throbber
MOST
`
`Media Oriented Systems Transport
`Multimedia and Control
`Networking Technology
`MOST Specification
`Rev 2.2
`11/2002
`Version 2.2-00
`
`
`
` 
`
` Copyright 1999 - 2002 MOST Cooperation
`
`Page 1 of 220
`
`Daimler Exhibit 1007
`
`

`

`
`
`
`
`MOST®
`
`Specification
`Legal Notice
`
`COPYRIGHT
`
`
` 
`
` Copyright 1999 - 2002 MOST Cooperation. All rights reserved.
`
`
`LICENSE DISCLAIMER
`
`Nothing on any MOST Cooperation Web Site, or in any MOST Cooperation document, shall be
`construed as conferring any license under any of the MOST Cooperation or its members or any third
`party's intellectual property rights, whether by estoppel, implication, or otherwise.
`
`CONTENT AND LIABILITY DISCLAIMER
`
`MOST Cooperation or its members shall not be responsible for any errors or omissions contained at
`any MOST Cooperation Web Site, or in any MOST Cooperation document, and reserves the right to
`make changes without notice. Accordingly, all MOST Cooperation and third party information is
`provided "AS IS". In addition, MOST Cooperation or its members are not responsible for the content of
`any other Web Site linked to any MOST Cooperation Web Site. Links are provided as Internet
`navigation tools only.
`
`MOST COOPERATION AND ITS MEMBERS DISCLAIM ALL WARRANTIES WITH REGARD TO
`THE INFORMATION (INCLUDING ANY SOFTWARE) PROVIDED, INCLUDING THE IMPLIED
`WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, AND
`NON-INFRINGEMENT. Some jurisdictions do not allow the exclusion of implied warranties, so the
`above exclusion may not apply to you.
`
`In no event shall MOST Cooperation or its members be liable for any damages whatsoever, and in
`particular MOST Cooperation or its members shall not be liable for special, indirect, consequential, or
`incidental damages, or damages for lost profits, loss of revenue, or loss of use, arising out of or
`related to any MOST Cooperation Web Site, any MOST Cooperation document, or the information
`contained in it, whether such damages arise in contract, negligence, tort, under statute, in equity, at
`law or otherwise.
`
`FEEDBACK INFORMATION
`
`Any information provided to MOST Cooperation in connection with any MOST Cooperation Web Site,
`or any MOST Cooperation document, shall be provided by the submitter and received by MOST
`Cooperation on a non-confidential basis. MOST Cooperation shall be free to use such information on
`an unrestricted basis.
`
`TRADEMARKS
`
`MOST Cooperation and its members prohibit the unauthorized use of any of their trademarks. MOST
`Cooperation specifically prohibits the use of the MOST Cooperation LOGO unless the use is approved
`by the Steering Committee of MOST Cooperation.
`
`SUPPORT AND FURTHER INFORMATION
`For more information on the MOST technology, please contact:
`
`
`
`
`
`MOST Cooperation
`
`
`
`
`
`Administration
`
`
`
`
`
`P. O. Box 4327
`
`
`
`
`
`D-76028 Karlsruhe
`
`
`
`
`
`Germany
`
`
`
`
`
`Tel: (+49) (0) 721 966 50 00
`
`
`
`
`
`Fax: (+49) (0) 721 966 50 01
`
`
`
`
`
`E-mail: contact@mostcooperation.com
`
`
`
`
`
`Web: www.mostcooperation.com
`
`
`Specification Document
`Page 2
`
` Copyright 1999 - 2002 MOST Cooperation
`
`MOST Specification Rev 2.2 11/2002
`Document Version 2.2-00
`
`
`
`
`Page 2 of 220
`
`

`

`MOST®
`
`Specification
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` Copyright 1999 - 2002 MOST Cooperation
`All rights reserved
`
`MOST is a registered trademark
`
`
`Specification Document
`
`
` Copyright 1999 - 2002 MOST Cooperation
`
`MOST Specification Rev 2.2 11/2002
`Document Version 2.2-00
`
`
`Page 3
`
`Page 3 of 220
`
`

`

`
`Contents
`
`
`
`MOST®
`
`Specification
`
` 1
`
`INTRODUCTION............................................................................................................................ 15
`
`2 APPLICATION SECTION.............................................................................................................. 17
`2.1 Overview of Data Channels........................................................................................................ 17
`2.1.1
`Control Channel................................................................................................................... 17
`2.1.2
`Synchronous Channel ......................................................................................................... 17
`2.1.3
`Asynchronous Channel ....................................................................................................... 18
`2.1.4 Managing Synch./Async. Bandwidth................................................................................... 18
`2.2
`Logical Device Model.................................................................................................................. 19
`2.2.1
`Function Block..................................................................................................................... 19
`2.2.1.1 Slave, Controller, HMI.....................................................................................................................20
`2.2.1.2 First Introduction to MOST Functions .............................................................................................20
`2.2.2
`Functions ............................................................................................................................. 21
`2.2.3 Methods............................................................................................................................... 21
`2.2.4
`Properties ............................................................................................................................ 22
`2.2.4.1 Setting a Property...........................................................................................................................22
`2.2.4.2 Reading a Property.........................................................................................................................23
`2.2.5
`Events.................................................................................................................................. 23
`2.2.6
`Function Interfaces.............................................................................................................. 24
`2.2.7
`Definition Example .............................................................................................................. 25
`2.2.8 MOST Data Flow Model ...................................................................................................... 27
`2.2.9 MOST System Services ...................................................................................................... 28
`2.2.10 Delegation, Heredity, Device Hierarchy .............................................................................. 28
`2.2.10.1
`Delegation...................................................................................................................................28
`2.2.10.2
`Heredity of Functions..................................................................................................................30
`2.2.10.3
`Deriving Devices/Device Hierarchy.............................................................................................31
`2.3 Protocols..................................................................................................................................... 34
`2.3.1
`Protocol Basics.................................................................................................................... 34
`2.3.2
`Structure of MOST Protocols .............................................................................................. 34
`2.3.2.1 DeviceID .........................................................................................................................................34
`2.3.2.2 FBlockID .........................................................................................................................................35
`2.3.2.3
`InstID ..............................................................................................................................................37
`2.3.2.4 FktID ...............................................................................................................................................38
`2.3.2.5 OPType ..........................................................................................................................................39
`2.3.2.5.1 Error.........................................................................................................................................40
`2.3.2.5.2 Start, Error ...............................................................................................................................45
`2.3.2.5.3 StartResult, Result, Processing, Error .....................................................................................45
`2.3.2.5.4 StartAck, StartResultAck, ProcessingAck, ResultAck, and ErrorAck .......................................47
`2.3.2.5.5 Get, Status, Error .....................................................................................................................47
`2.3.2.5.6 Set, Status, Error .....................................................................................................................47
`2.3.2.5.7 SetGet, Status, Error................................................................................................................47
`2.3.2.5.8 GetInterface, Interface, Error ...................................................................................................48
`2.3.2.5.9
`Increment And Decrement, Status, Error .................................................................................48
`2.3.2.5.10 Abort, Error ............................................................................................................................48
`2.3.2.5.11 AbortAck, ErrorAck ................................................................................................................48
`2.3.2.6 Length.............................................................................................................................................49
`2.3.2.7 Data And Basic Data Types............................................................................................................49
`2.3.2.7.1 Boolean....................................................................................................................................51
`2.3.2.7.2 BitField.....................................................................................................................................51
`2.3.2.7.3 Enum .......................................................................................................................................51
`2.3.2.7.4 Unsigned Byte..........................................................................................................................51
`2.3.2.7.5 Signed Byte..............................................................................................................................52
`2.3.2.7.6 Unsigned Word ........................................................................................................................52
`2.3.2.7.7 Signed Word ............................................................................................................................52
`2.3.2.7.8 Unsigned Long.........................................................................................................................52
`2.3.2.7.9 Signed Long.............................................................................................................................52
`2.3.2.7.10 String .....................................................................................................................................53
`2.3.2.7.11 Stream ...................................................................................................................................53
`2.3.2.7.12 Classified Stream...................................................................................................................54
`2.3.3
`Function Formats in Documentation ................................................................................... 55
`
`
`Specification Document
`Page 4
`
` Copyright 1999 - 2002 MOST Cooperation
`
`MOST Specification Rev 2.2 11/2002
`Document Version 2.2-00
`
`
`
`
`Page 4 of 220
`
`

`

`MOST®
`
`Specification
`
`
`
`
`Protocol Catalogs ................................................................................................................ 55
`2.3.4
`Application Functions on MOST Network (Introduction) ..................................................... 56
`2.3.5
`Controller/Slave Communication......................................................................................... 59
`2.3.6
`2.3.6.1 Communication With Properties Using Shadows............................................................................59
`2.3.6.2 Communication With Methods........................................................................................................64
`2.3.6.2.1 Standard Case .........................................................................................................................64
`2.3.6.2.2 Special Case Using Routing ....................................................................................................65
`2.3.7
`Seeking Communication Partner......................................................................................... 67
`2.3.8
`Requesting Function Block Information from a Device ....................................................... 67
`2.3.9
`Requesting Functions from a Function Block...................................................................... 68
`2.3.10 Transmitting The Function Interface.................................................................................... 69
`2.3.10.1
`Principle......................................................................................................................................69
`2.3.10.2
`Realization Of The Ability To Extract The Function Interface .....................................................69
`2.3.11 Function Classes................................................................................................................. 70
`2.3.11.1
`Properties With A Single Variable...............................................................................................70
`2.3.11.1.1 Function Class Switch............................................................................................................73
`2.3.11.1.2 Function Class Number .........................................................................................................74
`2.3.11.1.3 Function Class Text ...............................................................................................................76
`2.3.11.1.4 Function Class Enumeration..................................................................................................77
`2.3.11.1.5 Function Class BoolField .......................................................................................................78
`2.3.11.1.6 Function Class BitSet.............................................................................................................79
`2.3.11.1.7 Function Class Container.......................................................................................................81
`2.3.11.2
`Properties with Multiple Variables...............................................................................................82
`2.3.11.2.1 Function Class Record...........................................................................................................83
`2.3.11.2.2 Function Class Array..............................................................................................................85
`2.3.11.2.3 Function Class Dynamic Array...............................................................................................88
`2.3.11.2.4 Function Class LongArray......................................................................................................90
`2.3.11.3
`Function Class For Methods.......................................................................................................97
`2.3.12 Handling Message Notification............................................................................................ 98
`3 NETWORK SECTION.................................................................................................................. 101
`3.1 MOST Transceiver and its Internal Services............................................................................ 101
`3.1.1
`Electrical Bypass (All Bypass)........................................................................................... 101
`3.1.2
`Source Data Bypass.......................................................................................................... 101
`3.1.3 Master/Slave, Active and Passive Components ............................................................... 101
`3.1.4
`Data Transport................................................................................................................... 102
`3.1.4.1 Blocks ...........................................................................................................................................102
`3.1.4.2 Frames .........................................................................................................................................102
`3.1.4.2.1 Preamble................................................................................................................................104
`3.1.4.2.2 Boundary Descriptor ..............................................................................................................104
`3.1.4.2.3 MOST System Control Bits ....................................................................................................104
`3.1.4.3 Source Data..................................................................................................................................105
`3.1.4.3.1 Definition of Control Data and Source Data ...........................................................................105
`3.1.4.3.2 Differentiating Synchronous and Asynchronous Data............................................................105
`3.1.4.3.3 Source Data Interface ............................................................................................................105
`3.1.4.3.4 Transparent Channels ...........................................................................................................105
`3.1.4.3.5 Synchronous Area .................................................................................................................106
`3.1.4.3.6 Asynchronous (Packet Data) Area.........................................................................................106
`3.1.4.4 Control Data..................................................................................................................................108
`3.1.4.4.1 Control Data Interface............................................................................................................108
`3.1.4.4.2 Description.............................................................................................................................108
`3.1.5
`Internal Services................................................................................................................ 110
`3.1.5.1 Addressing....................................................................................................................................110
`3.1.5.2 Address Initialization (SAI)............................................................................................................110
`3.1.5.3 Support at System Startup............................................................................................................111
`3.1.5.4 Delay Recognition.........................................................................................................................111
`3.1.5.5 Remote-Access ............................................................................................................................111
`3.1.5.6 Automatic Channel Allocation.......................................................................................................111
`3.1.5.7 Power Management......................................................................................................................112
`3.1.5.8 Detection of Unused Channels .....................................................................................................112
`3.2 Dynamic Behavior of a Device ................................................................................................. 113
`3.2.1 Overview............................................................................................................................ 113
`3.2.2
`NetInterface....................................................................................................................... 115
`3.2.2.1 NetInterfacePowerOff ...................................................................................................................116
`
`
`Specification Document
`
`
` Copyright 1999 - 2002 MOST Cooperation
`
`MOST Specification Rev 2.2 11/2002
`Document Version 2.2-00
`
`
`Page 5
`
`Page 5 of 220
`
`

`

`MOST®
`
`Specification
`
`
`
`3.2.2.2 NetInterfaceInit .............................................................................................................................116
`3.2.2.3 NetInterfaceNormalOperation.......................................................................................................120
`3.2.2.4 NetInterface Ring Break Diagnosis...............................................................................................123
`3.2.3
`Initialization on Application Level ...................................................................................... 129
`3.2.3.1 Configuration Status Events .........................................................................................................129
`3.2.3.1.1 Configuration.Status(OK).......................................................................................................129
`3.2.3.1.2 Configuration.Status(NotOK) .................................................................................................129
`3.2.3.1.3 Configuration.Status(Invalid) and Configuration.Status(New)................................................130
`3.2.3.2 Requesting System Configuration – NetworkMaster ....................................................................131
`3.2.3.3 Requesting System Configuration – Network Slave .....................................................................137
`3.2.4
`Secondary Nodes.............................................................................................................. 139
`3.2.5
`Power Management .......................................................................................................... 140
`3.2.5.1 General Procedure .......................................................................................................................140
`3.2.5.2 Functions and Important Operations.............................................................................................143
`3.2.6
`Error Management ............................................................................................................ 144
`3.2.6.1 Handling of Light Off .....................................................................................................................144
`3.2.6.2 Fatal Error.....................................................................................................................................145
`3.2.6.2.1 Waking...................................................................................................................................145
`3.2.6.2.2 Operation ...............................................................................................................................145
`3.2.6.3 Unlock...........................................................................................................................................146
`3.2.6.4 Failure Of A Function Block ..........................................................................................................147
`3.2.6.5 Network Change Event.................................................................................................................148
`3.2.6.6 Low Voltage..................................................................................................................................148
`3.2.6.7
`“Hanging” of an Application ..........................................................................................................149
`3.2.7 Over-Temperature Management....................................................................................... 150
`3.2.7.1
`Introduction...................................................................................................................................150
`3.2.7.2 Levels of Temperature Alert .........................................................................................................150
`3.2.7.3 Re-Start Behavior .........................................................................................................................151
`3.3 Accessing Control Channel ...................................................................................................... 152
`3.3.1
`Addressing......................................................................................................................... 152
`3.3.2
`Assigning Priority Levels ................................................................................................... 154
`3.3.3
`Low Level Retries.............................................................................................................. 154
`3.3.4
`High Level Retries ............................................................................................................. 154
`3.3.5 MOST NetServices (Application Socket) .......................................................................... 155
`3.3.5.1 Basics for Automatic Adding of Physical Address.........................................................................155
`3.3.5.2 De-Central Registry ......................................................................................................................155
`3.3.5.3 Central Registry ............................................................................................................................156
`3.3.6
`Handling Overload in a Message Sink .............................................................................. 159
`3.3.7 MOST NetServices (Basic Layer) ..................................................................................... 160
`3.3.7.1 Control Message Service..............................................................................................................160
`3.3.7.2 Application Message Service (AMS) And Application Protocols...................................................160
`3.3.8
`Direct Access to OS8104 .................................................................................................. 162
`3.3.8.1 Sending Messages .......................................................................................................................162
`3.3.8.2 Receiving Messages.....................................................................................................................163
`3.3.8.3 Acknowledgement and Data Security ...........................................................................................163
`3.3.9
`Remote Control ................................................................................................................. 164
`3.3.9.1 Remote Read Message ................................................................................................................164
`3.3.9.2 Remote Write Message ................................................................................................................165
`3.4 Handling Synchronous Data..................................................................................................... 166
`3.4.1 MOST NetServices (Application Socket) .......................................................................... 166
`3.4.1.1 Basic Functions on Application Level ...........................................................................................167
`3.4.1.1.1 NetBlock.................................................................................................................................167
`3.4.1.1.2 Function Block .......................................................................................................................168
`3.4.1.1.3 Handling of Double (De)/Allocate/(Dis)Connect Commands..................................................174
`3.4.2 MOST NetServices (Basic Layer) ..................................................................................... 175
`3.4.3
`Direct Access to OS8104 .................................................................................................. 175
`3.4.3.1 Serial Interface..............................................................................................................................175
`3.4.3.2 Parallel Interface...........................................................................................................................175
`3.4.3.3 Compensating Network Delay ......................................................................................................175
`3.5 Handling Asynchronous (Packet) Data..................................................................................... 176
`3.5.1
`Direct Access to OS8104 .................................................................................................. 176
`3.5.1.1 Priorities........................................................................................................................................176
`3.5.2 MOST NetServices............................................................................................................ 177
`3.5.2.1 Securing data................................................................................................................................177
`
`
`Specification Document
`Page 6
`
` Copyright 1999 - 2002 MOST Cooperation
`
`MOST Specification Rev 2.2 11/2002
`Document Version 2.2-00
`
`
`
`
`Page 6 of 220
`
`

`

`MOST®
`
`Specification
`
`
`
`
`3.5.3 MOST Asynchronous Medium Access Control (MAMAC) ................................................ 179
`3.6 Controlling Synchronous/Asynchronous Bandwidth................................................................. 180
`3.7 Connections.............................................................................................................................. 181
`3.7.1
`Synchronous Connections ................................................................................................ 181
`3.7.1.1 Administering (ConnectionMaster)................................................................................................181
`3.7.1.2 Establishing Synchronous Connections........................................................................................183
`3.7.1.3 Removing Synchronous Connections...........................................................................................185
`3.7.1.4 Supervising Synchronous Connections ........................................................................................185
`3.8
`Timeouts ................................................................................................................................... 186
`3.9 Secondary Node....................................................................................................................... 188
`3.9.1
`Scenario 1 ......................................................................................................................... 188
`3.9.2
`Scenario 2 ......................................................................................................................... 189
`4 HARDWARE SECTION............................................................................................................... 190
`4.1 Basic HW Concept.............................................................................................................

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket