摘要:
A method, apparatus and system for a secure memory with restricted access by processors. System has a plurality of processor units (PUs) coupled to a block of memory with at least one section secured (BMSS) against hacking by not allowing all PUs to access BMSS. One or more PUs has access to BMSS and is implemented with a dedicated function(s) that no other PU can perform such as a security function for encryption key checks. A thread running on a given PU that lacks access to a given memory location in BMSS is transferred to another PU with i) access to given memory location in BMSS; ii) implemented dedicated function; and/or iii) locked down instruction memory not free to run other code. Any attempt to breach protocol issues a fault. Existing code is hardened against less secure user code by only permitting authorized routines to transfer to the implemented PU.
摘要:
One or more embodiments of the invention set forth techniques to perform integer division using addition operations in order to provide address translation capabilities to a processor. The processor supports a memory that maintains checksum information such that address requests received by the processor need to be translated to a checksum address and an actual data address that accounts for use of portions of the memory to store checksum information. Once the checksum address and the actual data address are computed, the processor can confirm the integrity of the data stored in the actual data address and correct any errors if need be, based on the checksum information stored in the checksum address.
摘要:
A method of adjusting fields of a datagram in the handling of the datagram in a network device may comprising receiving a datagram, with the datagram having at least module identifier fields and port identifier fields, at a port of a network device, adding or subtracting an offset value to at least one of the module identifier fields and at least one of the port identifier fields of the datagram based on data registers in the network device, and forwarding the datagram to a legacy device based on the module and port identifier fields of the datagram. A size of each of the module identifier fields and the port identifier fields handled by the legacy device may be smaller than a size of the module identifier fields and port identifier fields handled by the network device.
摘要:
A method of adjusting fields of a datagram in the handling of the datagram in a network device is disclosed. The method includes receiving a datagram, with the datagram having at least module identifier fields and port identifier fields, at a port of a network device, determining whether the received datagram is a unicast datagram, adjusting the module and port identifier fields of the datagram based on data registers in the network device when the received datagram is a unicast datagram and forwarding the datagram based on the module and port identifier fields of the datagram. The port of the network device is connected to a legacy device, where the legacy device has a reduced handling capacity when compared to the network device.
摘要:
In an embodiment, a processing resource allocation method is disclosed. The method may include identifying an instruction mapped to data having a preselected data location. The method may also include determining whether to transfer a call of the instruction from a first processing unit (PU) to a second PU based on the preselected data location.
摘要:
A method and apparatus for modifying standard AC plugs and receptacles to flexibly furnish AC or DC power is disclosed. This can be accomplished by adding a “selector” pin between the non-ground pins used in traditional AC plugs. Alternately, an interposer can be manually applied to the plug to effect selection. Plug electronics can select AC or DC based on respective availability. A flexible power receptacle can manage AC/DC selection, regulate the supplied DC voltage and enable reversion to the AC supply if the DC supply is inadequate. Electronics within a flexible power receptacle can convert DC to AC when advantageous and can regulate the supplied voltage. Additional electronics within a flexible power plug or receptacle can enable communication.
摘要:
A method of adjusting fields of a datagram in the handling of the datagram in a network device is disclosed. The method includes receiving a datagram, with the datagram having at least module identifier fields and port identifier fields, at a port of a network device, determining whether the received datagram is a unicast datagram, adjusting the module and port identifier fields of the datagram based on data registers in the network device when the received datagram is a unicast datagram and forwarding the datagram based on the module and port identifier fields of the datagram. The port of the network device is connected to a legacy device, where the legacy device has a reduced handling capacity when compared to the network device.
摘要:
A system, method, and apparatus for serializer/deserializer (SERDES) communication. In one embodiment, power consumption is reduced by tuning links individually for best speed and/or bit error rate (BER) through use of one or more of i) low-level link management; ii) avoiding multiplexing of channels where it impacts performance, and iii) enabling peer-to-peer (p2p) communications in ostensibly master/servant scenarios. Fine tuning of link behavior is achieved with one or more techniques including i) analog-artificial intelligence (AI) methods, rather than traditional adaptive/digital signal processing (DSP) filtering; ii) efficient power level setting; and iii) feed-forward control.
摘要:
A system, method, and apparatus for analog/mixed-signal defect simulation and analysis methodology. Block-level behavioral models simulated at transistor level, using automated or manual techniques, are binned for all the possible defects that have similar results. A likelihood of a given block-level behavioral model is determined from the likelihood of the defects it represents. Deliberate binning in another embodiment is based on one or more functions of the given block being simulated, e.g., by amplifier gain for an analog amplifier, or by speed/power for a digital part. One or more bins are ‘defect-free behavior’ that cover nominal and corner behavior (power & timing), from manufacturing variability, which may be labeled as “failed” or “degraded” depending on specific performances. For standard parts, test-benches provide the binning from the block-level behavioral models as a result.
摘要:
A system, method, and apparatus is disclosed for interfacing and transferring power unidirectionally or bidirectionally between a direct current (DC) line and a single or multiphase alternating-current (AC) line for only half of any given phase and only a single phase at a time when polarity is matched between the DC and the AC system. A circuit with simplified, robust, and reduced-cost components perform the power conditioning and the synchronization as a system that simulates a half-wave rectifier/inverter.