Abstract:
Systems and methods are disclosed that include a plurality of processing units having a plurality of register file entries. Control logic identifies a first register entry as including a message address in response to receiving a first instruction. The control logic further identifies a second register entry to receive messages in response to receiving a second instruction.
Abstract:
Traffic through a port of a network switch is monitored and controlled by a token bucket system having a duplex mode in which the bandwidths available for incoming and outgoing packets are controlled by a single token bucket and a half-duplex mode in which the bandwidths for incoming and outgoing packets are controlled by a respective one of two token buckets.
Abstract:
The present invention provides a highly glycosylated iduronate-2-sulfatase enzyme comprising an iduronate-2-sulfatase polypeptide with at least 5 kilodalton (kDa) more sugar than iduronate-2-sulfatase purified from a natural source, e.g. human liver. The present invention also provides an enzymatically active polypeptide fragment or variant of such a highly glycosylated iduronate-2-sulfatase. The present invention further provides an isolated nucleic acid encoding iduronate-2-sulfatase, as well as an expression vector, a host cell and a method for producing the present highly glycosylated iduronate-2-sulfatase enzyme. In one embodiment the present invention is directed to a method for producing a glycosylated iduronate-2-sulfatase enzyme which comprises culturing a host cell containing a nucleic acid encoding an enzymatically active iduronate-2-sulfatase polypeptide wherein the host cell glycosylates the polypeptide to a greater degree than a native iduronate-2-sulfatase polypeptide expressed by a natural human liver cell.
Abstract:
The individual rows of a ROM array are accessed by a row decoder/driver in response to the arrival of the address of the individual row on the address lines. A plurality of programmable switches store the address of a row of ROM array found to contain one or more defects. If the incoming address is that of the defective row each of a plurality of comparators connected to both an address line and the associated switch outputs a coincidence signal to an AND gate. The output of the AND gate accesses a spare row of RAM which thus replaces the defective row of the ROM array. Access to the spare row is automatic upon receipt of the address of the defective row. Each column of the ROM array contains a check bit computed from the remaining contents of the respective column, and the data to be stored in the spare row is generated from the remaining contents of the ROM array. At initialization, the generated data which should have been stored in the defective row is written into the spare row.
Abstract:
A storage location of a device that can be configured to act as a master in a particular security mode, such as a Direct Memory Access (DMA) having one or more channels, can be programmed to indicate a security indicator to be provided when configured to operate as a master device.
Abstract:
A memory cluster includes a first block, a second block, a third block, and a fourth block arranged to have a center hole, wherein the first, second, third, and fourth blocks are each have a first port, a second port, a third port, and a fourth port. A first core is in the center hole coupled to the first port of each of the first, second, third, and fourth blocks. A second core is in the center hole coupled to the second port of each of the first, second, third, and fourth blocks. A third core is in the center hole coupled to the third port of each of the first, second, third, and fourth blocks. A fourth core in the center hole coupled to the fourth port of each of the first, second, third, and fourth blocks.
Abstract:
A memory cluster includes a first block, a second block, a third block, and a fourth block arranged to have a center hole, wherein the first, second, third, and fourth blocks are each have a first port, a second port, a third port, and a fourth port. A first core is in the center hole coupled to the first port of each of the first, second, third, and fourth blocks. A second core is in the center hole coupled to the second port of each of the first, second, third, and fourth blocks. A third core is in the center hole coupled to the third port of each of the first, second, third, and fourth blocks. A fourth core in the center hole coupled to the fourth port of each of the first, second, third, and fourth blocks.
Abstract:
High quality epitaxial layers of monocrystalline materials can be grown overlying monocrystalline substrates such as large silicon wafers by forming a compliant substrate for growing the monocrystalline layers. An accommodating buffer layer comprises a layer of monocrystalline oxide spaced apart from a silicon wafer by an amorphous interface layer of silicon oxide. The amorphous interface layer dissipates strain and permits the growth of a high quality monocrystalline oxide accommodating buffer layer. The accommodating buffer layer is lattice matched to both the underlying silicon wafer and the overlying monocrystalline material layer. Any lattice mismatch between the accommodating buffer layer and the underlying silicon substrate is taken care of by the amorphous interface layer. Mixed technology structures are provided in which a microprocessor is formed entirely in a monocrystalline compound semiconductor material layer overlying the silicon substrate. A microprocessor is also provided utilizing portions of the silicon substrate and the monocrystalline compound semiconductor material layer.
Abstract:
A method of controlling access to a common physical data transmission link from a multiplicity members of a packet-based local area network, wherein the members are partitioned into a plurality of virtual local area networks (VLANs) and wherein packets are identified according to the virtual local area network from which they come, comprises (a) monitoring packet traffic from the virtual local area networks on the link and thereby obtaining measures of the traffic flow from each of the virtual local area networks; (b) determining whether the traffic flow for each respective VLAN is above or below a threshold; (c) denoting a VLAN which is above its threshold as in a restricted state and denoting a VLAN which is below its threshold as in a priority state; (d) arbitrating between requests from the VLANs to transmit data packets on the link; and (e) according priority in the arbitration to a VLAN which is in a priority state over any VLAN which is in a restricted state. A request to transmit is gated with a signal denoting the state of the respective VLAN to provide a set of priority requests. In response to the presence of any priority request the arbitration is made only in respect of the set of priority requests and in the absence of a priority request arbitration is made in respect of the VLANs which indicate a request to transmit. A ‘leaky bucket’ counter may be used for monitoring the traffic for each VLAN.
Abstract:
A method of processing data contained in data packets comprises storing a set of microcode instructions of which some are test instructions prescribing a respective test between a data pattern in a packet and a test pattern; defining by means of bit masks a respective multiplicity of programs each consisting a group of instructions selected from the said set of instructions; providing a particular one of said bit masks; reading out from storage the selected group of instructions in the program defined by said particular one of said bit masks, said selected group including at least one of said test instructions; and executing the instructions in the selected group on data packets. Matches between data patterns in said packets and a test pattern defined by said at least one test instruction may be detected. The invention preferably includes reading buffer data and applying to data packets appearing sequentially in the data a selected group of said instructions which independently test data of the data packets in turn.