-
公开(公告)号:US20250103090A1
公开(公告)日:2025-03-27
申请号:US18476082
申请日:2023-09-27
Applicant: ATI Technologies ULC
Inventor: Shaofeng An , YanFeng Wang
IPC: G06F1/08
Abstract: An exemplary method for dynamically changing frequencies of clocks for the data link layer without downtime involves switching a first queue on a first end of a data link and a second queue on a second end of the data link from a pacing mode to an asynchronous mode. The exemplary method also involves modifying a frequency of a clock associated with the data link. The exemplary method further involves returning the first queue and the second queue from the asynchronous mode to the pacing mode upon modifying the frequency of the clock. Various other devices, systems, and methods are also disclosed.
-
公开(公告)号:US20240219988A1
公开(公告)日:2024-07-04
申请号:US18336541
申请日:2023-06-16
Applicant: Advanced Micro Devices, Inc. , ATI Technologies ULC
Inventor: Nicholas Carmine DeFiore , Sridhar Varadharajulu Gada , Benjamin Tsien , YanFeng Wang , Steven Zhou , Duanduan Chen , Malcolm Earl Stevens
IPC: G06F1/3209
CPC classification number: G06F1/3209
Abstract: The disclosed device for power management of chiplet interconnects includes multiple chiplets connected via multiple interconnects. The device also includes a control circuit that detects activity states of the chiplets and manages power states of the interconnects based on the detected activity states. Various other methods, systems, and computer-readable media are also disclosed.
-
公开(公告)号:US20240095404A1
公开(公告)日:2024-03-21
申请号:US17945750
申请日:2022-09-15
Applicant: Advanced Micro Devices, Inc , ATI Technologies ULC
Inventor: Shaofeng An , Shiqi Sun , Michael James Tresidder , YanFeng Wang , Peter Malcolm Barnes
CPC classification number: G06F21/64 , G06F16/2365
Abstract: Data integrity checks for reducing communication latency is described. A transmitting endpoint transmits data to a receiving endpoint by generating an integrity tag for a first subset of data blocks and a second integrity tag for a second subset of data blocks. In implementations, the first and second integrity tags overlap at least one data block and are offset based on computational complexities of generating the integrity tags. A receiving endpoint generates comparison tags for each of the integrity tags and uses the comparison tags to validate an authenticity of received data. In response to validating the first and second integrity tags, data blocks covered by both the first and second integrity tags are released for use. Additional integrity tags are generated and validated for subsequent subsets of data blocks during data communication, thus reducing latency by offsetting times at which comparison tags are generated and validated.
-
-