throbber
~ ..... 1
`~~
`JOHNS HOPKINS
`SHERIDAN LIBRARIES f!
`UNIVERSITY MUSEUMS
`
`DECLARATIO OF JON MEARS
`
`I, Jon Mears declare as follows:
`
`1.
`
`I am a staff member of the Milton S. Eisenhower Library, which is located at
`
`Johns Hopkins University. I have per onal knowledge of the facts listed below.
`
`2.
`
`The Milton S. Ei enhower Library is open to the public. Any member of the
`
`public may enter the Milton S. Eisenhower Library and view the periodicals in the library' s
`
`collection.
`
`3.
`
`The document attached as Exhibit A is a scan of a portion of a periodical that I
`
`located in the Milson S. Eisenhower Library s collection of periodical . Specifically, Exhibit A
`
`shows the article titled "Communication Protocol for Embedded System " as in appear in the
`
`ovember 1994 issue of Embedded Systems Programming. This is volume 7, issue 11 of this
`
`publication.
`
`4.
`
`The tamp on the back cover of the November 1994 issue of Embedded Sy t~ms
`
`Programming reads "OCT 28 1994." It is the regular practice of the Milton S. Ei enhower
`
`Library to stamp periodicals with the date the periodical is added to the library's catalog. Once a
`
`periodical is in the library's catalog, it is made available in the library for viewing by any isitor
`
`of the library.
`
`I declare under penalty of perjury that the foregoing is true and correct.
`
`Dated: March 11 , 2014
`
`   ÿ ÿ
` 
`Office of the Dean
`3400 N. Charles Street Baltimore, MD 21218 410-516-8328 Fax 410-516-5080 www.llbrary.jhu.edu
`
`
ÿÿÿ
`
`
ÿÿ  !"
`
`Apple Exhibit 1121
`Apple Inc. v. Rembrandt Wireless
`IPR2020-00034
`Page 00001
`
`

`

`  ÿÿ
`EXHIBIT A
`
`ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ ÿ
`
`Exhibit 1218 02/12
`
`
ÿÿ
`
`IPR2020-00034 Page 00002
`
`IPR2020-00034 Page 00002
`
`

`

`• ti)MBEA 11 U.S. $3.95 CANADA $4.95
`R 1994 A MILLER FREEMAN PUBLICATION
`
`.
`
`Ada Achieves Orbit
`f Cruising with Ada
`~ 1
`Basics of Networking ~,).·
`. C
`C t .
`,
`on a1ners 1n ++
`Plauger on Prediction
`
`,
`
`.,
`
`.~-·
`
`A Satellitej as·e Stug,y
`)\
`i
`It
`,!"
`J
`
`t
`
`111
`11' 1111111 I I I II I I 11 'l 11
`
`111ll 1
`8 ll ll 0l'l '3tJOt'll.L 7\18
`,UIStJ3AINO SN1>4dOH SNHOr
`.Ld30 SWltJ3S
`A\:l\ftJ817 \:13MOHN3Sl3 S NO.L 711-'l
`VI/ 9
`91
`L£t,6
`"6/\ON I U•6 1/0ll I VOLOOOO 160#
`S3.1\f.LS 03Xlrl ................. l:1.1.:18NX8M
`
`   ÿ ÿ
`

`
`IPR2020-00034 Page 00003
`
`

`

`VOL 7 NO. 11 NOVEMBER 1994
`
`able of Contents
`
`lICHARD RIEHLE. Like C++ before it, Ada is
`g criticisms behind and finding acceptance in a
`Cl~ of embedded applications. This case study
`, the trials and triumphs of a satellite design
`·~ decision to shift to Ada.
`
`8 Cruising with Ada
`
`00-WHILE JONES. Too many developers let their
`dictate their designs. In this system design mani(cid:173)
`.Jones looks at the dangers of inappropriate design
`ologics and the advantages of Ada as a proto(cid:173)
`tool for a typical microcontroller application.
`
`Communication Protocols for
`Embedded Systems
`BHARGAV UPENDER AND PHILIP KOOPMAN.
`e networking architectures were designed without
`ded or real-time concerns i.n mind. Here's an
`iew of the tradeoffs in choosing different embed(cid:173)
`aetworking protocols.
`
`Containers and Templates
`
`'BRUCE ECKEL. Container classes are quite useful.
`lemenling them, however, often requires template
`rt. In keeping with our emphasis on "under the
`"details, this month's intr,oduction to C++ contain(cid:173)
`is also an exploration in the use of templates.
`
`ON THE COVER:
`If your geosynchro(cid:173)
`nous service calls
`are getting too
`expeosive, try
`shifting to Ada.
`Cover by
`Rupen Adley.
`
`COLUMNS+
`DEPARTMENTS
`7 #include
`
`Dangerous Curves
`
`9 Real-Time
`
`Competitive Urges
`by Tyler Sperry
`
`82 Embedded Marketplace
`
`88 Advertiser Index
`
`89 Break Points
`
`I Consultant, Part II
`by Jack G. Ganssle
`
`93 State of the Art
`
`What Happens Next?
`by P.J. Plauger
`
`SYSTEMS PROGRAMMING (ISSN 1040-)272) IS published monthly by Miller Freeman Inc., 600 Hamson Sl. San Francisco. CA 94107. (415) 905-2200. Plea,e dit<Ct odvcrtismg aod
`. - .~ u, dus address. SUDSCRlPTION RA TE for 1hc Urutcd States is $49.9S for 12 issues. C1.11Ddian/Mex1c3fl ordtrs mwt be accompanied by payment in U.S. funds with additional pos"Se
`,=. AU other fmign subscnptions must be prtpaid in U.S. funds with ndd1LJonal postage of$ IS pet y<ar for :&urface mail and $40 per yeas for airmail. POSTMASTER: Alt subscription ordcn.
`nh<ldim dw!JeS ahould be sent to EMBEDDED SYSTEMS PROGRAMMING, P.O. Box 420046. Palm Coul FL 32142-0046. For cuslom<r service, telephone toll-free (800) 829-55)7 •
`.... four 10 six weeks for change of address to lake effect. Secood-<:lass postage ts paid at San Franctsco, CA and a<lditiotul mailing offices. EMBEDJ)ED SYSTEMS PROGRAMMING is a
`tndcmarlc owned t,y the parent company, Miller Ft<etlWI Inc. AU matmal published in EMBEDDED SYSTEMS PROGRAMMING is copyright o• 1994 by Miller Fnocman Inc. All righlS
`ltptodltouon ofmatenal oppcanng in EMBEDDED SYSTEMS PROGRAMMING is fotbidden without pennis,ion. EMBEDDED SYSTEMS PROGRAMMING is available on microfilm/fiche
`,m,ry M1crn6lms International, 300 N. Zeeb Rd.. Aon Arbor, Ml 48106, (l13) 761-4700.
`
`NOVEMBER 1994 EMBEDDED SYSTEMS PROGRAMMING 3
`
`   ÿ ÿ
`

`
`IPR2020-00034 Page 00004
`
`

`

`Communication
`Protocols for
`Embedded Systems
`
`There's more to connecting multiple CPUs
`than just stringing wires or cable. Your
`choice of network protocol, in particular,
`determine system performance.
`
`T he past few years have
`
`seen a growing trend to
`dramatically increase the
`embedded
`electronics
`content of automobiles,
`elevators, building climate control sys(cid:173)
`tems, jet aircraft engines, and other tra(cid:173)
`ditionaUy electro-mechanically con(cid:173)
`trolled systems. In many large systems,
`this increasing electronics content is
`accompanied by a proliferation of sub(cid:173)
`systems with separate CPUs.
`The increase in the number of
`processors in a system is often driven
`by computation and 1/0 growth. In
`some development environments, the
`increase may also be driven by a need
`to ease system integration burdens
`among multiple design groups or to
`provide system flexibility through
`"smart sensors" and "smart acruators."
`Whatever the reasons, once there is
`more than one CPU in a system, there
`must be some means of communica(cid:173)
`tion to coordinate action.
`While some high-end embedded
`systems communicate over a VME
`backplane or similar arrangement, the
`embedded systems we're working on
`use physically distributed CPUs
`~ involving some sort of local area net(cid:173)
`!; work (LAN), also called a multiplexed
`~ network or a communication bus. At
`~ the heart of the LAN is the media
`i
`access protocol, which picks the next
`
`   ÿ ÿ
`

`NOVEMBER 1994
`
`transmitter for access to the shared
`work medium, typically a wire,
`or RF frequency.
`In this article, we will discUSI
`special considerations for net\\
`real-time embedded systems, and
`at several media access protocof4
`demonstrate fundamentally di
`ways of accessing the shared
`The protocols are: connection
`protocols, pollin~ time division
`pie access (TOMA), token ring.
`bus, binary countdown, earner
`multiple access with collision
`tion (CSMA/CD), and carrier
`multiple access with collision a
`ance (CSMA/CA). For each or
`we will evaluate the siren~
`weaknesses against special COl15
`tions. A protocol tradeoff chart
`enable you to select a protoo4 •
`your needs. While no pro1ocor is
`feet for all purposes, a vari~
`CSMA/CA offers the most ,,
`for many embedded systems.1
`
`SPECIAL CONSIDERATIONS
`
`I n practice, we have found
`
`real-time ne
`embedded
`require high efficiency, de
`1st1c latency, operational
`configuration nexibility, and low
`per node.
`Because cost limits the
`bandwidth available to many
`
`IPR2020-00034 Page 00005
`
`

`

`i,n;,protocol efficiency (message bits
`ltivered compared to raw network
`lundwidth) is very important. The
`Olbedded systems we have studied are
`9racterized by a predominance of
`tliort. periodic messages. So, an obvi-
`1111S l1ptimization is to reduce overhead
`bits used for message packaging and
`lioting. (It is not unusual for eight bits
`of data to be packed in a message that
`u32or even 64 bits long.)
`Once message overhead has been
`Dluced as much as possible, media
`i,:cess overhead must be reduced. For
`die most part, this is accomplished by
`IDUllmizing the network bandwidth
`IIJDSumed by arbitration (such as pass(cid:173)
`ing a toktn or resolving collision con(cid:173)
`ftict). Because worst-case behavior is
`l\t11,lll}' important. efficiency should
`be evaluated for both light and heavy
`bllic. For example, CSMNCD (often
`lllCil in workstation LANs) is highly
`tfficient for light traffic but gives poor
`,rfonnance if heavily loaded, while
`riken bus protocols have the reverse
`,o,>erties.
`Oeterrninacy, or the ability to calcu(cid:173)
`late worst-case response time,
`is
`tmportant for meeting the real-time
`mnstraints of many embedded control
`41>lications. A prioritization capabili(cid:173)
`ty is usually included in systems to
`liprove detenninacy of messages for
`nme-critical tasks such as exception
`lmdling and high-speed loop control.
`friorities can be assigned by node
`mber or message type. Additionally,
`tffililC(llS can support local or global
`,iority mechanisms. In local prioriti(cid:173)
`ation. each node gets a tum at the net(cid:173)
`work in sequence and sends its highest
`~ority queued message (thus poten(cid:173)
`tially forcing a very high-priority mes(cid:173)
`sage to wait for other nodes to have
`lheir turns first). ln global prioritiza(cid:173)
`tion. the highest priority message in the
`entire system is always transmitted
`first. This mechanism, which is funda(cid:173)
`mentally enabled by the media access
`:-mtocol, is highly desirable for many
`rcty-<:ritical applications.
`Many applications require robust
`
`Because worst(cid:173)
`case behavior is
`typically
`important,
`efficiency should
`be evaluated for
`both light and
`heavy traffic.
`
`operation under extreme conditions.
`We call a protocol robust if it can
`quickly detect and recover from errors
`(duplicate or lost tokens, for example),
`added nodes, and deleted nodes. In
`some systems, it's important to quick(cid:173)
`ly recover from a reset or power glitch
`that forces a restart of the network.
`Varied operating environments may
`dictate use of a media access protocol
`that is flexible in supporting multiple
`media and mixed topologies. Portions
`of a system may require expensive
`fiber in noisy environments, while
`other portions can tolerate low-cost
`twisted pair wires in benign environ(cid:173)
`ments. A bus topology may be opti(cid:173)
`mum for wires, but a ring or star topol(cid:173)
`ogy may be needed for fiber.
`A vital consideration is the cost per
`node. In this article, the order of the
`media access discussion progresses
`from very simple to complex, high(cid:173)
`performance protocols. Simple proto(cid:173)
`cols require less hardware and soft(cid:173)
`ware resources and are therefore likely
`to be less expensive. For extremely
`cost-sensitive high-volume applica(cid:173)
`tions, these protocols are good candi(cid:173)
`dates. However, for growing applica(cid:173)
`tions, more advanced protocols pro(cid:173)
`vide a stronger foundation. In general,
`costs are decreasing over time due to
`
`   ÿ ÿ
`

`
`Us
`
`will
`
`ared net(cid:173)
`re, fiber,
`
`,CUSS the
`tworking
`and look
`,cols that
`different
`medium.
`1-orienled
`on multi(cid:173)
`ng, token
`~er sense
`~n detec(cid:173)
`ier sense
`n avoid(cid:173)
`of these,
`gths and
`onsidera-
`an will
`col to fit
`ol is per(cid:173)
`iation of
`rcrsatility
`
`und that
`1etworlcs
`letennin(cid:173)
`oustn~
`low cost
`
`network
`applica-
`
`IPR2020-00034 Page 00006
`
`

`

`Communication Protocols
`
`advances in IC manufacturing technol(cid:173)
`ogy and the increasing availability of
`off-the-shelf protocols. Consequently,
`we envision advanced cost-effective
`protocols used in many embedded
`applications.
`
`MEDIA ACCESS PROTOCOLS
`
`N ow that we hav,e a feel for the
`
`issues in embedded networks,
`let's examine various com(cid:173)
`monly available media access proto(cid:173)
`cols. While many variations and com(cid:173)
`binations are possible, we'll discuss
`the plain versions of each protocol.
`Before LANs became popular, con(cid:173)
`nection-oriented protocols were heavi(cid:173)
`ly used to connect remote terminals to
`mainframes. These protocols support
`only two nodes per physical transmis(cid:173)
`sion medium and are typically con(cid:173)
`nected via modem with serial lines.
`Figure I shows an example of a four(cid:173)
`processor network using this protocol.
`Communication between nodes not
`physically connected requires multiple
`transmissions through intermediate
`nodes. These protocols are determinis(cid:173)
`tic between directly connected nodes.
`For indirectly connected nodes, latency
`can be high.
`For an embedded system with mod(cid:173)
`est communication requirements, this
`might be a cost-effective protocol
`(readily available hardware and soft(cid:173)
`ware from mature technology). For
`demanding applications, nodes that
`handle a lot of pass-through traffic can
`become swamped, prohibiting use of
`low-cost nodes in a Large system.
`Sometimes, this type of protocol is
`combined with a more complex com(cid:173)
`munication system to provide back(cid:173)
`ward compatibility to older systems or
`to allow simple remote modem access
`to the system (such as BACnet). This
`type of protocol is used by the X.25
`public ner.vork standard (ner.vork ser(cid:173)
`vices offered by telephone companies)
`and IBM's system network architec(cid:173)
`ture (SNA).2
`Polling is one of the more popular
`protocols
`for embedded systems
`because of its simplicity and determi-
`
`nacy. In this protocol, a centrally
`assigned master periodically sends a
`polling message to the slave nodes,
`giving them explicit permission to
`transmit on the network.
`Figure 2 shows the polling order
`(dotted lines) of a simple four-node
`bus network. The majority of the pro(cid:173)
`tocol software is stored in the master
`and the communication work of slave
`nodes is minimal (therefore, the net(cid:173)
`work costs tend to be smaller). This
`protocol is ideal for a centralized data(cid:173)
`acquisition system where peer-to-peer
`communication and global prioritiza(cid:173)
`tion are not .required. However, the sin(cid:173)
`gle-point-of-failure from the master
`node (or the cost of installing redun(cid:173)
`dant master hardware) is often unac(cid:173)
`ceptable. Additionally, the polling
`process consumes considerable band(cid:173)
`width regardless of network load (poor
`
`efficiency). These protocols
`standardized by the milifall
`STD-1553B) for aircraft 1
`communications. Some \anatti
`protocol allow inter-slavec
`tion through the master as
`improved robustness by usmg
`masters (as does Profibus).
`
`T irne di visioa multiJJII
`
`(TOMA) is heavilJ
`satellite communicailll
`applicable to LANs as welll II
`protocol, a network master ,
`a frame sync signal before e3dl
`of messages to synchroruze c
`au the nodes. After the sync,
`transmits during its uniquely
`time slice, as shown in f.
`Performance is similar to pol
`with greater efficiency at hea~
`
`FIGURE 1
`An example network using co1111ection-orie11ted protocols.
`
`FIGURE 2
`Master node sequentially polling slave nodes for information ..
`
`Master
`
`c- ......... ,, ••s---....... __ ~-~--- -
`
`\ 1st
`
`Bus
`
`Slave)
`
`Slave2
`
`50 EMBEDDED SYSTEMS PROGRAMMING NOVEMBER 1994
`   ÿ ÿ
`

`
`IPR2020-00034 Page 00007
`
`

`

`Communication Protocols
`
`optics. So, many LANs and wide area
`networks (WANs) are moving to this
`type of protocol. For example, fiber
`distributed data interface (FODJ) uses
`dual counter-rotating rings to achieve
`higher reliability than bus or star
`topologies.
`
`TOKEN BUS
`
`T he operation of a token bus is
`
`very similar to a token ring-a
`token is passed from node to
`node in a virtual ring as in Figure 5.
`The holder of the token has the access
`to the network. Like token ring, token
`bus works well under heavy traffic
`with a high degree of determinacy.
`
`However, token bus broadcastl
`message simultaneously to all
`instead of passing it bit-by-bit alq
`physical ring. The minimum time flt
`token to traverse the logical ring
`nodes is thus N•T bit times instt.311
`N+ T bit times as in token ring (
`there is no parallelism in the co
`tions). This makes global prioriti
`of messages largely impractical,
`Unlike unidirectional token ~
`break in the cable or a failed node
`not necessarily disable the entile
`work. A
`lengthy reconfi
`process, where each node identilill
`neighbors, is used to maintain the ·
`tual ring when nodes are added
`
`FIGURE 3
`The time slices ofTDMA protocols.
`
`Master
`
`Bus
`
`~
`' ' ' '
`t >
`
`la
`
`la
`
`,
`
`, ,
`
`:f
`
`,
`
`, ,
`
`, ~-- , ,•
`
`la 3 s
`
`FIGURE 4
`Token passing in the token ring networks.
`
`Token
`
`due to elimination of individual polling
`messages. Costs for slave nodes are
`greater with TOMA than with polling,
`because each slave node must have a
`stable time base to measure slices. An
`additional weakness for TOMA is the
`need for fixed-length messages to fit
`into time slices. lo some TOMA varia(cid:173)
`tions, unused slices are truncated by
`tacit agreement among nodes. Time(cid:173)
`based protocols have been popular in
`aerospace a pplications. For example,
`digital autonomous terminaJ access
`communications (DATAC) is being
`used by NASA and Boeing.
`ln a token ring network, the nodes
`are connected in a ring-like structure
`using point-to-point links as shown in
`Figure 4. A special token signal is
`passed from node to node around the
`ring. When a node has something to
`send, it stops the token circulation,
`sends its message all the way a.round
`the ring, and passes the token on. Since
`worst-case token waiting time can eas(cid:173)
`ily be calculated, this protocol is deter(cid:173)
`ministic. Under light traffic, token ring
`has moderate token passing overhead.
`However, the protocol provides effi(cid:173)
`cient throughput under heavy traffic
`conditions si nee idle token passing is
`mi nimized.
`A frequent implementation strategy
`is to have a one-bit delay at each node,
`so a token can visit all nodes in N+T
`bit times, where N is the number of
`nodes and T is the number of bits in the
`token. Global prioritization is accom(cid:173)
`plished by altering the priority field of
`the token as it visits the nodes. This
`field enables only the nodes with a
`high priority to send messages on the
`network. Initialization of the token
`message and detection of accidentally
`duplicated or lost tokens adds com(cid:173)
`plexity and cost to the protocol.
`A break in the cable or a failed node
`disabling the entire network is a com(cid:173)
`mon concern
`for many users.
`Consequently, node bypass hardware
`and dual rings are used to address this
`concern at additional cost. Because the
`ring connections themselves are point(cid:173)
`to-point, it is well suited for fiber
`
`52 EMBEDDED SYSTEMS PROGRAMMING NOVEMBER 1994
`   ÿ ÿ
` 
`
`IPR2020-00034 Page 00008
`
`

`

`Communication Protocols
`
`deleted from the network. Because
`bus-like topologies are well suited for
`manufacturing plants, manufacturing
`automation protocol (MAP) adopted
`this protocol. Additionally, attached
`resource computer network (ARCnct)4
`uses this protocol for LAN connectivi(cid:173)
`ty and process control. Adaptive
`Networks' PLC-192 power line carrier
`chip uses a hybrid token bus protocol:
`under light traffic, nodes dynamically
`join and leave from the logical ring(cid:173)
`under heavy traffic, all nodes join the
`ring to maintain stability.
`ln binary countdown, also known as
`the bit dominance protocol, all nodes
`wait for an idle channel before trans(cid:173)
`mitting a message. Competing nodes
`(tnmsmitting simultaneously) resolve
`contention by broadcasting a signal
`based on their unique node identifica(cid:173)
`tion value. The transmission medium
`must have the characteristic that one
`value (say, a "I") overrides the oppo(cid:173)
`site value (a "O"). During this trans(cid:173)
`mission, a node drops out of the com(cid:173)
`petition if it detects a dominant signal
`opposite to its own, as shown in Figure
`6. Thus, ifa "I" signal is dominant, the
`highest numbered transmitting node
`wins the competition and gains owner(cid:173)
`ship of the channel.
`be
`can
`Global
`prioritization
`achieved by arbitrating over message
`ID values rather than the node IDs.
`Since the arbitration is part of the mes(cid:173)
`sage, this protocol has good throughput
`and high efficiency. Additionally, the
`protocol is more robust because node
`configuration (transmission order) is
`not required, and inactive nodes are
`ignored. However, since all messages
`are prioriiized, there is no simple way
`to guarantee equally fair access among
`all nodes under heavily loaded condi(cid:173)
`tions. Also, some transmission tech(cid:173)
`niques (such as current-mode trans(cid:173)
`former coupling commonly used in
`high-noise environments) aren't com(cid:173)
`patible with the bit dominance require(cid:173)
`ment. Using this protocol, Bosch
`developed the controller area network
`(CAN) specification for automotive
`applications.5 The
`Society of
`
`Automotive Engineers s tandard SAE
`J-1850 also uses this protocol.
`
`CARRIER SENSE MULTIPLE ACCESS
`
`C arrier sense multiple access
`
`collision
`with
`detection
`(CSMA/CD) has been widely
`researched with a large number of pub(cid:173)
`lished variations. In the simplest case,
`a node waits for the network to go idle
`before transmission (as in binary
`countdown). If multiple stations trans(cid:173)
`mit almost simultaneously (within a
`row1d-trip transmission delay on the
`network), the messages collide, as in
`Figure 7. The nodes must detect this
`collision and resolve it by waiting for a
`random time before retrying.
`The key advantage to this protocol is
`that, in principle, it supports an unlim(cid:173)
`ited number of nodes that don't require
`preallocated slots or inclusion in token
`
`passing acttv111es.
`nodes to enter and leave the n
`without requiring network imll ·
`tion and configuration. For light
`conditions, overhead is very
`However, under heavy traffic, die
`overhead is unbounded due to ·
`probability of repeated collis~
`Consequently, this protocol has
`determinacy and
`low cffic1
`furthermore, detecting collisiollf
`require analog circuitry, adding to die
`system expense. In fact, if the a~
`environment is very noisy or di
`wiring runs are long and of poor
`ty, collision detection may not wotk.f
`all. The popular Ethernet protocc,li&!lli
`in workstation LANs is based on a
`protocol.
`Many hybrid protocols combinatll
`light traffic efficiency of CSMMI
`with the heavy traffic cfficieJlll"'
`
`FlGURE 5
`Token passing in token bus protocols.
`
`Token
`----------
`-----·--------
`
`FIGUR.E 6
`Arbitration in binary coumdown protocols.
`
`Node JD
`
`7
`MSB
`
`6
`
`Node 72
`(01001000) :
`
`0
`
`0
`
`Node 7 1
`co1000111) :
`Node 42 ! 0
`0
`(00101 010) "'": .....;;;.__.,....;;;.~
`:
`
`5
`
`()
`
`4
`
`0
`
`3
`
`2
`
`0
`
`0
`
`0
`
`0
`
`0
`
`,
`.
`.
`!
`•
`•
`,
`1
`: ~ :
`:
`:
`:
`:
`:
`:Node 7, loseshfr,
`. 1----- Wade 4i loses here
`:
`:
`.
`'
`'
`
`54 EMBEDDED SYSTEMS PROGRAMMING NOVEMBER 1994
`   ÿ ÿ
`

`
`Bit Slices
`
`IPR2020-00034 Page 00009
`
`

`

`Communication Protocols
`
`token-based protocols. The resulting
`protocols are often called carrier sense
`multiple access with collision avoid(cid:173)
`ance (CSMA/CA). As in CSMA/CD,
`nodes transmit after detecting an idle
`channel. However, if two or more sta(cid:173)
`tions collide, a jam signal is sent on the
`network to notify all nodes of collision,
`synchronize clocks, and start con(cid:173)
`tention time slots. Each contention
`time slot, typically just over a network
`round-trip propagation delay time, is
`assigned to a particular station. Each
`station is allowed to initiate transmis(cid:173)
`sion during its contention slot. Figure 8
`shows a slot progression for a three
`node network. In this example, trans(cid:173)
`mitters 2 and 3 collide and initiate a
`jam. Contention slots follow the jam
`signal. Since processor I has nothing
`to send, slot! goes idle. Transmitter 2
`starts sending its message during slot2.
`Other stations detect the message, and
`stop the slot progression.
`After the end of the message, all
`nodes initiate new contention slots.
`However, to ensure fairness and deter(cid:173)
`minacy, the slots are rotated (change
`positions) after each transmission.
`Additionally, the priority slots (pslots)
`can precede each slot progression to
`support global prioritization for high(cid:173)
`priority-messages. The network returns
`to an idle state when all the slots go
`unused.
`The contention slots in CSMA/CA
`protocol help avoid collisions. In gen(cid:173)
`eral, there are two distinct variations of
`CSMA/CA protocols. If the number of
`slots equals the number of stations, the
`protocol is called reservation CSMA
`(RCSMA). The RCSMA variation
`works efficiently under all traffic con(cid:173)
`ditions.6 However, because of the one(cid:173)
`to-one relation of the node to the slot,
`RCSMA is not practical for a network
`with a large number of nodes. In anoth(cid:173)
`er variation, the number of slots is less
`than the number of stations, and the
`slot assignments are randomly allocat(cid:173)
`ed to minimize collisions. Echelon's
`local operating network (LON) uses
`the latter variation and dynamically
`varies the number of slots based on
`
`FIGURE 7
`Collisions in CSMA/CD networks.
`
`Bus
`
`Collision
`
`FIGURE 8
`Slot progression in CSMAICA protocols.
`
`CPUI
`I
`
`CPU2
`
`CPU3
`
`•
`I - -
`
`Bus
`
`CPU2 &3
`Collide
`I
`
`Jam PSlot Slot!
`
`/
`
`Priority Slot
`
`Time
`
`expected traffic prediction.7 Unlike
`CSMA/CD, there are ways to eliminate
`the need for collision detection hard(cid:173)
`ware, such as sending dummy mes(cid:173)
`sages that keep slots going in the
`absence of network traffic.
`
`PROTOCOL TRADEOFFS
`
`W e have described the major
`
`media access protocols and
`noted clear differences.
`Table l summarizes some of the com(cid:173)
`mon traits and our assessment of their
`strengths and weaknesses for embed(cid:173)
`ded real-time applications. The impor(cid:173)
`tant points to take into consideration
`when evaluating alternatives are:
`
`• Polling, TOMA, and connection-
`
`'··-(cid:141)
`
`(cid:141) --·
`
`Collision
`
`based protocols are simple, but
`not provide sufficient 0e1'ibilil
`advanced systems.
`• Token-based protocols are
`dictable, but can have high 01
`and require complex software to
`tain robusu1ess.
`• Binary count-down protocolf
`heavily on the bit dominance,
`teristics of the physical medium.
`• CSMA/CD is a poor choice for
`real-time
`systems with
`traffic.
`
`For our embedded systems, we
`found that CSMA/CA, paruc
`RCSMA, is a good choice. While
`application will no doubt .have c
`teristics that are somewhat dJ
`
`56 EMBEDDED SYSTEMS PROGRAMMING NOVEMBER 1994
`   ÿ ÿ
` 
`
`IPR2020-00034 Page 00010
`
`

`

`Replace Four
`Conventional PC/104
`Modules with
`One SuperXr"'
`CMF8680 cpuModule™
`Embedded PCIXT Controller with
`Intelligent Power Management
`@~ C
`c 1'\o•
`
`PC/XT compatibility with 286 emulation
`14 MHz, 16-bit 8086 CPU
`+SV only; 1.6W at 14.3 MHz, 1 W at 7.2 MHz
`Intelligent sleep modes, 0.1 W in Suspend
`ROM-DOS and RTD enhanced BIOS
`Compatible with MS-DOS & real-time
`operating systems
`1 M bootabte Solid State Disk & free software
`4K•bit configuration EEPROM (2K for user)
`2M on-board DRAM
`IDE & floppy Interfaces
`CGA CRT/LCD controller
`Two RS-232 ports, one RS-485 port
`Pa.raltel, XT keyboard & speaker ports
`Optional X-Y keypad scanning/PCMCIA
`interface
`(cid:127) Watchdog timer & real-lime clock
`
`Expand This Or Any PC/104 System
`with the
`CM106 Super VGA
`Controller utilityModule TM
`(cid:127) Mono/color STN & TFT flat panel support
`(cid:127) Simultaneous CRT & LCD operation
`(cid:127) Resolution to 1024 x 768 pixels I $223 1
`(cid:127) Displays up to 256 colors
`
`100 " '
`
`Speed Product Development with the
`DS8680 Development System
`Your DS8680 includes the CMF8680, CM102
`keypad scanning/PCMCIA, CM104 with 1.8'
`85MB hard drive, CM106 SVGA controller &
`DM5406 12-bit, 100 kHz dataModule™ in an
`enclosure with external power supply, 3.5'
`floppy, keyboard, keypad, TBS0 terminal
`board, SIGNAL-VIEW"", SIGNAL'MATH"',
`MS-DOS, SSD software & rtdLinxT" for just
`$2950.
`For more information on our PC/104 and
`ISA bus products, call today.
`
`Real Time Devices USA
`200 Innovation Blvd. • P.O. Box 906
`State College, PA 16803 USA
`(814) 234-8087 / Fax: (814) 234-5218
`RTD E u ropa • RTD Scandinavia
`Aeat Tlme Devices ts a rounder ot the PC/104 Consortium.
`
`CIRCLE # 30 ON READER SERVICE CARD
`
`Efficiency Efficiency
`Heavy Deter- Priori- Robust-
`Light
`Traffic
`Traffic
`rninacy tization
`ness
`
`TABLE 1
`Media access tradeoffs.
`
`... Good
`- Ok
`... Poor
`
`ConnecLion
`
`Polli.og
`
`TDMA
`
`Token Ring
`
`Token Bus
`
`Binary Cnt .
`
`CSMA/CD
`
`CSMNCA
`
`...
`...
`...
`...
`...
`...
`
`...
`...
`...
`...
`...
`...
`...
`
`...
`...
`...
`...
`...
`...
`...
`
`...
`...
`...
`
`...
`
`Physical
`Layer
`Flexibil.
`
`..
`
`t
`t
`
`...
`...
`...
`
`t
`
`..
`
`t
`t
`
`...
`...
`...
`
`than ours, this article's discussion of
`the special considerations and media
`access protocol strengths and weak(cid:173)
`nesses should allow you to select the
`best protocol to match your needs. We
`believe the electronic contents of
`embedded systems will continue to
`grow, and communication networks
`provide strong foundation for support(cid:173)
`=--~
`
`ing this growth. (cid:127)
`
`Bhargav Upe11der is an associate
`e11gi11eer
`at United
`research
`Technologies
`Research
`Center.
`C11rrently . he is exploring novel archi(cid:173)
`tectures and s11pporti11g protocols for
`distributed embedded systems. He
`holds a BS in electrical engineering
`from the University of Connecticut a11d
`an MS in electrical e11.gi11eeri11g from
`Cornell University in New York. He
`can be co111acted electro11ica/ly al
`barg@utrc.utc.com.
`
`is a principal
`Philip Koopman
`research
`engineer
`at United
`Technologies Research Center. He
`currently designs and evaluates archi(cid:173)
`tectures and communicalion protocols
`for a variety of embedded applications.
`He has previously worked as an
`embedded CPU architect and a Navy
`s11bmari11e officer. Koop111a11 holds a
`BS and MS i11 computer engineering
`from Rensselaer Polytechnic Institute
`
`   ÿ ÿ
`
`
`and a PhD in computer engin
`from Carnegie Mellon Unfrwir,.
`may be reached e/ec/ronia(IIJ,
`koopma11@utrc.utc.com.
`
`REFERENCES
`1. Upender, B. P. and Koopm.vQ~
`J.,
`Embedded
`Communi
`Protocol Optio11s, San Jose, C
`Proceedings of the Embedded S
`Conference, October 1993.
`2. Tanenbaum, A: S., Cu'"p
`Networks, 2nd ed., Englewood C ·
`NJ: Prentice-Hall, I 989.
`3. Stallings, W. S.,
`Computer Communications, 3rd
`New York: Macmillan, 1991.
`4. Hoswell, Katherine S.
`Thomas, George M., ARCnet Fa
`LAN Primer, Second Pnn ·
`llliooil
`Downers
`Grove,
`Contemporary Control Systel!lll Inc.
`1988.
`5. Bosch, CAN Speci1icati~ wt
`2.0, Robert Bosch GmbH, Stuttpif
`1991.
`6. Chen and Li, Reserv•
`CSMAICD: A Multiple Aceall
`Protocol for LANs, IEEE Journal a
`Selected Areas in Communic.dil
`February 1989.
`7. Enhanced Media Access Con/Ill
`with Echelon 's Lon Talk Pro1,,.-rJ.
`LonWorks Engineering Bull •
`Echelon Corp., August 1991.
`
`IPR2020-00034 Page 00011
`
`

`

`KERNEL & DEVELOPMENT TOOLS
`
`The Reliable Pre111iun1 Soluti011
`You Can Adlllally Afford To Use.
`
`....... •-..-...-\ ____ .._ __ ....
`:.:-1·:i·:--"-__ ,.,,
`·-· ...... ,. ___ _...,,
`::.;.::::=~-s~
`u •--J'l• ... _., , f
`
`~------
`... ~~.:~.,-~·
`
`s...r::"-:::=--.. ----
`
`.... iea, . . . ~ . r .
`
`~.-..,~
`~""'~,
`-----~ .......
`_...,..., ..
`-••l~-.-.ai-.
`,O.\,.,.<N·•·• .. -..,
`
`[] --
`
`•
`
`'r••ll'IO-C'~l••')C'l. .... ,-. ....
`!It. ,.,,_ t .....,. o.'~b ...... _ .....
`-,.w,~,;,........u ---~ ...
`fQ,.91,.,..o.,.--.-..,_ .... ..,_-.,..
`
`..
`
`PCl&non
`
`SUN \&>ion
`The Only Royatty ... Fteer Fully-Integrated Solution Available
`Backed By Over 25 Years Of Malket Leadership:
`THE PRECISE SOLU110N from lntet111ebic:s
`
`'I
`I
`
`EMBEDDED.
`l'l\mtllll£\llDIII
`
`The Precise Solution integrates the
`very best of lntemietria fidd-proven
`compiler and debugger technology
`with the leading-edge M QX real-time
`executive from Precise Software
`Technologies, Inc.
`The Precisc-'.MQX technology repre(cid:173)
`sents over a decade of rich kernel
`heritage. Whert MQX is combined
`with the lnterrndrics task-aware
`tools, the result is a premium, full

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket