throbber
www.archive.org
`415.561.6767
`415.840-0391 e-fax
`
`Internet Archive
`300 Funston Avenue
`San Francisco, CA 94118
`
`AFFIDAVIT OF CHRISTOPHER BUTLER
`
`| am the Office Manageratthe Internet Archive, located in San Francisco,
`1.
`California. I makethis declaration of my ownpersonal knowledge.
`2. The Internet Archive is a website that provides accessto a digital library of
`Internetsites and other cultural artifacts in digital form. Like a paperlibrary, we provide
`free access to researchers, historians, scholars, and the general public. The Internet
`Archive haspartnered with and receives support from variousinstitutions, including the
`Library of Congress.
`3. The Internet Archive hascreated a service known asthe Wayback Machine. The
`Wayback Machine makesit possible to surf more than 450billion pagesstored in the
`Internet Archive's webarchive. Visitors to the Wayback Machinecansearch archives
`by URL(i.e., a website address). If archived records for a URL are available, the visitor
`will be presented with a list of available dates. The visitor mayselect one of those
`dates, and then begin surfing on an archived version of the Web. Thelinks on the
`archivedfiles, when served by the Wayback Machine, point to other archived files
`(whether HTMLpagesor images). If a visitor clicks on a link on an archived page, the
`Wayback Machinewill serve the archived file with the closest available date to the page
`upon whichthe link appeared and wasclicked.
`4. The archived data made viewable and browseable by the Wayback Machineis
`compiled using software programs known ascrawlers, which surf the Web and
`automatically store copies of webfiles, preserving thesefiles as they exist at the point of
`time ofcapture.
`5. The Internet Archive assigns a URLonitssite to the archivedfiles in the format
`http://web.archive.org/web/[Year in yyyy][Month in mm][Dayin dd][Time codein
`hh:mmi:ss]/[Archived URL]. Thus, the Internet Archive URL
`http://web.archive.org/web/1 9970126045828/http://www.archive.org/ would be the
`URLfor the record of the Internet Archive home page HTML file
`(http://www.archive.org/) archived on January 26, 1997 at 4:58 a.m. and 28 seconds
`(1997/01/26 at 04:58:28). A web browser maybeset such that a printout from it will
`display the URL ofa web pagein theprintout’s footer. The date assigned bythe Internet
`Archive applies to the HTMLfile but not to imagefiles linked therein. Thus imagesthat
`appear on a page may not have been archived on the same date as the HTML file.
`Likewise, if a website is designed with "frames," the date assigned by the Internet
`Archive applies to the frameset as a whole, and not the individual pages within each
`frame.
`6. Attached hereto as “Exhibit A” are true and accurate copies of printouts of the
`Internet Archive's records of the HTML files for the URLsandthe dates specified in the
`footer ofthe printout.
`7. Attached heretoin the electronicfile folders named “Exhibit B” and “Exhibit C”
`are true and accurate copies of the Internet Archive's records of the PDF files for the
`respective URLsandthe dates indicated in the extended URLs below:
`
`Exhibit B:
`https://web.archive.org/web/20030621022622/http://www.mostcooperatio
`n.com:80/downloads/Specifications/MOSTSpecification_2V2-00.pdf
`
`
`
`Page 1 of 291
`
`Daimler Exhibit 1010
`
`Page 1 of 291
`
`Daimler Exhibit 1010
`
`

`

`
`
`Exhibit C:
`https://web.archive.org/web/200308051201 22/http://www.mostcooperatio
`n.com:80/downloads/Specifications/MOST%20Framework/framework 11
`-07.pdf
`
`8. | declare under penalty ofperj ury that the foregoingis true and correct,
`
`fe
`ha
`DATE:_! /(%/(
`
`O
`| G
`be
`Christopher Butler
`
`
`
`Page 2 of 291
`
`Page 2 of 291
`
`

`

`CALIFORNIA JURAT
`
`See Attached Document.
`
`State of California
`County of San Francisco
`
`A notary public or other officer completing this
`certificate verifies only the identity ofthe
`individual who signed the documentto whichthis
`certificate is attached, and not the truthfulness,
`
`accuracy, or validity of that document.
`
`Subscribed and sworn to (or affirmed) before me on
`this
`
`i Cp| 4 4
`
`day of ‘se 0
`
`Christopher Butler,
`
`, ColS_, by
`
`proved to me onthe basis of satisfactory evidenceto be
`the person who appeared before me.
`ine”
`L
`>
`
`“>
`
`Signature:
`
`
`
` LAUREL KARR
`
`Notary Public - California
`
`
`San Francisco County
`
`
`Commission # 2172222
`
`Comm. Expires Nov 17, 2020
`
`
`z2 =
`
`
`
`Page 3 of 291
`
`Page 3 of 291
`
`

`

`
`
`
`
`
`
`Page 4 of 291
`
`Exhibit A
`Exhibit A
`
`Page 4 of 291
`
`

`

`MOST Cooperation: Downloads
`
`1 of 1
`
`Downloads II> Specifications II> MOST Framework
`
`Home
`Cooperation
`Technology
`Membership
`Electronic Brochure
`Downloads
`News & Events
`Contact
`
`MOST Framework
`The objective of the entire specification is to describe the MOST system in terms of physical
`layer, transport layer, link layer, network management and the programming interface required
`to develop and build systems and devices that are compliant with this standard. The goal is to
`provide all information needed to make inter-operable devices in an open architecture but still
`leaving enough room for product and market differentiation without losing compatibility.
`
`The specification framework is mainly targeted to all those readers, who want to get an
`introductory overview of the MOST System and its abilities. It provides valuable information to
`device developers, OEM's and System integrators, but also to independent hardware and
`software platform architects. The overview can be used for system evaluation, product and
`system planning.
`
`Name
`
`Type
`
`framework1_1-07.pdf
`
`Adobe PDF
`
`Version Date
`10/12/2001
`12:29:17
`
`1.1
`
`Size
`
`663.5kB
`
`MOST Specifcation Framework Rev 1.1 in PDF
`Status: November 26, 1999
`
`© 2003 MOST Cooperation. All Rights Reserved. ® MOST and the MOST Logo are Registered
`Trademarks. Disclaimer, Feedback
`
`https://web.archive.org/web/20030805040720/http://www.mostcooperation.com:80/downloads/Specifications/MOST Framework/
`
`Page 5 of 291
`
`

`

`MOST Cooperation: Downloads
`
`1 of 2
`
`Downloads II> Specifications
`
`Home
`Cooperation
`Technology
`Membership
`Electronic Brochure
`Downloads
`News & Events
`Contact
`
`Specifications
`Please read the legal notice:
`
`COPYRIGHT
`
`Copyright MOST Cooperation 1997-2001. All Rights Reserved.
`
`LICENSE DISCLAIMER
`
`Nothing on any MOST Cooperation Web Site shall be construed as conferring any license under any of the
`MOST Cooperation or its members or any third party's intellectual property rights, whether by estoppel,
`implication, or otherwise.
`
`CONTENT AND LIABILITY DISCLAIMER
`
`MOST Cooperation or its members shall not be responsible for any errors or omissions contained at this Web
`Site, and reserves the right to make changes without notice. Accordingly, all MOST Cooperation and third party
`information is provided "AS IS". In addition, MOST Cooperation or its members are not responsible for the
`content of any other Web Site linked to any MOST Cooperation Web Site. Links are provided as Internet
`navigation tools only.
`
`MOST COOPERATION AND ITS MEMBERS DISCLAIM ALL WARRANTIES WITH REGARD TO THE
`INFORMATION (INCLUDING ANY SOFTWARE) PROVIDED, INCLUDING THE IMPLIED WARRANTIES OF
`MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, AND NON-INFRINGEMENT. Some
`jurisdictions do not allow the exclusion of implied warranties, so the above exclusion may not apply to you.
`
`In no event shall MOST Cooperation or its members be liable for any damages whatsoever, and in particular
`MOST Cooperation or its members shall not be liable for special, indirect, consequential, or incidental damages,
`or damages for lost profits, loss of revenue, or loss of use, arising out of or related to any MOST Cooperation
`Web Site or the information contained in it, whether such damages arise in contract, negligence, tort, under
`statute, in equity, at law or otherwise.
`
`FEEDBACK INFORMATION
`
`Any information provided to MOST Cooperation in connection with any MOST Cooperation Web Site shall be
`provided by the submitter and received by MOST Cooperation on a non-confidential basis. MOST Cooperation
`shall be free to use such information on an unrestricted basis.
`
`TRADEMARKS
`
`MOST Cooperation and its members prohibit the unauthorized use of any of their trademarks. MOST
`Cooperation specifically prohibits the use of the MOST Cooperation LOGO unless the use is approved by the
`Steering Committee of MOST Cooperation.
`
`Name
`
`MOST Framework
`
`MOST SpecificationFramework
`
`MOST Function Catalog
`
`MOST Physical Layer Specification
`
`MOST Physical Layer Specification plus related drawings
`
`Type
`
`Version Date
`
`Size
`
`Directory
`
`Directory
`
`Directory
`
`https://web.archive.org/web/20030805041037/http://www.mostcooperation.com:80/downloads/Specifications/
`
`Page 6 of 291
`
`

`

`MOST Cooperation: Downloads
`
`2 of 2
`
`MAMACSpecification_1V0-00.pdf
`
`11/05/2002
`Adobe
`09:22:31
`PDF
`MOST Asynchronous Medium Access Control (MAMAC). Specification to be able to run commonly used
`network protocols like TCP/IP (including IPX, NetBEUI and ARP) through the Asynchronous (Packet Data)
`channel of MOST. MAMAC can be used simultaneously with MOST High Protocol.
`
`1.0
`
`305.3kB
`
`MOSTHighProtocolSpec_2V1_Doc_2V1-01.pdf
`
`MOST High Protocol Specification Rev. 2.1
`
`Adobe
`PDF
`
`2.1
`
`10/12/2001
`12:48:32
`
`746.8kB
`
`MOSTSpecification_2V2-00.pdf
`
`11/11/2002
`Adobe
`08:44:11
`PDF
`MOST Specification Rev 2.2 in PDF (1,3 MB):The MOST Specification (Revision 2.2) contains the detailed
`specification of the application layer, the network layer, and the MOST hardware.
`Status: November 2002
`
`2.2
`
`1.3MB
`
`MOSTSpecification_Japanese_2V2-00.pdf
`
`05/19/2003
`Adobe
`12:15:58
`PDF
`JAPANESE version of MOST Specification Rev 2.2 in PDF (1,7 MB):The MOST Specification (Revision 2.2)
`contains the detailed specification of the application layer, the network layer, and the MOST hardware.
`Status of Specification: November 2002
`Translated: May 2003
`
`2.2
`
`1.7MB
`
`MOST_ContentProtectionScheme_DTCP_1V0-00.pdf Adobe
`PDF
`
`MOST_ContentSecurity_1V0_00.pdf
`
`MOST Content Security Specification Rev. 1.0
`
`Adobe
`PDF
`
`1.0
`
`1.0
`
`10/12/2001
`12:55:00
`
`514.2kB
`
`10/12/2001
`12:52:56
`
`449.2kB
`
`© 2003 MOST Cooperation. All Rights Reserved. ® MOST and the MOST Logo are Registered Trademarks. Disclaimer,
`Feedback
`
`https://web.archive.org/web/20030805041037/http://www.mostcooperation.com:80/downloads/Specifications/
`
`Page 7 of 291
`
`

`

`MOST Cooperation: Downloads
`
`1 of 1
`
`Downloads
`
`Home
`Cooperation
`Technology
`Membership
`Electronic Brochure
`Downloads
`News & Events
`Contact
`
`Name
`
`Type
`
`Version
`
`Date Size
`
`MOST Organizational Procedures
`
`Directory
`
`MOST Organizational Procedures
`
`Specifications
`
`Public MOST Specifications
`
`Directory
`
`© 2003 MOST Cooperation. All Rights Reserved. ® MOST and the MOST Logo are Registered
`Trademarks. Disclaimer, Feedback
`
`https://web.archive.org/web/20030810031447/http://mostcooperation.com:80/downloads/
`
`Page 8 of 291
`
`

`

`MOST Cooperation: Welcome to the MOST Cooperation
`
`1 of 1
`
`Home
`
`Home
`Cooperation
`Technology
`Membership
`Electronic Brochure
`Downloads
`News & Events
`Contact
`
`MOST Intranet
`
`Login:
`
`Password:
`
`Team up with MOST.
`Get all.
`
`The MOST Cooperation's
`philosophy is openness
`to any company and a
`fast progression of
`definitions.
`
`How to become a
`member:
`
`Search site for:
`
`Through the MOST Cooperation, all members combine their expertise and
`ambitious efforts to establish and refine a common standard for today and
`tomorrow's needs of automotive multimedia networking.
`
`The concept for the MOST Cooperation began as an informal cooperative
`effort in 1997.
`
`Since the Cooperation was founded in 1998, 20 international carmakers
`and more than 50 key component suppliers are now working with the
`MOST Technology and contributing towards its innovation.
`
`The MOST Cooperation's membership is continously growing due to its
`philosophy of openness to any company. The Cooperation invites and
`welcomes other companies to become Associated Partners to contribute
`their efforts to the development and enhancement of the MOST
`Technology.
`
`© 2003 MOST Cooperation. All Rights Reserved. ® MOST and the MOST Logo are Registered Trademarks. Disclaimer,
`Feedback
`
`https://web.archive.org/web/20030718172540/http://www.mostcooperation.com:80/
`
`Page 9 of 291
`
`

`

`
`
`Exhibit B
`Exhibit B
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`Page 10 of 291
`
`Page 10 of 291
`
`

`

`MOST
`
`Media Oriented Systems Transport
`Multimedia and Control
`Networking Technology
`MOST Specification
`Rev 2.2
`11/2002
`Version 2.2-00
`
`
`
` 
`
` Copyright 1999 - 2002 MOST Cooperation
`
`Page 11 of 291
`
`

`

`
`
`
`
`MOST®
`
`Specification
`Legal Notice
`
`COPYRIGHT
`
`
` 
`
` Copyright 1999 - 2002 MOST Cooperation. All rights reserved.
`
`
`LICENSE DISCLAIMER
`
`Nothing on any MOST Cooperation Web Site, or in any MOST Cooperation document, shall be
`construed as conferring any license under any of the MOST Cooperation or its members or any third
`party's intellectual property rights, whether by estoppel, implication, or otherwise.
`
`CONTENT AND LIABILITY DISCLAIMER
`
`MOST Cooperation or its members shall not be responsible for any errors or omissions contained at
`any MOST Cooperation Web Site, or in any MOST Cooperation document, and reserves the right to
`make changes without notice. Accordingly, all MOST Cooperation and third party information is
`provided "AS IS". In addition, MOST Cooperation or its members are not responsible for the content of
`any other Web Site linked to any MOST Cooperation Web Site. Links are provided as Internet
`navigation tools only.
`
`MOST COOPERATION AND ITS MEMBERS DISCLAIM ALL WARRANTIES WITH REGARD TO
`THE INFORMATION (INCLUDING ANY SOFTWARE) PROVIDED, INCLUDING THE IMPLIED
`WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE, AND
`NON-INFRINGEMENT. Some jurisdictions do not allow the exclusion of implied warranties, so the
`above exclusion may not apply to you.
`
`In no event shall MOST Cooperation or its members be liable for any damages whatsoever, and in
`particular MOST Cooperation or its members shall not be liable for special, indirect, consequential, or
`incidental damages, or damages for lost profits, loss of revenue, or loss of use, arising out of or
`related to any MOST Cooperation Web Site, any MOST Cooperation document, or the information
`contained in it, whether such damages arise in contract, negligence, tort, under statute, in equity, at
`law or otherwise.
`
`FEEDBACK INFORMATION
`
`Any information provided to MOST Cooperation in connection with any MOST Cooperation Web Site,
`or any MOST Cooperation document, shall be provided by the submitter and received by MOST
`Cooperation on a non-confidential basis. MOST Cooperation shall be free to use such information on
`an unrestricted basis.
`
`TRADEMARKS
`
`MOST Cooperation and its members prohibit the unauthorized use of any of their trademarks. MOST
`Cooperation specifically prohibits the use of the MOST Cooperation LOGO unless the use is approved
`by the Steering Committee of MOST Cooperation.
`
`SUPPORT AND FURTHER INFORMATION
`For more information on the MOST technology, please contact:
`
`
`
`
`
`MOST Cooperation
`
`
`
`
`
`Administration
`
`
`
`
`
`P. O. Box 4327
`
`
`
`
`
`D-76028 Karlsruhe
`
`
`
`
`
`Germany
`
`
`
`
`
`Tel: (+49) (0) 721 966 50 00
`
`
`
`
`
`Fax: (+49) (0) 721 966 50 01
`
`
`
`
`
`E-mail: contact@mostcooperation.com
`
`
`
`
`
`Web: www.mostcooperation.com
`
`
`Specification Document
`Page 2
`
` Copyright 1999 - 2002 MOST Cooperation
`
`MOST Specification Rev 2.2 11/2002
`Document Version 2.2-00
`
`
`
`
`Page 12 of 291
`
`

`

`MOST®
`
`Specification
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
`
` Copyright 1999 - 2002 MOST Cooperation
`All rights reserved
`
`MOST is a registered trademark
`
`
`Specification Document
`
`
` Copyright 1999 - 2002 MOST Cooperation
`
`MOST Specification Rev 2.2 11/2002
`Document Version 2.2-00
`
`
`Page 3
`
`Page 13 of 291
`
`

`

`
`Contents
`
`
`
`MOST®
`
`Specification
`
` 1
`
`INTRODUCTION............................................................................................................................ 15
`
`2 APPLICATION SECTION.............................................................................................................. 17
`2.1 Overview of Data Channels........................................................................................................ 17
`2.1.1
`Control Channel................................................................................................................... 17
`2.1.2
`Synchronous Channel ......................................................................................................... 17
`2.1.3
`Asynchronous Channel ....................................................................................................... 18
`2.1.4 Managing Synch./Async. Bandwidth................................................................................... 18
`2.2
`Logical Device Model.................................................................................................................. 19
`2.2.1
`Function Block..................................................................................................................... 19
`2.2.1.1 Slave, Controller, HMI.....................................................................................................................20
`2.2.1.2 First Introduction to MOST Functions .............................................................................................20
`2.2.2
`Functions............................................................................................................................. 21
`2.2.3 Methods............................................................................................................................... 21
`2.2.4
`Properties ............................................................................................................................ 22
`2.2.4.1 Setting a Property...........................................................................................................................22
`2.2.4.2 Reading a Property.........................................................................................................................23
`2.2.5
`Events.................................................................................................................................. 23
`2.2.6
`Function Interfaces.............................................................................................................. 24
`2.2.7
`Definition Example .............................................................................................................. 25
`2.2.8 MOST Data Flow Model ...................................................................................................... 27
`2.2.9 MOST System Services ...................................................................................................... 28
`2.2.10 Delegation, Heredity, Device Hierarchy .............................................................................. 28
`2.2.10.1
`Delegation...................................................................................................................................28
`2.2.10.2
`Heredity of Functions..................................................................................................................30
`2.2.10.3
`Deriving Devices/Device Hierarchy.............................................................................................31
`2.3 Protocols..................................................................................................................................... 34
`2.3.1
`Protocol Basics.................................................................................................................... 34
`2.3.2
`Structure of MOST Protocols .............................................................................................. 34
`2.3.2.1 DeviceID .........................................................................................................................................34
`2.3.2.2 FBlockID .........................................................................................................................................35
`2.3.2.3
`InstID ..............................................................................................................................................37
`2.3.2.4 FktID ...............................................................................................................................................38
`2.3.2.5 OPType ..........................................................................................................................................39
`2.3.2.5.1 Error.........................................................................................................................................40
`2.3.2.5.2 Start, Error ...............................................................................................................................45
`2.3.2.5.3 StartResult, Result, Processing, Error .....................................................................................45
`2.3.2.5.4 StartAck, StartResultAck, ProcessingAck, ResultAck, and ErrorAck .......................................47
`2.3.2.5.5 Get, Status, Error .....................................................................................................................47
`2.3.2.5.6 Set, Status, Error .....................................................................................................................47
`2.3.2.5.7 SetGet, Status, Error................................................................................................................47
`2.3.2.5.8 GetInterface, Interface, Error ...................................................................................................48
`2.3.2.5.9
`Increment And Decrement, Status, Error .................................................................................48
`2.3.2.5.10 Abort, Error ............................................................................................................................48
`2.3.2.5.11 AbortAck, ErrorAck ................................................................................................................48
`2.3.2.6 Length.............................................................................................................................................49
`2.3.2.7 Data And Basic Data Types............................................................................................................49
`2.3.2.7.1 Boolean....................................................................................................................................51
`2.3.2.7.2 BitField.....................................................................................................................................51
`2.3.2.7.3 Enum .......................................................................................................................................51
`2.3.2.7.4 Unsigned Byte..........................................................................................................................51
`2.3.2.7.5 Signed Byte..............................................................................................................................52
`2.3.2.7.6 Unsigned Word ........................................................................................................................52
`2.3.2.7.7 Signed Word ............................................................................................................................52
`2.3.2.7.8 Unsigned Long.........................................................................................................................52
`2.3.2.7.9 Signed Long.............................................................................................................................52
`2.3.2.7.10 String .....................................................................................................................................53
`2.3.2.7.11 Stream ...................................................................................................................................53
`2.3.2.7.12 Classified Stream...................................................................................................................54
`2.3.3
`Function Formats in Documentation ................................................................................... 55
`
`
`Specification Document
`Page 4
`
` Copyright 1999 - 2002 MOST Cooperation
`
`MOST Specification Rev 2.2 11/2002
`Document Version 2.2-00
`
`
`
`
`Page 14 of 291
`
`

`

`MOST®
`
`Specification
`
`
`
`
`Protocol Catalogs ................................................................................................................ 55
`2.3.4
`Application Functions on MOST Network (Introduction) ..................................................... 56
`2.3.5
`Controller/Slave Communication......................................................................................... 59
`2.3.6
`2.3.6.1 Communication With Properties Using Shadows............................................................................59
`2.3.6.2 Communication With Methods........................................................................................................64
`2.3.6.2.1 Standard Case .........................................................................................................................64
`2.3.6.2.2 Special Case Using Routing ....................................................................................................65
`2.3.7
`Seeking Communication Partner......................................................................................... 67
`2.3.8
`Requesting Function Block Information from a Device ....................................................... 67
`2.3.9
`Requesting Functions from a Function Block...................................................................... 68
`2.3.10 Transmitting The Function Interface.................................................................................... 69
`2.3.10.1
`Principle......................................................................................................................................69
`2.3.10.2
`Realization Of The Ability To Extract The Function Interface .....................................................69
`2.3.11 Function Classes................................................................................................................. 70
`2.3.11.1
`Properties With A Single Variable...............................................................................................70
`2.3.11.1.1 Function Class Switch............................................................................................................73
`2.3.11.1.2 Function Class Number .........................................................................................................74
`2.3.11.1.3 Function Class Text ...............................................................................................................76
`2.3.11.1.4 Function Class Enumeration..................................................................................................77
`2.3.11.1.5 Function Class BoolField .......................................................................................................78
`2.3.11.1.6 Function Class BitSet.............................................................................................................79
`2.3.11.1.7 Function Class Container.......................................................................................................81
`2.3.11.2
`Properties with Multiple Variables...............................................................................................82
`2.3.11.2.1 Function Class Record...........................................................................................................83
`2.3.11.2.2 Function Class Array..............................................................................................................85
`2.3.11.2.3 Function Class Dynamic Array...............................................................................................88
`2.3.11.2.4 Function Class LongArray......................................................................................................90
`2.3.11.3
`Function Class For Methods.......................................................................................................97
`2.3.12 Handling Message Notification............................................................................................ 98
`3 NETWORK SECTION.................................................................................................................. 101
`3.1 MOST Transceiver and its Internal Services............................................................................ 101
`3.1.1
`Electrical Bypass (All Bypass)........................................................................................... 101
`3.1.2
`Source Data Bypass.......................................................................................................... 101
`3.1.3 Master/Slave, Active and Passive Components ............................................................... 101
`3.1.4
`Data Transport................................................................................................................... 102
`3.1.4.1 Blocks ...........................................................................................................................................102
`3.1.4.2 Frames .........................................................................................................................................102
`3.1.4.2.1 Preamble................................................................................................................................104
`3.1.4.2.2 Boundary Descriptor ..............................................................................................................104
`3.1.4.2.3 MOST System Control Bits ....................................................................................................104
`3.1.4.3 Source Data..................................................................................................................................105
`3.1.4.3.1 Definition of Control Data and Source Data ...........................................................................105
`3.1.4.3.2 Differentiating Synchronous and Asynchronous Data............................................................105
`3.1.4.3.3 Source Data Interface ............................................................................................................105
`3.1.4.3.4 Transparent Channels ...........................................................................................................105
`3.1.4.3.5 Synchronous Area .................................................................................................................106
`3.1.4.3.6 Asynchronous (Packet Data) Area.........................................................................................106
`3.1.4.4 Control Data..................................................................................................................................108
`3.1.4.4.1 Control Data Interface............................................................................................................108
`3.1.4.4.2 Description.............................................................................................................................108
`3.1.5
`Internal Services................................................................................................................ 110
`3.1.5.1 Addressing....................................................................................................................................110
`3.1.5.2 Address Initialization (SAI)............................................................................................................110
`3.1.5.3 Support at System Startup............................................................................................................111
`3.1.5.4 Delay Recognition.........................................................................................................................111
`3.1.5.5 Remote-Access ............................................................................................................................111
`3.1.5.6 Automatic Channel Allocation.......................................................................................................111
`3.1.5.7 Power Management........................

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket