摘要:
Aspects of a method and system for improved communication network setup utilizing extended terminals are presented. Aspects of the method may comprise configuring a wireless Ethernet terminal functioning as a client station by a configurator via a network. The configured wireless Ethernet terminal may wirelessly receives information from a wireless station, and communicate the wirelessly received information to at least one of a plurality of wired stations via at least one of a plurality of corresponding wired interfaces. Aspects of the system may comprise a collocated device functioning as a configurator that configures a wireless Ethernet terminal functioning as a client station via a network. The configured wireless Ethernet terminal may wirelessly receives information from a wireless station, and communicate the wirelessly received information to at least one of a plurality of wired stations via at least one of a plurality of corresponding wired interfaces.
摘要:
A wireless interface circuit transceives packetized data between a host module and a first external device using a frequency spectrum, wherein the packetized data is formatted in accordance with a first wireless communication protocol and wherein the packetized data includes an indication that the first external device is configured to use at least a portion of the frequency spectrum for communication via a second wireless communication protocol. A coexistence management module generates a wireless interface schedule that includes a least one contention free period reserved for communication via the second wireless communication protocol, and generates schedule data, based on the wireless interface schedule, for transmission to a plurality of external devices including the first external device.
摘要:
Aspects of a method and system for improved communication network setup may comprise receiving authentication enablement information from a configurator station comprising indication of a current state of a configurator timing window. In response to input at a client station to communicate authentication response information to the configurator station, receiving at the client station, configuration information and/or status information resulting from input at the client station. Other aspects of the invention may comprise responding to input at a configurator station to transmit authentication enablement information comprising indication of a current state of a configurator timing window, receiving authentication response information from the client station based on the transmitted authentication enablement information, and transmitting to the client station configuration information and/or status information from the configurator station based on the received authentication response information.
摘要:
Aspects of a method and system for improved communication network setup utilizing extended terminals are presented. Aspects of the method may comprise configuring a wireless Ethernet terminal functioning as a client station by a configurator via a network. The configured wireless Ethernet terminal may wirelessly receives information from a wireless station, and communicate the wirelessly received information to at least one of a plurality of wired stations via at least one of a plurality of corresponding wired interfaces. Aspects of the system may comprise a collocated device functioning as a configurator that configures a wireless Ethernet terminal functioning as a client station via a network. The configured wireless Ethernet terminal may wirelessly receives information from a wireless station, and communicate the wirelessly received information to at least one of a plurality of wired stations via at least one of a plurality of corresponding wired interfaces.
摘要:
Techniques are presented for identifying blockable subsets. Blockable subsets can increase the efficiency by which solutions to a constraint set representation (CSR) can be found. Nodes of a blockable subset can be marked as “blocked” and learning or implication procedures, used as part of a CSR solving process, can be designed to skip nodes marked as blocked. The identification of a particular blockable subset is typically associated with certain conditions being true. If and when the conditions no longer hold, the nodes of the blockable subset need to be unblocked. One type of blockable subset can be identified during the operation of an implication engine (IE) by a technique called justified node blocking (JNB). Another type of blockable subset can be identified by a technique called pivot node learning (PNL). PNL can be applied in-between application of an IE and application of case-based learning.
摘要:
A system and process for constructing a technology library that is suitable for use with an electronic design automation system that converts the target technology library into a scalable cell library having non-linear, gain-based delay models for estimating circuit delay. The scalable cell library can then be used by gain-based structuring and mapping processes. The library construction process places at least six discrete cells in each logic function of a basic cell set. The library construction process also places at least five discrete cells in each logic function of an extended cell set and rules out cell sizing using internal buffer circuits. Also, for each discrete cell in the complete cell set, the variance of the capacitances between different input pins of the cell is maintained to be within 10 percent. For corresponding timing arcs of discrete sizes for a particular logic function, the present invention keeps equal the ratio of the output load to input capacitance. Also, the present invention constructs a technology library that has geometrically distributed sizes of cells within each logic function. Lastly, for each discrete cell within a logic cluster, the output maximum capacitance constraint is kept linearly proportional to the average input capacitance of the discrete cell. These processes likely allow a technology library to be suitable for the generation of a scalable library which can be used for integrated circuit design and fabrications.
摘要:
Embodiments herein are directed to systems and techniques for supporting heterogeneous logic architecture in programmable devices, such as field-programmable gate arrays (FPGAs). heterogeneous logic architectures may include additional logic elements (e.g., AND-inverter cones (AICs)) in addition to lookup tables (LUTs). Accordingly, it may be desirable to provide a compiler flow that supports heterogeneous FPGA architecture, taking advantage of a combination of LUTs and other logic elements (e.g., AICs) to improve resource utilization (e.g., die area, wire length) and improve maximum clock frequency and compile time.
摘要:
Certain aspects of a method for enabling exchange of information in a secure communication system may comprise configuring at least one 802.11 client station via authentication enablement information comprising data that specifies a time period during which configuration is allowed. The data that specifies a time period during which configuration is allowed may comprise a configuration window open field, which indicates a period when a configuration setup window is open. At least one client station may be configured via the authentication enablement information comprising recently configured data, which indicates whether at least one configurator has configured at least one other client station within the time period during which the configuration is allowed.
摘要:
Aspects of a system for enabling secure wireless communication of information between stations in a communication system may comprise a configurator, that exchanges configuration information with a client station, in an IEEE 802.11 communication system. The exchange of configuration information may be encrypted based on information transmitted between the configurator and the client station via a communication network, and information that remains locally on the configurator and locally on the client station. Aspects of a method for enabling secure wireless communication of information between stations in a communication system may comprise exchanging configuration information between a configurator and a client station, in an IEEE 802.11 communication system. The exchanged configuration information may be encrypted based on information transmitted between the configurator and the client station via a communication network, and information that remains locally on the configurator and locally on the client station.
摘要:
A wireless interface circuit transceives packetized data between a host module and a first external device using a frequency spectrum, wherein the packetized data is formatted in accordance with a first wireless communication protocol and wherein the packetized data includes an indication that the first external device is configured to use at least a portion of the frequency spectrum for communication via a second wireless communication protocol. A coexistence management module generates a wireless interface schedule that includes a least one contention free period reserved for communication via the second wireless communication protocol, and generates schedule data, based on the wireless interface schedule, for transmission to a plurality of external devices including the first external device.