inter-chip communication system transfers signals across FPGA chip boundaries only when these signals change values. Thus, no cycles are wasted and every event signal has a fair chance of achieving communication across chip boundaries. The inter-chip communication system includes a series of event detectors that detect changes in signal values and packet schedulers which can then schedule the transfer of these changed signal values to another designated chip. Working with a plurality of signal groups that represents signals at the separated connections, the event detector detects events (or changes in signal values). When an event has been detected, the event detector alerts the packet scheduler. The packet scheduler employs a token ring scheme as follows. When the packet scheduler receives a token and detects an event, the packet scheduler “grabs” the token and schedules the transmission of this packet in the next packet cycle. If, however, the packet scheduler receives the token but does not detect an event, it will pass the token to the next packet scheduler. At the end of each packet cycle, the packet scheduler that grabbed the token will pass the token to the next logic associated with another packet.
Owner:CADENCE DESIGN SYST INC

Inter-chip communication system

The complexity of user designs, the limited capacity of FPGA chips, and the limited number of chip pinouts have resulted in the development of inter-chip communication technology that necessitates the transfer of a large amount of data across a limited number of pins in the shortest amount of time. The inter-chip communication system transfers signals across FPGA chip boundaries only when these signals change values. Thus, no cycles are wasted and every event signal has a fair chance of achieving communication across chip boundaries. The inter-chip communication system includes a series of event detectors that detect changes in signal values and packet schedulers which can then schedule the transfer of these changed signal values to another designated chip. Working with a plurality of signal groups that represents signals at the separated connections, the event detector detects events (or changes in signal values). When an event has been detected, the event detector alerts the packet scheduler. The packet scheduler employs a token ring scheme as follows. When the packet scheduler receives a token and detects an event, the packet scheduler “grabs” the token and schedules the transmission of this packet in the next packet cycle. If, however, the packet scheduler receives the token but does not detect an event, it will pass the token to the next packet scheduler. At the end of each packet cycle, the packet scheduler that grabbed the token will pass the token to the next logic associated with another packet.
Owner:CADENCE DESIGN SYST INC

Real time control of hardware and software via communications network

A Hard Real Time Control Center (HRTCC), comprised of hardware, software and firmware, with time synchronisation and time delay compensation methodologies that allows Application Hardware and/or User Input Devices to be networked together on any communications network as if there were negligible network delays in the system, is disclosed. This will allow Application Hardware and/or User Input Devices (connected to an HRTCC at one location (node) on the network) to control or operate Application Hardware and/or User Input Devices connected to another HRTCC at a remote location without the detrimental effects of network time delays. The time synchronisation of the various HRTCCs on the network can be enabled using hardware (e.g. a global positioning system (GPS)) or any other software method (e.g. Network Time Protocol). Using time stamps from the time synchronisation, the time delay of the signals (data) transferred over the network can be determined. The main embodiment of the time delay compensation methodology is an estimator/predictor algorithm. The estimator generates signal information that allows the predictor, using the time delay, to project the signal information characteristics into the future by an amount equal to the time delay. If this predicted signal is used rather than the delayed signal, there will be no readily apparent time delay in the system thereby significantly improving the stability and performance of the associated application. Any software architecture can be used such as servant-client, token ring or peer to peer.
Owner:HANDSHAKE VR

Method for controlling data reading and writing of multi-channel solid-state disc

The invention discloses a method for controlling data reading and writing of a multi-channel solid-state disc, comprising the steps of: (1) building a mapping table to store a mapping relationship of a solid-state disc logic address and a physical address, (2) transmitting a data to be written of a host terminal to a buffer area of a channel controller through a DMA (Direct Memory Access), (3) selecting a channel of which a channel state is ready, (4) finding out a reading request in a chip state which is ready from a reading request queue of the channel of which the state is ready and serving the reading request, (5) finding out a writing request in the chip state which is ready from a writing request queue if the reading request queue is null, writing the data of the buffer area into a free page of the chip, and then modifying corresponding relationship between a corresponding logic address and a physical address in the mapping table so as to finish writing operation. According to the method disclosed by the invention, fast transfer of an interface data is realized, and parallel communication among the channels and serial pipeline operation inside the channels are also realized. Abrasions among all the chips of SSD (solid state disks) are also uniform due to mode adoption of a token ring.
Owner:HUAZHONG UNIV OF SCI & TECH

Method and system for securely authenticating network access credentials for users

A method is provided to securely authenticate user credentials. The method includes encrypting a user credential with a public key at an access device wherein the public key is part of a public / private key pair suitable for use with an encryption algorithm. The encrypted network user credential is transmitted from the access device to a decryption server where it is decrypted with a private key, the private key being part of the public / private key pair suitable for use with the encryption algorithm. The decrypted user credential is then transmitted from the decryption server to an authentication server for verification. The decryption server typically forms part of a multi-party service access environment including a plurality of access providers, the method including decrypting the user credential of a user proximate an access provider associated with the user credential. The method can be used in legacy protocols such as Point-to-Point protocol (PPP), Password Authentication Protocol (PAP), Challenge-Handshake Authentication Protocol (CHAP), Remote Authentication Dial In User Service (RADIUS) protocol, Terminal Access Controller Access Control System (TACACS) protocol, Lightweight Directory Access Protocol (LDAP), NT Domain authentication protocol, Unix password authentication protocol, HyperText Transfer Protocol (HTTP), HyperText Transfer Protocol over Secure sockets layer (HTTPS), Extended Authentication Protocol (EAP), Transport Layer Security (TLS) protocol, Token Ring protocol and / or Secure Remote Password protocol (SRP).
Owner:CHANNEL IP BV

Adaptive interface apparatus and method for data terminal elements in a communication network transmitting and receiving ethernet over a shielded twisted pair cabling system

An adaptive interface and method of operation facilitate connection of a work station in a Local Area Network (LAN) using Shielded Twisted Pair (STP) cabling to an Ethernet 10/100BASE TX installation using Unshielded Twisted Pair (UTP). The work station is coupled through the adaptive interface to the STP cabling system emulating a given number of meters of UTP cabling. The interface adapter comprises at one end a RJ 45 connector adapted for connection to the STP cabling and at the other end a MIC_S token ring connector coupled to an Ethernet adapter through the STP cabling system. The adaptive interface includes programmatically controlled filters interconnecting the RJ 45 and MIC_S connectors. The filter comprises a series of 1 . . . N switchable lumped passive element units which can be sequentially connected into the STP cabling to emulate the amplitude attenuation and phase shift of a preselected length of UTP 5 cabling, typically in the range of 20 meters. In operation, the Physical Layer (PHY) in the communication system enters a start up sequence for the various circuits and cabling in the layer. During the start up sequence, the adaptive interface is bypassed. After an appropriate delay to allow PHY convergence or a bit error rate measurement, the PHY transmit/receive signals are examined for bit errors by a test unit. If there are no bit errors, no filter element is inserted in the STP cabling by the adaptive interface and the work station is coupled to the Ethernet installation. If there are bit errors, a first filter element is switched into the STP cabling by the adaptive interface. The bit error signals are re-examined. If there are no errors, the workstation is connected to the Ethernet installation. If bit errors continue to exist, the next element(s) of the filter is inserted into the STP cabling until the "Nth" filter element is reached. If bit errors continue to exist on the STP cabling after inserting the Nth filter in the STP cabling, a re-try test sequence is initiated by the adaptive interface and the start up sequence is repeated. If re-try is not initiated, a transmit error is displayed and the workstation/Ethernet installation cannot proceed without modification. A diagnostics menu is displayed and a set-up process determines with human intervention what system changes are needed for the workstation/Ethernet connection.
Owner:IBM CORP

Method and apparatus for an automatic load balancing and back-up of a multi-users network

InactiveUS6421317B1Suppress limitation of LoadError preventionTransmission systemsStationTest frame
The invention aims to implement the Load Balancing/Backup function in a Multi-Users environment and to allow a remote station to have an alternate route through another Token Ring DLC to backup. By directing the connection to another route, it postpones the connection from a remote station to a Token Ring user through a first selected Token Ring DLC for a predetermined delay. For that purpose, each Token Ring DLC stores parameters of the remote station that has an unsuccessful connection in its own Connection Cache Table. In this way, when a Test frame is received in each DLC, this latter checks in the Connection Cache Table before responding to the Test frame. The Test frame is ignored and no Test response is sent back to the remote station when the remote station is identified in the table so as to allow the remote station to detect an alternate route with a backup DLC if it exists. Each Token Ring DLC manages its own Connection Cache table which contains an entry, a source MAC address and a Source SAP and a counter indicating the number of unsuccessful attempted Test frames received from that remote station. If the counter reaches a value N, then the entry corresponding to the remote station is removed from the table. Thus, the next time a Test frame is received from this remote station, it is accepted and a response is sent from the DLC. It gives a new opportunity to the remote station to establish a connection to the user in case this latter would become available again.
Owner:IBM CORP

Novel digital seismic detector based on computer network

The invention relates to a digital seismic detector based on a computer network, and is used for solving the problems of high cost, high power consumption and poor function of the traditional seismic detector. The digital seismic detector consists of a central control operating system, root nodes, main nodes, base stations, a power supply station used for supplying power to an acquisition chain, the acquisition chain, optical cables and a big-cable unit; the central control operating system is connected with the root nodes through a plurality of bonded gigabit lines; the root nodes are connected with the main nodes and other field ground equipment through a plurality of the optical cables; a plurality of the main nodes are connected through gigabit optical cables to form a backbone network; the main nodes are connected with the base stations through large line cables; the base stations are connected through 100M big cables to form a secondary backbone network; the base stations provide a plurality of special synchronous transmission interfaces for connecting the acquisition chain and the power supply station; the acquisition chain consists of a plurality of acquisition stations; and the base stations have the function of the power supply station and are used for supplying power to the acquisition chain. In the invention, the data transmission of the backbone network is completed by adopting gigabit optical fiber, the data transmission of the secondary backbone network is completed by adopting the 100M cables, and the real-time data transmission of the acquisition chain is realized by adopting a similar token ring. The digital seismic detector has the advantages of low cost, low power consumption, strong function and capability of realizing data transmission of a 100-thousand-grade digital seismic detector in a reliable mode.
Owner:INST OF GEOLOGY & GEOPHYSICS CHINESE ACAD OF SCI

Token exchange system with fault protection

According to one embodiment, a system for controlling passing of a token among a plurality of clients that access a shared resource includes at least one controller. The at least one controller is configured to cause the token to be passed to each of the plurality of clients when the system is in a first state, and to cause the token to be passed to fewer than all of the plurality of clients when the system is in a second state. According to another embodiment, a token-ring system includes a shared resource, at least first and second clients that access the shared resource, and error detection logic. The first client includes a primary device and a secondary device which provides bootstrap information to the primary device. The error detection is configured to directly monitor the secondary device for an anomaly in the operation thereof. According to yet another embodiment, a method is disclosed for operating a multi-port memory including at least first and second memory ports that access a shared memory. The first memory port includes a primary device and a secondary device which provides bootstrap information to the primary device. The method includes steps of: (a) permitting each of the first and second memory ports to access the memory when it is in possession of a token, and (b) continuously monitoring the secondary device for an anomaly in operation thereof.
Owner:EMC IP HLDG CO LLC

Distributed copies of configuration information using token ring

A system for synchronizing configuration information in a plurality of data processing devices using a common system interconnect bus. The present invention provides a method and apparatus for enforcing automatic updates to the configuration registers in various agents in the data processing system. The interface agent are not required to have target/response logic to respond to internal and external configuration accesses. In and embodiment of the present invention, a node controller, which may comprise a configuration block, is operably connected to a system interconnect bus and a switch. A plurality of interface agents are connected to the switch, with each of the interface agents comprising a configuration space register, a configuration space shadow register and a control and status register (CSR). A token ring connected to the node controller is operable to transmit data from the node controller to a plurality of interface agents connected to the token ring, thereby providing a system for updating the various configuration registers in each of the agents. A transaction from an interface agent is transferred to the node controller which transfers the transaction onto the system interconnect bus. The transaction on the system interconnected bus is detected by the configuration block of the node controller and is then transmitted on the token ring to each of the agents connected thereto. The information transmitted on the token ring is used to update the information in the configuration space registers and configuration space shadow registers of each of the agents connected to the token ring. In an embodiment of the invention the interface agents are configured in accordance with the Hypertransport protocol. In this embodiment, the configuration comprises a HT configuration space register and the configuration space shadow register comprise a HT configuration space shadow register.
Owner:AVAGO TECH WIRELESS IP SINGAPORE PTE
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products