摘要:
A maintenance interface is provided for interfacing a service processor and a central processing unit operating asynchronously to each other. The maintenance interface includes circuitry for synchronizing the service processor to the central processing unit and decode circuitry for interpreting commands from the service processor. The maintenance interface also includes circuitry responsive to control signals from the central processing unit such that the maintenance interface establishes communication between the service processor and the central processing unit. The central processing unit includes a microprocessor for interpreting data sent between the service processor and the central processing unit. The maintenance interface is responsive to control signals from the central processing unit to resolve communication contention between the central processing unit and the service processor. The maintenance interface further facilitates the use of the LSSD testing procedure by degating central processing unit interfaces as required for this testing approach.
摘要:
In a ring communication system comprising selectively connectable data stations, each station has connecting circuitry including a phase-locked loop arrangement (111) which is frozen at its current frequency and phase in response to a signal interruption caused by a station insertion or removal operation. Control logic (113) generates a freeze control signal in dependence of the signal energy status on input lines (75). This control signal activates gates (149,151) and switches (155,157) to interrupt change control signals of the phase-locked loop circuitry and to keep an oscillator control voltage at a given value. The control logic also provides an auxiliary data signal during the freeze interval which is applied to the ring to keep stations downstream in synchronism. By this method and arrangement, undesired reactions and excursions of the phase-locked loop circuitry in response to a signal energy outage are prevented, and synchronization can be rapidly regained after station insertion or removal.
摘要:
A communication system in which many terminals located in a large room are connected to a host via a plurality of satellites. Data are exchanged between terminals and satellites by infrared signals. All satellites are connected to the host by a common bus arrangement comprising a data line (13) and a synchronization line (15). Each satellite generates a synchronized carrier and modulates it by the downlink data received from the host in a modulator (17). Each terminal may receive overlapping signals from several satellites without disturbance. Uplink data transmitted from any terminal are stored as packet in a buffer (55) of one or more satellites so that they can be transferred to the host subsequently via the bus arrangement. Each satellite has means (63) for comparing any transferred uplink packet to a packet still stored in its buffer so that any packet is transferred only once to the host and doubly stored packets are eliminated.
摘要:
In a communication network comprising block switching nodes interconnected by transmission links, a flow control mechanism is provided in each switching node for regulating the flow of addressed data blocks or messages. A hardware look-ahead mechanism effective within each node tests for each data block received from a link and buffered at an input port, whether it can be accepted at the appropriate output port of the same node for further transmission. A token mechanism effective over links allows to maintain at each output port of a node an indication whether any data block can be accepted in the input port at the other end of the respective link. By the combined operation of look-ahead mechanisms and token mechanisms the flow of addressed messages in a direction where the transmission path is already filled up is prevented. This has a positive smoothing effect on overall traffic flow where short-time or local overloads occur.
摘要:
Im Speicher des Computersystems sollen Daten und Hinweise gemischt gespeichert werden. Dazu ist die Unverletzlichkeit der Hinweise sicherzustellen und deren unbefugte Benützung auszuschliessen. Das wird erreicht durch den Hinweisen (11) beigefügte Bezeichnungsbits (12). Instruktionen, die eine Benützung der Hinweise veranlassen, wirken auf eine besondere Vorrichtung (42), die die Bezeichnungsbits dementsprechend bearbeitet. Dadurch ist jederzeit feststellbar, ob die Hinweisbenützung zulässig ist.