-
公开(公告)号:US12236260B1
公开(公告)日:2025-02-25
申请号:US17643572
申请日:2021-12-09
Applicant: Amazon Technologies, Inc.
Inventor: Dan Saad , Guy Nakibly , Lev Vaskevich , Aviv Bonomo
Abstract: An address decoder for a system is disclosed that can be used for different source nodes in the system. Each address decoder can be configured to perform a plurality of decode methods that can be customized for each source node. A first decode method can be used to determine a target node from a plurality of target nodes based on a destination address of the transaction. A second decode method can be used to assign a dedicated target node as the target node irrespective of the destination address of the transaction. The second decode method can be used to route the transaction to the dedicated target node for testing and verification operations.
-
公开(公告)号:US11768990B1
公开(公告)日:2023-09-26
申请号:US17305043
申请日:2021-06-29
Applicant: Amazon Technologies, Inc.
Inventor: Uri Leder , Ori Ariel , Max Chvalevsky , Benzi Denkberg , Guy Nakibly
IPC: G06F30/398 , G06F30/394 , G06F30/331 , G06F30/392
CPC classification number: G06F30/394 , G06F30/331 , G06F30/392 , G06F30/398
Abstract: An integrated circuit design technique utilizes a data structure describing the connections, interconnect routing information of the connections, and bandwidth requirements of the connections in an integrated circuit device to generate an interconnect flow graph having nodes, and edges connecting the nodes. The edges connecting the nodes can reflect the bandwidth requirements of the connections. The interconnect flow graph can be used to optimize and verify the integrated circuit design.
-
公开(公告)号:US11748285B1
公开(公告)日:2023-09-05
申请号:US16452233
申请日:2019-06-25
Applicant: Amazon Technologies, Inc.
Inventor: Roi Ben Haim , Guy Nakibly , Adi Habusha , Simaan Bahouth
CPC classification number: G06F13/387 , G06F9/45533 , G11C7/1006 , H04L69/22 , G06F2213/0026
Abstract: Ordering rules, such as those enforced by the peripheral component interconnect express (PCIe) protocol for data communications, can be intelligently enforced for independent transactions. A single device might host or be associated with multiple PCIe devices, such as virtual machines, and treating requests from these separate PCIe devices as coming from separate domains enables the ordering rules to be bypassed for certain transactions. Further, since a virtual machine might host multiple applications or be associated with multiple processors that can submit independent requests, the ordering rules can be bypassed at the transaction level in at least some instances. The ability to intelligently bypass ordering rules can help to improve the performance of the overall system, as requests do not need to be unnecessarily delayed and data storage capacity can be more fully utilized.
-
公开(公告)号:US11321247B2
公开(公告)日:2022-05-03
申请号:US16727814
申请日:2019-12-26
Applicant: Amazon Technologies, Inc.
Inventor: Nafea Bshara , Adi Habusha , Guy Nakibly , Georgy Machulsky
Abstract: Techniques for emulating a configuration space by a peripheral device may include receiving a access request, determining that the access request is for an emulated configuration space of the peripheral device, and retrieving an emulated configuration from an emulated configuration space. The access request can then be serviced by using the emulated configuration.
-
公开(公告)号:US10521365B2
公开(公告)日:2019-12-31
申请号:US14872964
申请日:2015-10-01
Applicant: Amazon Technologies, Inc.
Inventor: Nafea Bshara , Adi Habusha , Guy Nakibly , Georgy Machulsky
Abstract: Techniques for emulating a configuration space by a peripheral device may include receiving a configuration access request, determining that the configuration access request is for a configuration space other than a native configuration space of the peripheral device, and retrieving an emulated configuration from an emulated configuration space. The configuration access request can then be serviced by using the emulated configuration.
-
公开(公告)号:US10509764B1
公开(公告)日:2019-12-17
申请号:US15164601
申请日:2016-05-25
Applicant: Amazon Technologies, Inc.
Inventor: Erez Izenberg , Leah Shalev , Nafea Bshara , Guy Nakibly , Georgy Machulsky
IPC: G06F15/167 , H04L29/06 , G06F16/22
Abstract: Apparatus and methods are disclosed herein for remote, direct memory access (RDMA) technology that enables direct memory access from one host computer memory to another host computer memory over a physical or virtual computer network according to a number of different RDMA protocols. In one example, a method includes receiving remote direct memory access (RDMA) packets via a network adapter, deriving a protocol index identifying an RDMA protocol used to encode data for an RDMA transaction associated with the RDMA packets, applying the protocol index to a generate RDMA commands from header information in at least one of the received RDMA packets, and performing an RDMA operation using the RDMA commands.
-
公开(公告)号:US09612611B1
公开(公告)日:2017-04-04
申请号:US14869349
申请日:2015-09-29
Applicant: Amazon Technologies, Inc.
Inventor: Guy Nakibly , Usama Nassir , Saar Gross , Nafea Bshara , Barak Wasserstrom , Daniel Joseph Grey
IPC: G06F1/08
Abstract: In a system having a first clock domain with a first clock and a second clock domain with a second clock, the first and second clocks are monitored to determine whether one or both clocks are active. The first clock is selected to be an output clock if the first clock is active and the second clock is disabled irrespective of the clock selection signal. The second clock is selected to be the output clock if the second clock is active and the first clock is disabled irrespective of the clock selection signal. If both the first clock and the second clock are active, either the first clock or the second clock is selected according to a received clock selection signal.
-
公开(公告)号:US11936393B1
公开(公告)日:2024-03-19
申请号:US17805670
申请日:2022-06-06
Applicant: Amazon Technologies, Inc.
Inventor: Guy Nakibly , Moshe Raz , Zvika Glaubach
IPC: H03L7/00 , G11C11/406 , H03L7/099 , H03L7/12
CPC classification number: H03L7/12 , G11C11/40615 , G11C11/40618 , H03L7/0992
Abstract: Techniques for cooperative timing alignment using synchronization pulses are described. The techniques can include generating, at an integrated circuit device, a timing signal, controlling a local count value based on the timing signal, monitoring a synchronization signal of a system comprising the integrated circuit device, detecting a synchronization pulse in the synchronization signal, and aligning the local count value with an implied count value associated with the synchronization pulse in order to align the local count value with those of other integrated circuit devices of the system.
-
公开(公告)号:US11880327B1
公开(公告)日:2024-01-23
申请号:US17643132
申请日:2021-12-07
Applicant: Amazon Technologies, Inc.
Inventor: Guy Nakibly , Barak Wasserstrom , Yaniv Shapira , Erez Izenberg , Adi Habusha
IPC: G06F13/40
CPC classification number: G06F13/4027
Abstract: A coherent connection and a non-coherent connection are provided between system-on-chips (SoCs). The coherent connection can be coupled to coherent interconnects on the SoCs, and the non-coherent connection can be coupled to non-coherent interconnects on the SoCs. An input/output (I/O) transaction from an I/O device on a first SoC that is targeted to a second SoC can be transmitted via the non-coherent connection, and a processor transaction from the first SoC that is targeted to the second SoC can be transmitted via the coherent connection.
-
公开(公告)号:US20220253392A1
公开(公告)日:2022-08-11
申请号:US17660797
申请日:2022-04-26
Applicant: Amazon Technologies, Inc.
Inventor: Nafea Bshara , Adi Habusha , Guy Nakibly , Georgy Machulsky
Abstract: Techniques for emulating a configuration space may include emulating a set of configuration registers for a set of functions corresponding to a type of peripheral device. The set of functions can include a physical function and a virtual function associated with the physical function. A configuration access request can be processed by retrieving an emulated configuration register from the emulated configuration space, and logging incoming configuration access requests in a configuration transaction log to track configuration accesses.
-
-
-
-
-
-
-
-
-