4574 44 A7 B7 五、發明説明(1 ) 發明背景: 1. 發明領域: 本發明一般係相關於使用經由通訊網路以處理資料之:: 積體電路裝置,且更確切的說•係關於一些方法以及一些 設備以處理以及管理在高速網路巷之資料流。 2. 相關技藝之描述: 乙太區域網路(LAN)係在世界上最受歡迎以及最 廣爲使用之電腦網路。因爲乙太之開端係在1 9 7 0年代 早期,因此電腦網路公司以及工程專家係繼續在功能上、 可靠度以及傳送速度上繼續改進乙太產品。爲確保該新網 路產品之相容性以及可靠度,該電子以及電學工程師組織 (I EEE)組成一工作群乙定義以及增進工業LAN標 準。今天,該I EE E具有各種乙太工作群組,其負責在 國際上所熟知之稱爲” IEEE 802. 3標準”之 L A N標準下將新的乙太協定以及產品之開發標準化》 ^声部中央標準局員工消費合作社印製4574 44 A7 B7 V. Description of the invention (1) Background of the invention: 1. Field of the invention: The present invention is generally related to the use of data processing via communication networks: integrated circuit devices, and more specifically And some equipment to process and manage the data flow in the high-speed network lane. 2. Description of related technologies: Ethernet LAN (LAN) is the most popular and widely used computer network in the world. Since the beginning of Aether was in the early 1970s, computer network companies and engineering experts continued to improve Aether products in terms of functionality, reliability and transmission speed. To ensure the compatibility and reliability of the new network product, the Electronics and Electrical Engineers Organization (I EEE) formed a work group B to define and improve the Industrial LAN standard. Today, the I EE E has various Ethernet working groups that are responsible for standardizing the development of new Ethernet protocols and products under the LAN standard known internationally as the "IEEE 802.3 Standard". ^ Part Printed by the Consumer Standards Cooperative of the Central Bureau of Standards
現在,具有一廣泛之各種標準相容乙太產品以使用作 爲在乙太網路之上接收 '處理以及傳送資料。例如,此些 網路產品傳統上係整合至網路電腦,網路介面卡(N I C ) '路由器'切換集線器(switching hub ),橋接器( bridge)以及轉發器(repeater)。直到近來,經由乙太網路之 一般資料傳輸速度係每秒1 ◦百萬位元(Mbps) «然 而,爲符合快速資料傳輸速度之需要•該I E E E -4 - {諳先閱讀背而之注意事項再填巧本頁) 本紙張尺度適用中國國家標準(CNS ) A4说格(210X297公釐) 457444 A? B7 五、發明説明(2 ) 8 0 2 . 3標準委員會正式地在1 9 9 5年五月提出” IEEE802.3U標準”。此標準亦稱爲” 100基 底T快速乙太”標準,因爲其可以大至1 〇 〇Mb p s之 資料傳輸速率而執行。 圖一A係一由標準化國際組織(I SO)所發展之一 開放式系統互連(0S I )層次模組1 0以描述在各層間 之資訊交換。該0 S I層級模組1 0對於分離之技術功能 係特別有用1且藉此在不破壞對相鄰層次功能之衝擊下* 而對指定層級之修改以及更新。在最低層,該0 S I模組 1 0具有一實體層1 2,其負責將資料編碼以及解碼成經 由特殊媒介而傳送之訊化。如本技藝之所爲人知,實體層 1 2亦稱爲” Ρ Η Y層級”。 蛵浐部中决標準局負工消費合作社印^ (讀先聞讀背面之注意事邛再填β本I ) 線 在實體層1 2之上,一資料鍵結層1 4經定義以提供 在網路上之可靠傳輸資料而執行與一實體層12以及一網 路層1 6之適當介面。如所示,資料鍵結層1 4 一般包含 —邏輯鍵結層(L L C ) 1 4 a以及一媒介存取控制層 14b。LLC層級14a —般係一軟體功能,以負責將 控制資訊與自網路靥級1 6而傳送至MAC層級1 4 b之 資料相連接《另一方面,MAC層級1 4b負責行程排定 ,在一鍵結之上傳送以及接收資料。因此,MA C層級 1 4 b主要負貴控制在網路之上的資料流,確保該傳送錯 誤被偵測到,以確保該傳送係被適當的同步。如本技藝之 所爲人知的,MA C層級1 4 b —般使用著名的載子感應 多重存取具有碰撞偵測(C SMA/CD)演算法而對實 本紙張尺度適用中國國家標準(CNS) Α4規格(210Χ297公釐) -5- 尅声部中央標準局員工消費合作社印來 457444 A7 _ B7_______五、發明説明(3 ) 體層1 2之存取資料作行程排定以及控制。 網路層16係負責在網路各節點間訂定資料路徑’且 在連接至該等節點之使用者間’予以初始化’維護以及終 止一通訊鍵結。傳輸層1 8係負責在一個別服務品質之水 準下執行資料傳輸。以例子而言,一使用爲執行傳輸層 1 8功能之傳統軟體協定可以是TCP/I P, Novell I P X以及NetBeui «會期層2 0係在當使 用者能夠根據該使用者之功能是否爲全雙工或半雙工傳送 而傳送以及接收資料以茲控制。表現層2 2係負責將經由 媒介而傳送資料之翻譯、轉換、壓縮以及解壓縮。例如, 表現層2 2之功能一般係藉由如Unix,DOS,微軟視窗9 5 ,視窗N T以及麥金塔0 S等之電腦作業系統而執行。最 後,應用層2 4提供使用者適當介面以存取以及連接至一 網路。 . 圖一B係一作爲經由網路而傳送資料之傳統乙太封包 之圖示》—封包一般包含一傳統上爲8位元組長之一前文 (preamble ) 30。在該前文之最後一個位元組(或八元 組)之後係一開始框架界線(未顯示)。在該開始框架界 線八元組中,一傳統上爲6位元組之一目的位置(DA) 3 2以作爲確認將接收該乙太封包之節點。接著DA 3 2 之後,係一來源位址(S A ) 3 4其一般係6位元組長, S A 3 4係作爲確認直接在傳送封包上之傳送節點。在該 SA34之後’一長度/型態欄(L/T) 36 (―般係 2位元組)一般係作爲標示接著的資料欄位之長度以及型 本紙張尺度制巾S ΚΪ##· ( CNS ) A4^ ( 210X297^ ) ΤβΊ ' ~ ---------k------IT------0 (详先聞请背16之注意事項再本貧) 恕浐部中决桴卑局tK工消費合作杜印製 4 p 7 4 4 4 Α7 Β7 五 '發明説明(4 ) 態。如該技藝所爲人知的,假如知道長度,該封包係被分 類爲8 0 2 . 3封包,而假如該型態欄位被提供時,該封 包被分類爲乙太封包。 接著的資料欄位由於也包含可由L L C層1 4 a所編:: 碼之資訊’因此該欄ίϋ被確認爲L L C資料3 8。如該技 藝所爲人知的,假如一給定之乙太封包較6 4位元組爲小 時’大多的媒介存取控制器在L C C資料之後加入1’ s 以及0 ’ s之充塡以將乙太封包之尺寸加大到至少6 4位 元組。一旦充塡4 0被加入,假如需要的話,一個四位元 組之重複檢查(C R C )欄被加至封包之尾部以檢查在接 收端之損壞封包。如此處所用的,一 ”框架”應解釋爲係 含在一封包中之資料的子部份= 如前所述’因爲MA C層1 4 b係負責控制在網路上 之資料流,因此MAC層1 4 b —般係負責以一適當的前 文 30、DA32、SA34、DFL36、Pad40 以及CRC 4 2而將所接收之L L C資料3 8予以封裝。 進一步的’一內部封包間隙(I PG)係作爲確認一在所 傳送乙太封包之間的時間跨距(span )。習知上,該 I PG係一由該8 0 2 . 3標準所定義而由一適當之 MA C層1 4 b所放置之一固定値。如需要進一步對乙太 網路通訊技術之資訊,可參考具有美國專利號5,3 i i ’ 1 14以及5,504,738之名稱爲"全雙工乙太 通訊之設備以及方法”。此些專利在此係作爲參考。 圖一 C係一習知乙太媒體存取控制器(MA C ) 5 0 本紙張尺度適用中國®家標準(CNS ) A4規格(210X297公袭:〉 (訐先閱讀背面之注意事項再填」本頁) 訂 線 457444 A7 iii部中央標孳局t貝工消費合作社印^ ____B7_五、發明説明(5 ) 之系統架構表示。如所示,MA C 5 0包含一傳送( Tx)MAC控制器54以作爲自一上部LCC層中所接 收處理資料,以及一接收(Rx) MAC控制器5 6以處 理自一實體媒體8 4中接收之乙太封包。由該傳送側,資:: 料一般係經由系統匯流排7 8而自上部L C C層所接收。 如所示,所有傳至MA C 5 0之資料係經由一路徑5 2而 被送至一匯流排介面控制器7 4。此外,控制以及指令訊 號一般亦係經由路徑5 2而以序列之方式而傳送至MA C 5 0。一旦資料被傳送至匯流排介面控制器7 4,該資料 被傳送至一 TxFIF062,該TxFIF062係作 爲將自該上部L C C層所接收之資料保持之緩衝區。 —般而言,Tx FIFO 62以及 Rx FIFO 64兩者皆具有FIFO控制方塊66 以及6 8,以將控制資訊傳送至M A C控制器5 4,以及 作爲將儲存在TxFIF062以及RxFIF068中 所儲存之資料轉移予以觸發。因此,在習知MA C架構中 ,一旦一所選擇之處理控制被傳送至T xMA C控制器 5 4或RxMAC控制器5 6時,該特殊控制資訊將仍然 係”設定控制”以作爲乙太封包之預設數目。接著,該由 TxMA C控制器5 4以及由R zMAC控制器5 6所執 行之處理操作在每個個別框架傳送時不可被修改(只能在 傳送之間被修改)。 進一步所展示之指令狀態暫存器7 2以及統計計數器 7 0,該7 2以及7 0.習知上係作爲負責以及對位在 I 、 訂 I I I I I 線 (#先閲讀背面之注意事項再填衣頁) 本紙張尺度適用中國國家標準(CNS ) A4規格(210X297公嫠) -8- 4g7444 經浐部中决標準局I工消費合作社印製 A7 B7五、發明説明(6 ) T xMA C控制器5 4以及R xMA C控制器5 6所執行 之處理予以追蹤。在此習知MA C設計中,路徑5 2 —般 係作爲傳送資料以及控制訊號兩者。然而,當儲存在指令 狀態暫存器7 2以及統計計數器7 0中之資訊被存取時,'‘ 正被傳送至T xMA C控制器5 4之任何資料或控制訊號 將被暫停(其必然將網路減速)。接著,需要對指令狀態 暫存器7 2以及統計控制器7 0之管理工作亦將被完成以 被路徑5 2所使用。 儘管該習知MA C架構5 0可工作良好,對於處理增 加資料流量、處理重要流量控制事件、以及處理管理以及 網路診斷事件之進一步改良係一直被需求的。此特色在當 網路速度持續增加時係特別需要的。例如,在現今技術之 乙太網路,甚至並未嘗試流量控制之工作,且大部份之資 料傳送係經由二所選擇之鍵結而以點對點之倒出(dump ) 而執行。亦即,一旦該傳送參數經設定以執行所要求之處 理時(即,該封包架構變數被設定),則該傳送者將經由 該網路而連續倒出封包直到該使用者要更新所傳送封包架 構之變數。因此,假如要求一更新,該對於該處理之改變 必須自該L C C層而經由該相同傳送路徑而向下傳送至該 M A C 層。 但是,當控制以及資料兩者經由一處理路徑而傳送時 ,該資料以及控制兩者必須競爭頻寬而在同一時間只有一 個被處理。接著,一旦一封包傳送或接收功能被初始時, 該處理變數可以不被改變。習知技藝乙太MA C層處理之 (对5LW讀背而之注意事邛再構3本頁) 、va -線 本紙張尺度適用中國國家標準(CNS) A4規格(210X297公釐) 457444 紅'-'·"部中决標準局I工消費合作社印^ A7 B7五、發明説明(7 ) 進一步缺點係在一旦錯誤封包被傳送時,一般無法避免或 跳出其傳送。因此,該接收側必須處理更多錯誤容易封包 之處理。 進一步的,習知技藝之乙太MAC層目前在當MAC: ·· 層之接收側無法處理一大佇串封包。如該技藝所爲人知的 ,在解決該問題之先前嘗試中係對該MA C層中之緩衝區 尺寸予以增加。儘管增加緩衝區之尺寸可減緩對於現有技 術之1 OMb p s以及1 〇 〇Mb p s乙太系統之問題, 但增加緩衝區尺寸對於所增加資料流量之需求而言,不再 是一合理之解答。 進一步指出,該習知技藝之乙太系統目前不能具有適 當水準之網路執行診斷能力之網路管理程式。舉例而言, 當網路診斷以及執行特性被執行時,網路管理程式一般係 執行昂貴診斷以及網路探測裝備,而該裝備在分析一般尺 寸網路時係太過昂貴。結果,網路管理程式一般經選擇以 在試圖解開網路表現之失誤以及流量控制限制之前時,係 可更新整個乙太系統。 經觀察上述,該種在該封包被傳送或接收之處理時, 可允許線上封包接著封包之資料資訊以及控制資訊之處理 以對一封包特性修改之媒介存取控制(MAC )層處理的 方法以及設備係必須的。此外,對於該允許使用者將經由 網路而傳送以及接收之封包資料流予以管理並正確執行熟 練偵測測試之M A C層處理的方法以及設備係需要的。 <评先閱讀背面之;i意事項再填艿本頁) 本紙張尺度適用中國國家標车(CNS ) A4規格(210X297公釐) -10- 457444 α7 Β7 ¾^.¾.中央標準局負工消費合作社印裂 五、發明说明(8 ) 發明槪述: 在一實施例中,將揭示一媒介存取控制器。該媒介存 取控制器包含一傳送媒介存取控制器,該控制器係架構以 處理該自所接收之輸出封包資料以作爲傳送至實體層之上 部層。一接收媒介存取控制器經架構以處理該自實體層所 接收之輸入封包資料以傳送至該上部層。一傳送多個封包 佇列FIF0以在傳送至傳送媒體存取控制器之前而自上 部層接收輸出封包資料。一接收多個封包佇列F I F0以 在接收該由接收媒介存取控制器所接收之輸入封包。該媒 介存取控制器進一步包含一與該傳送以及接收媒介存取控 制器相介面之媒介存取控制器管理程式》該媒介存取控制 器管理成式系負責經由傳送以及接收多封包佇列FIF0 而管理該封包資料流。 在另一實施例中,將揭示一作爲在網路上通訊之網路 介面系統。該網路介面系統包含一媒介存取控制器以處理 自一上部層所接收之傳送資料以及將所處理過之傳送資料 傳送至一較低層,且將接收自較低層之所接收資料予以處 理且將該所處理之接收資料傳送至該上部層。該媒介存取 控制器經架構以監視在上部以及較下層間之資料流。該網 路介面進一步包含資料匯流排以該在上部層以及該媒介存 取控制器間之資料以及資料控制資訊予以通訊》—管理控 制匯流排係作爲將位在上部層以及該媒介存取控制器間之 管理控制資訊予以通訊,該管理控制匯流排係與資料匯流 排無關。 L---------------1Τ------^ (诔先閒請背蚤之注意事項再填巧本莨) 本紙張尺度適用中國國家標準(CNS ) Α4規格(210Χ297公釐) -11 - 457444 Λ7 Β7 绍尹部中央標準局員工消費合作社印製 五、發明説明(9 ) 在另一實施例中,將揭示一種將媒介存取控制器作爲 處理資料傳送請求,資料接收請求以及經由給媒介存取控 制器而監視資料流之方法。該媒體存取控制器經架構已與 上部層以及較低層相通訊。該方法包含整合一作爲將資料:= 轉移至以及移出該媒介存取控制器之一第一匯流排。在資 料轉移正被進行時,將作爲將管理控制請求予以通訊之第 二匯流排整合至該媒介存取控制器《該第二匯流排乃被對 耦至一平行事件處理器,該處理器含一作爲將經由該第一 匯流排而傳送之所選擇資料過濾之微處理器。 在另一實施例中,揭示一傳送媒介存取控制器。該傳 送媒介存取控制器包含一經架構以自上層接收封包資料、 傳送控制訊號以及控制資訊之一傳送介面單元。一傳送控 制器根據接收自上層之控制資訊而處理該封包資料。該傳 送控制區塊被雙向對耦至該傳送介面單元。一傳送公設區 塊係作爲監視以及負責在傳送控制區塊內之處理事件。一 傳送循環重複檢查單元經架構以自該傳送介面單元中接收 封包資料|該傳送循環重複檢査單元係與該傳送控制區塊 相通訊。該傳送媒介存取控制器進一步包含一介面單元, 該單元經架構以在被傳送至一實體層之前自該傳送循環重 複檢查單元中接收封包資料。 在另一實施例中,將揭示一經架構已與一上層以及一 較低實體層相通訊之媒介存取控制器。該媒介存取控制器 包含一傳送控制器,以自上層接收以及處理傳送資料請求 ,並將所接收之資料輸出至該實體層。該方法包含自該上 ---.------------1Τ------0 (誚先閱請背面之注意亨項再填巧本頁) 本紙張尺度通用中國國家標準(CNS > Α4規格(210X297公釐} -12- 超沪部中央樣"局負工消費合作社印^ 457444 A7 __._B7_ 五、發明説明(1〇 ) 層接收資料以及經由該傳送控制器以處理所接收之資料, 該處理之執行係根據附在該傳送控制器之多個控制暫存器 的設定。接收一控制訊號以修改該多個控制暫存器中至少 之一個而該資料係經由該傳送控制器而被處理。該方法進·_ 一步包含根據附在該傳送控制器中多個控制暫存器中至少 一個之修改而對於該傳送控制器內被處理之資料予以改變 *並輸出該經處理之資料。 在另一實施例中,將揭示一傳送媒介存取控制器。該 傳送媒介控制器包含一傳送介面單元,經架構以自上層接 收封包資料,傳送控制訊號以及控制資訊。一傳送控制區 塊包含狀態機器,以處理該封包資料,該處理係根據接收 自上層之控制資訊*且該傳送控制區塊係雙向對耦至該傳 送介面單元。一傳送公設區塊係作爲監視以及負責處理在 該傳送控制區塊中之事件。一傳送循環重複檢查單元經架 構以自該傳送介面單元中接收封包資料。該傳送控制區塊 係與該傳送循環重複檢査單元相通訊。該傳送媒介存取控 制器進一步包含一傳送光纖頻道以及十億位元媒介獨立介 面單元,經架構以在封包資料被傳送至一實體層之前自該 傳送循環重複檢査單元接收封包資料。 在另一實施例中,一控制器作爲控制在實體層以及上 層間之資料轉移,該控制器包含一傳送器以傳送在上層以 及實體層間之資料封包,該傳送器經架構以選擇性的在序 列資料封包間插入間隙。該控制器進一步包含一延遲週期 暫存器,該暫存器可經選擇性的寫入以標示在被傳送至實 {計先閱讀背面之注意事項再填{本頁) 訂 本紙張尺度適用中國國家標準(CNS ) Α4規格(210X297公釐) -13- 457444 A 7 B7 尨浐部中决標準局貝工消費合作社印繁 五、發明説明(11 ) 體層之序列封包資料間被插入之中間封包間隙週期D該延 遲週期暫存器在傳送器在上層以及實體層間傳送資料封包 時係被修改β 在另一實施例,將揭示一媒介存取控制器’該控制器' ·’ 係作爲控制在實體層以及上層間之資料傳送。該媒介存取 控制器包含一傳送器以在上層以及實體層間傳送資料。該 媒介存取控制器進一步包含一重試限制暫存器’該暫存器 可選擇性地將該媒介存取控制器在於上層以及實體層間跳 脫資料傳送之前的傳送次數予以程式化。優點的是,該媒 介存取控制器所嘗試傳送次數之數目可經向上調整以在高 流量週其實避免跳脫。 在另一實施例中,將揭示一媒介存取控制器經架構已 與上層以及下實體層間相交通。該媒介存取控制器包含一 接收控制器,以處理來自於上層之傳送請求以及作爲處理 來自於實體層之所接收資料。對於在接收控制器中接收資 料處理修改之一種方法包含經由接收控制器以處理資料, 該處理係根據在接收處理器所含之暫存器設定而執行。在 資料經由接收控制器而處理時,將作爲修改暫存器之控制 訊號轉移至該接收控制器。該方法進一步包含根據在接收 控制器中所含之暫存器之修改而對於在接收控制器中處理 之資料予以改變處理。 在一進一步之實施例中,一接收媒介存取控制器將被 揭示。該接收媒介存取控制器包含一實體媒介接收介面單 元,以接收來自於一實體媒介之封包資料,且將光纖頻道 許.¾.^讀背面之;1意事項再填β本订} 訂 線 本紙張尺度適用中國國家標準(CNS ) Α4規格(2丨0X297公笼) -14· 457444 沒浐部中央標準局負工消費合作社印^ A7 _B7五、發明説明(12 ) 格式以及一十億位元媒介獨立格式中之一的封包資料予以 接收。一接收器週期重複檢查器經架構以自實體媒介接收 介面單元中接收該封包資料。一接收介面單元經架構以自 該實體媒介接收介面單元以及該接收器週期重複檢查器中:: 接收封包資料。該接受器介面單元經架構以自上層接收多 個轉移控制訊號以及控制資訊。、該接收媒介存取控制器 進一步包含一接收器控制區塊,以根據該所接收轉移控制 訊號以及該所接收控制訊號而處理所接收之封包資料。該 接收器控制區塊係與該接收器介面單元以及該實體媒介接 收介面單元相通訊。亦包含一接收器區塊,以監視以及負 責處理在該接收器控制區塊中之事件。 在另一實施中,將揭示一電腦可讀取媒介,包含程式 指令以驅動經架構已與上層以及較低實體層相通訊之一媒 介存取控制器該媒介存取控制器包含一接收控制器以接 收以及處理來自於較低層之所接收資料之請求,並將所接 收之資料轉移至該較上層。該電腦可讀取媒介包含程式指 令’以接收來自於該較低層之資料以及經由該接收控制器 以處理所接收之資料。該處理係根據結合在該傳送控制器 中之多個控制暫存器之設定而執行。程式指令在資料經由 該接收控制器而處理而,係作爲接收作爲修改多個控制暫 存器之控制訊號。程式指令係根據結合在該接收控制器中 多個控制暫存器之至少一個之修改而改變在該接收控制器 中所被處理之資料之處理,且該程式指令係作爲轉移該處 理資料。 線 本紙張尺度適用中國國家標準(CNS丨A4規格(210X297公釐) •15- ΐί浐部中央標绝局貝工消资合作社印紫 4 5744 A7 _________B7_ 五、發明説明(13 ) ' 本發明之另一觀察以及優點將由以下詳細描述,經結 合該附圖’藉由本發明原則之例子之展示,而變得明瞭。 圖形的簡單敘述: 本發明將以如下結合附圖之詳細描述而瞭解,其中該 參考號指定結構元件,且其中: 圖1A係一由該國際標準組織(I S0)所開發之— 開放系統互連(0 S I )層模組之圖示以描述在層間資訊 之交換。 圖1 β係一樣例乙太封包之圖示,該封包習知上係作 爲在網路上傳送資料。 圖1 C係一習知乙太媒介存取控制器(MAC)之系 統架構展示。 圖2係根據本發明實施例之流量爲基礎之媒介存取控 制器(MAC)之架構圖。 圖3係一根據本發明之一實施例之一邏輯核心所執行 之傳送、管理以及接收功能之更詳細方塊圖》 圖4係一根據本發明之一實施例之傳送器控制器的內 部架構之方塊圖。 圖4A係根據本發明實施例中含在圖4之傳送L L C 介面內之功能區塊之詳細方塊圖。 圖4 B係控制暫存器之展示例,該暫存器可包含在根 據本發明實施例之一控制暫存器區塊中。 圖4 C展示多個適合之旗標,該旗標係作爲致能以及 (許‘先閱讀背面之注意事項再填5«:?本頁} ---° 線 本紙張尺度適用中國國家標準(CNS ) Α4規格(2〗〇Χ297公釐) * 16 - ΛΌ /4 44 胃件~ :第 87 10183 9 號專利申請案 2. ;' :i;; 中文說明書修正頁 民國S9年2月呈 五、發明說明(14 ) 解除根據本發明之實施例的S U P E R M A C T x控制 器中所實施之處理功能。 圖4 D係根據本發明之一實施例之傳送C R C區塊之 更詳細表示。 圖4 Ε展示一共用控制/資料路徑區塊,以根據本發 明之實施例而自一適當多工器中接收十六位元寬之資料。 圖4 F係根據本發明之實施例之支援邏輯以及狀態機 器之方塊圖,該邏輯以及該機器係包含在一乙太處理方塊 中。 圖4 G係根據本發明之一實施例之對於圖4之傳送公 設區塊中所含之更爲詳係支功能區塊之方塊圖之展示。 圖5 Α係根據本發明之一實施例之經由以流量爲基礎 之MA C而傳送之四個封包之圖示。 圖5 B係一狀態機器圖,該圖係根據本發明之實施例 之圖4中之傳送公設方塊中所實施》 圖6係一流程圖,展示根據本發明之一實施例而經由 —資料路徑而結合在處理資料中之方法步驟。 圖7展示一流程圖,以展示根據本發明之一實施例中 結合在控制路徑處理之該方法步驟。 圖8 A係根據本發明之一實施例而在一乙太處理區塊 中所含之一載子控制狀態機器(F C S Μ )。 圖8 Β係根據本發明實施例,含在Ε Τ Η E R處理方 塊中之框控制狀態機(F C S Μ )。 圖9係根據本發明之一實施例而在一接收器 SUPER MAC Rx控制器中所含之功能區塊圖之展 示。 (請先閱讀背面之注意事項再填寫本頁) -· I I I I I I 訂-- -------i 本??,張义度这用中0國家槔準(CNS)A-丨规格(210 X 297公釐) -17- 457444 _____ B7__ 五、發明說明?5 ) 圖9 A係根據本發明之一實施例而對圖9之接收器 L L C介面之更詳細方塊圖。 (請先閱讀背面之注意事項再填寫本頁) 圖9 B係根據本發明之一實施例而含在一接收器控制 暫存器中之旗標之展示例。 圖9 C係根據本發明之一實施例而含在圖9之接收器 F C / G Μ ϊ I中結構之更詳細方塊圖。 圖9 D係根據本發明之一實施例而含在一接收公設方 塊內之更爲詳細功能方塊之方塊展示- 圖1 0係根據本發明之一實施例而對在以流程爲基礎 之M A C的接收側之資料流程展示之流程圖。 圖11係根據本發明之一實施例而結合在與資料處理 相平行之傳送控制的方法步驟的流程圖展示。 圖12係根據本發明之一賨施例而對於圖9接收器控 制區塊之處理執行之狀態機器。 圖13係根據本發明之一實施例之一封包產生器架構 使用者介面,以在傳送前建構封包資料。 圖1 4展示封包定義使用者介面例,以界定本發明實 施例之封包特性。 圖1 5 Α係根據本發明之一實施例而作爲顯示傳送以 及接收狀態之一狀態使用者介面窗口。 圖1 5 B係根據本發明之一實施例而作爲架構圖形屬 性所展示之一圖形架構窗口。 圖1 6係根據本發明之一實施例而作爲顯示所顯示封 包資料之一接收資料緩衝器窗口》 圖1 7係根據本發明之一實施例而作爲對於由接收^ 所接收之資料予以執行管理過濾功能之一封包處理器架_ 乂紙張&度適用中阉國家揉準(CNSM4規格(210 X 297公《 ) - 18 - 457444 A7 B7 ^^為貝Vi消费合作社印5i 五、 發明説明(16 ) 1 1 窗 □ 〇 1 1 圖 1 8係根 據 本 發 明 之 — 實 施 例 而作 爲 執行處理之樣 1 1 I 例 電 腦 系統之 方 塊 圖 〇 1 ;’· * if 1 1 主 要 元 件對照 表 ; 1 1 0 1 網路 資 料 系 統 匯 流 排 电 1 ψ 1 1 5 0 媒介 存 取 控 制 器 ( Μ A C ) •Λ 1 μ 1 1 0 4 網路 資 料 匯 流 排 介 面 控 制 器 1 1 0 T X 網 路 流 里 管 理 F I F 0控 制 器 Τί 1 1 1 0 6 多 重 封 包 係 列 F I F 0 T X 1 i 1 0 8 多 重 封 包 係 列 F I F 〇 R X 1 I 1 1 2 R X 網 路 流 量 管 理 F I F 〇控 制 器 1 訂 1 1 1 4 a β — R I S C 流 處 理 器 1 1 1 1 8 a T X 超 Μ A C 控 制 器 1 1 1 1 7 超 Μ A C 管 理 1 ! 1 2 0 R X 超 Μ A C 控 制 器 線 I 1 4 0 實 體 媒 介 i 1 4 1 實 體 媒 介 ί 1 0 2 管 理 控 制 匯 流 排 1 1 1 2 2 流 控 制 匯 流 排介 面 控 制 器 1 j 1 2 4 平 行 事 件 處 理 器 ( P E P ) 1 I 1 2 5 封包 緩 衝 器 1 1 1 1 2 6 指令 以 及 狀 態 暫 存 器 1 1 1 2 8 統 計 計 數 器 1 1 f 本紙張尺度追用中eg家榫缭(CNS ) Λ4規格(210X2W公釐) .19 , 4574 44 Δ7 Α7 Β7 :.-,i''!'t次標it1-局κ-ΐ消费合竹社印製 五、 發明説明 (17 ) \ 1 1 3 0 可 程 式 計 數 器 1 I 1 1 4 b β — R I S C 流 處 理 器 1 1 -2 2 0 傳 送 公 3/L αΧ jpp 塊 1 1 2 1 0 傳 送 控 制 區 塊 -:J· 1 2 1 2 乙 太 1 1 2 1 6 退 後 1 ! 2 1 4 延 遲 項 1 介 Μ i 2 0 2 傳 送 L L C 面 X L L C — Ϊ F C η. 本 i 2 0 4 傳 送 C R C X m t — C R C H 1 1 2 0 6 傳 送 F C / G Μ 1 1 X F C — G Μ 1 1 1 I 2 0 8 解 碼 器 1 I 2 5 2 傳 送 控 制 暫 存 器 ΐ^1 塊 1 訂 I 2 5 0 資 料 傳 送 區 塊 1 1 2 5 4 區 域 控 制 邏 輯 1 1 3 0 2 指 令 協 疋 暫 存 器 1 I 3 0 4 延 遲 週 期 暫 存 器 線 I 3 0 6 對 槽 暫 存 器 1 I 1 3 0 8 重 試 限 制 暫 存 器 1 1 3 1 0 可 程 式 最 小 / 1=1 取 大 封 包 尺 暫 存 器 1 1 2 5 8 C R C 計 算 U Μ X 1 I 2 5 6 資 料路 徑 1 1 2 6 0 多 工 器 1 1 2 6 3 -9 6 3 1 0 億 位 元 媒 介 獨 -JL-> 介 面 (G Μ 1 1 ) 1 1 2 6 2 ,9 6 2 光 纖 超 遠 1 1 1 本紙張尺度適用中ΚΚΐ:標卑(CNS ) Λ4規枋(2〗〇X297公釐) .20- β-y 4 7 4 44 A7 B7 .--中央栉汍场只工消聆合竹社印裝 五、 發明説明 ¢8 ) I ! 2 6 1 指 令 控 制 / 資 料 路 徑 1 l 2 6 4 狀 態 機 器 支 援 邏 輯 1 I 2 6 5 框 控 制 S Μ ( F C S Μ ) 1 2 6 6 載 子 控 制 S Μ ( C C S Μ ) 1 I 请 1 2 8 4 9 8 4 瀑 布 式 公 5Α. 叹 電 腦 -Ϊ 而 1 1 2 8 2 9 8 2 潛 狀 期 以 及 八 進 位 計 數 器 -¾ 1 ! 2 8 0 9 8 0 支 援 邏 輯 區 塊 -f: 1 I 9 0 2 接 收 器 L C C 介 面 R L L C _ I F C 'r: ! j. 1 9 0 4 接 收 器 C R C 檢 査 L C V — C R C Τί 1 1 9 0 6 接 收 器 F C / G Μ 1 1 R F C -G Μ 1 1 1 I 9 0 8 解 碼 器 i 1 9 1 0 接 收 器 控 制 區 塊 1 訂 I 9 2 0 接 收 器 公 設 1品 塊 1 1 9 5 4 接 收 器 公 設 邏 輯 1 f 9 5 0 資 料 傳 送 區 塊 1 I 9 5 2 接 收 器 控 制 暫 存 器 線 1 8 1 6 微 處 理 器 i! 1 8 2 0 R A Μ 1 1 8 2 2 R 0 Μ 1 1 8 1 8 記 憶體 匯 流 排 1 I 1 8 2 6 K B C 1 1 I 1 8 2 4 週 邊 匯 流 排 1 i 1 8 1 4 鍵 *n. 盤 1 1 1 1 1 本紙依尺度这川中因Κί標皁{ CNS ) A4規格{ 210/297公釐) A7 457444 B7 五、發明説明(I9 ) 較佳實施例之詳細描述: 本發明係描述一高速乙太媒介存取控制層積體電路核 心以及一排列封包接著封包方式而處理封包資料之方法* 該方式係允許同時處理資料資訊以及所結合之控制資訊。_ 亦揭示一媒介存取控制器,該控制器係特別適合執行封包 接著封包之流量管理以及正確執行熟練網路診斷測試。在 以下描述中,許多特殊之詳情皆設定以提供本發明之完整 瞭解。然而對於熟知此技藝者,本發明可在不需一些或這 些特殊詳情之下而被執行。在一些情形下,爲人熟知之處 理操作爲使本發明不變的不必要的怪異而並未被詳細介紹 0 圖2係一以流量爲基礎之媒介存取控制器(MA C ) 1 5 0之架構圖,該控制器係作爲根據本發明之一實施例 之高速傳送。在一較佳實施例中,十億位元速度之乙太傳 送係被考量。然而,一項使人注意之優點在於該架構可相 同應用至其他傳送協定以及較高速以及較低速傳送兩者之 上。如圖2所示,該 係與一網路資料系統匯流排1 0 1以及一管理/控制 匯流排1 0 2而相介面,其中1 0 1處理資料以及控制資 訊兩者,1 0 2傳送控制以及管理資料兩者。在優點上, 由於資料係經由網路資料系統匯流排1 0 1而傳送而應由 流量爲基礎MA C 1 5 0之各種處理區塊而被處理,控制 資訊亦可同時經由網路資料系統匯流排101而傳通。重 要的是以瞭解該平行處理之型態提供在任何指定時間內在 L-------I— ^1. I 、- II —- _ - I I - 丁 1^1 ^1.---.... Λν* ΐ Vo 續 f. .w^.li'lrj之.;ί.4-4ί.^1Η' 本頁) I.·'. .---1-- :光"9工消费合作^印" 本紙&尺度適出中SK家標卑(CNS ) Λ4現格(210x29?公釐) -22- 7-144 A? B7 五、發明説明卯) 以流量爲基礎MAC 1 5 0之內改變處理變數之能力(儘 管封包資料正被處理)。 舉例而言,假設資料正自上層L L C層而被接收,且 該資料正被經由各種處理區塊而被處理時,其中一先行欄' 以及一 C R C欄被接合以形成一封包。由於該流量爲基礎 MA C 1 5 0之平行處理特性,控制資訊可同步通過網路 資料系統匯流排1 0 1而修改仍未處理之封包部分。接著 ,該流量爲基礎MA C 1 5 0之平行處理特性可以將適當 之控制傳送以改變指定處理變數,而資料仍被處理。 首先參考傳送側,當資料開始經由網路資料系統匯流 排1 0 1而自上層L L C層而被初始接收時,資料被轉移 至一網路資料匯流排介面控制器(B I C ) 1 04。在此 實施例中,網路資料B I C 1 04可以是如從侍( slave )介面以及直接記憶體存取(DMA)板上(onboard ) 介面之 任一適 當介面 控制器 。如 所顯示 ,當 高效能 切換工作對於流量爲基礎MAC 1 5 0而言係需求時, 一第一資料/控制路徑1 4 4 a以及一第二資料/控制路 徑1 4 4 b可被使用以將網路資料匯流排介面1 〇 1與網 路資料BIC 104連接。舉例而言,第一資料/控制 路徑1 4 4 a可經使用以執行自較上層L L C層所轉移至 以流量爲基礎MA C 1 5 0,且第二資料/控制路徑 1 4 4 b可經使用以執行自以流量爲基礎MAC 1 5 0而 轉移至降上層L L C層。當然,亦考慮該一單獨雙向資料 /控制路徑可經使用以執行後述之控制以及資料轉移。 本纸張尺度迠用中^^:家標绛((:?^)六4規格(210,;!97公釐) -23- ...^^'^^!1'.,'之.;1-*.''-本.項4>|*1-:,大.玎) 訂 線:· 457444 A7 B7 "f:蚜卑局K二消费合作社印;^ 五、 發明説明 ) 1 1 — 旦 資 料 被 白 網 路 資 料 系 統 匯 流排而 傳 送 至 網 路 資 料 1 1 B I C 1 0 4 時 t 資 料 之 後 可 被 適 當 的 轉 移 是 一 多 封 包 1 1 I 佇 列 F I F 〇 T X 1 0 6 —- 般 而 言 * 1 J F I F 〇 T X 1 0 6 係 扮 演 — 作 爲 保 持 將 被 自 上 層 辛’ •.'Λ 1 1 L L C 層 而 經 由 網 路 資 料 系 統 匯 流排 1 0 1 而 傳 送 之 資 料 iTt i 之 匯 流排 C 在 此 實 施 例 中 F I F 〇 Τ X 1 0 6 1ST 取 好 % 1 I 具 有 儲 存 最 大 至 十 個 或 更 多 個 之 封包 資 料 D 此 對 於 習 知 單 ιϊ 再 t 1 I 封 包 F I F 〇 結 構 而 音 係 有 顯 著 的 進 步 該 習 知 結 構 傳 統 % 太 ! 上 不 可 容 納 具 有 由 本 發 明 之 一 實 施 例 而 以 十 億 位 元 速 度 ( Ti 1 1 即 + 1 0 0 0 Μ b P S ) 所 產 生 之 增 加 流 量 之 較 大 儲 存 1 1 需 求 0 1 I — 旦 一 適 當 數 g 之 封 包 被 緩 衝 放 入 F I F 0 1 訂 | 丁 X 1 0 6 時 —' 網 路 流 量 管 理 F I F 〇 T X 控制 器 1 1 1 1 0 經 執 行 以 管 理 白 F I F 〇 T X 1 0 6 而 速 流 1 I 入 — 微 R I S C 流 處 理 器 1 1 4 a 之 封 包 〇 在 一 較 高 水準 I 1 j 網 路 流 管 理 F I F 〇 T X 控 制 器 1 1 0 可 負 責 調 整 順 線 序 該 如 音 jtas 頻 視 its 頻 、 圖 形 等 之 正 經 由 網 路傳 送 之 不 同 形式 之 資 料 0 在 此 方 式 中 以 流 量 爲 基 礎 Μ A C 1 5 0 可 以 在 1 同 時 間 內 經 由 F I F 〇 丁 X 1 0 6 而 具 有 多 個 同 步 1 資 料 流 之 串 流 0 其 中 — 項 特色 當 封包 正 被 白 1 I F I F 〇 丁 X 1 0 6 讀 出時 任何 — 特殊封包 可 被在 1 I 不 讀 取 整 個 封包 之 下 而 被跳過 0 在另 一 項 特色 中 一 封包 1 1 可 藉 由 將 —- 指定 封 包保持 一 經 程式 化 之 時 間 而 白 1 1 F I F 〇 T X 1 0 6 中 重 m 傳 送 e 在 另 —_ 項 特 色 中 > 1 1 1 本紙乐尺度遥中囡®家標3M CNS ) Λ4規格(2丨0X29"?公釐) -24- 4574 44 A7 B7 ΟΛΙ.中次样免局β工消於合作社印" 五、 發明説明 P- ) 1 I 一 被讀 入F I F 〇 丁 X 1 0 6 之 封包可在被 傳送至爲 1 1 R IS C流 串 處 理 器 11 4 a 之 前 > 而被一次自 1 1 I F I F 0 T X 1 0 6 而取 出 1 在 另一 實 施 例 中 ,網 路流 管 理 F I F 0 T X控制器· + -’ % 1 1 1 10 適合 以 — V* 壞 狀序列 編 Φπη 號 策 略而計算在 而 丨 I F I F 0 T X 1 0 6中 白 上 層 L L C層所接收 之每個框 :i. •δ 1 Ϊ ( frame ) 。該環狀序列編! 號策略最好以一” 1 ’ ’而指定給 ήι \ 1 I 第 一個框, 而 以 對所 有向 上 至 — 預 設 數目(如1 ,2,3 太 A 4, 5, 6 t 7 … 2 0 ) 而 以 依 序數字向上之 方式而指 71 1 1 定 一數 字至 每 — 框 〇 在此例 中 該 預 設數字係” 2 0”。 1 I — 旦大 至2 0 之 框在 F I F 0 T X 1 0 6被接收時,該 1 I 下 —個 接收 到 之 框 將 再次 編 ηπΙΟ 爲 »» 1 ” 。接著,該 編號策略 1 訂 被 循環 1 1 因 此, 田 以 流 量 爲基 礎 Μ A C 1 5 0傳送至 一接收站 1 1 時 ,網 路流 量 管 理 F IF 0 丁 X 控 制器1 1 0 將保留指 1 t 定 至每 個框 之 數 字 且將 因 此 而 能 確 認該可能係在碰撞下 線 I 之 框的 數目 〇 舉 例 而 言, 假 如 框 數 g ” 5 ”係相 關於一碰 1 撞 ,框 5 - 2 0 可 被 直接 自 儲 存 ( 予 以緩衝著) 在 - 1 1 F IF 〇 T X 1 0 6而 被 直 接 在 傳 送。結果, 在傳送正 - 1 1 在 進行 時, 儲 存在 F IF 〇 T X 1 0 6之框將 "不被大 1 I 量 取出 "直 到 標 示 一 成功 傳 送 之 確 認 (A c k ) 訊號自一 1 1 1 接 收站 所接 收 C 假 如 一碰 撞 發 生 時 > 一標準後退 (backoff 1 1 ) 操作 之執行係 定 義 在該 8 0 2 * 3 之標準中。 1 1 在 另一 實 施 例 中 ,控 制 資 訊 可 接 合在於 I 1 1 本紙if、尺度这用中:標诠(CNS ) Λ4規格(210X 297公漦) -25- 4574 4 A7 B? ί;θ .¾.中,ν桴汍局只-τ·消资合竹.社印" 五、發明説明p ) FIFO Tx106所緩衝置放之封包內。以此方式, 該處理變數可以管線封包接著封包之基礎而被修改。舉例 …而言,該接合控制資訊可包含對於處理變數之修改以及作 爲挑出一修改之特別封包之資訊的確認。該優點在於具有·· ·· 一智慧網路流量管理FIFO Tx控制器11〇而使用 網路管理以及結合測試協定。雖然很少情況需要對於每個 連續封包改變之處理變數,但是其優點在於對於在封包流 之指定封包具有修改處理變數之能力係一有力之特色。 一旦網路流量管理FIFO Tx控制器11〇根據 所接收控制資訊而執行任何所請求之處理,則微R I S C 流處理器1 1 4 a良好的執行各種處理以及資料過濾工作 。舉例而言,微R I SC流處理器1 1 4 a以序列方式操 作而修改資料流特性。理想上,微R I S C流處理器根據 以流量爲基礎M A C 1 5 0而以3 2位元字元部份操作以 有效處理資訊以執行十億位元速度之效能。進一步,指令 最好觸發該位元組流。在此實施例中,微R I S C流處理 器1 1 4 a係適合於在如相關位元組計數模式之不同定位 址模式下操作。 內部上,微R I S C流處理器1 1 4 a最好具有一組 一般目的暫存器,資料結構暫存器,以及特殊功能單元。 舉例而言,該功能單元可包含一ALU,計數累積器,以 及和數檢查(checksum)計算單元。進一步,微R I S C 流處理器1 1 4 a最好具有能在一條件下,分支以及回路 模式等提供額外彈性以及進步效能下操作》最後,處理指 I----、------广------訂------線 (-,"聞u之 rvefIf!ff"3本万) 本紙乐尺度適用中囚S家標率() A4規格(2丨(V〆297公漦) -26- A7 B7 五、發明説明0 ) 令之微R I S C流處理器1 1 4 a可包含一些之發明性封 包欄操控。該操控例包括:CUT,CLEAR, COPY,APPEND,INSEERT,AND, OR,X〇R等以確認標頭產生,分離資料以及標頭,: I P_CHK S UM檢査以及長度計算。 現仍參考圖2,一旦適當之資料以及控制資訊在微 R Ϊ SC流處理器1 1 4 a中被處理時,資料則經由一資 料路徑1 13a而被傳送至一SUPERMAC Tx控 制器1 1 8,該控制器最好係一經架構以將自微R I S C 流處理器1 1 4 a所接收之封包予以處理並將所處理封包 輸出至一實體(PHY )媒介1 4 0之一狀態機器。如以 下將被詳細描述的,該傳送SUPERMAC Tx控制 器1 1 8主要將負責作爲執行管理工作之適當掛勾予以接 上並處理所請求封包結構之修改。以此方式,多種封包修 改以及管理操作可被良好的藉由以流量爲基礎 MAC150而被執行。 :-,^却中央^準局只3消於合作杜印製 'ii.w2iJL:'-*',r:之';ί.δ·ίί·項-fi^ll-.vlj 本石' ) 線 舉例而言,SUPERMAC Tx控制器1 18最 好調適爲以序列封包接著封包之方式而處理如”取消致能 ”先行添附,"取消致能” C R C添附,修改(如訂製城 市)內部封包間隙(IPG),以及程式化一最小封包尺 寸(如放大或縮小一標準6 4位元組封包最小至任何任意 數目)之封包修改。在此實施例中,封包修改控制可同步 的經由一控制路徑1 1 3 b而自微R I S C流處理器 1 14a而傳送至SUPERMAC Tx控制器1 18 本紙张尺度14用中SK家標CNS ) Λ4现格(210x297公釐) -27- 457444 A7 ____ 五、發明説明辟) 。如上述,具有在封包資料資訊(如路徑1 1 3 a )正被 處理時,同步傳送控制資訊(如路徑1 1 3 b )之此種能 力係允許SUPERMAC Tx與習知系統之以序列方 式而傳送控制以及封包資訊兩者之系統相反的而以封包接、 著封包爲基礎而執行處理之修改。 舉例而言,習知技術MA C a控制器一般傳送薑被應 用至序列接續著控制資訊之封包之初始控制資訊。接著, 在一MA C控制器中不允許對於封包處理之改變以及修改 。當然,當控制資訊被傳送時,封包資訊將被佇列,其將 不良的降低處理速度以及傳送速度。然而,該發明性的 SUPERMAC 丁X控制器118同時根據任何平行 所接收之控制資訊而處理封包資料以及修改處理。另一接 合在SUPERMAC Tx控制器118之優點特色將 被描述於後。 ·'.. r,-屮次打^巧·^-1'消灸合作·t-印- 圖2亦展示一SUPERMAC Tx管理區塊 1 1 7,該區塊係負責在傳送SUPERMAC Tx控 制器1 18以及接收SUPERMAC Rx控制器 120間之介面。SUPERMAC 管理區塊1 17亦 將網路流量管理F I FO Tx控制器1 1 〇、網路流量 管理FIFO Rx控制器112,以及網路資料 BIC 104之間予以介面。一般而言, SUPERMAC管理區塊117之功能係接收流量控制 資訊、自動協調指令、實體管理指令、以及暫停框資訊等 之介面(即,暫停框係作爲接收單元以提醒一傳送單元停 本紙张尺度迸用中國S家標準(CNS ) /\4说格(2丨0 X297公釐) .〇8 - 457444 A7 五、發明説明沣) 止該傳送資料直到一接收緩衝器以空出)。 在SUPERMAC管理區塊117之另一執行係鍵 結、啓動以及架構、同步碰撞、強迫傳送、以及鍵結監視 。且,SUPERMAC管理1 1 7係經良好調適爲自免·· ·· 自SUPERMAC Tx傳送直到 FIFO Tx 106被適當之載入,或一預設之時間 週期流逝。優點是,此使得封包被傳送至PHY媒介 14 0之速率被精確的控制。相對的,SUPERMAC 管理區塊117亦可在封包被FIFO Txl06所接 收之同時,而被設定爲傳送。 在此實施例中,SUPERMAC Tx控制器 1 1 8以及SUPERMAC Rx控制器1 20經展示 而鍵結至一第二微R I SC流處理器1 1 4b,該處理器 理想上係包含在一平行事件處理器(PEP) 124»在 此實施例中,發生在SUPERMAC Tx控制器 1 1 8以及SUPERMAC Rx控制器1 20內之適 當處理之事件可被轉換成微R I S C流處理器1 1 4b。 以此方式,該發生在該S U P E RMA C內之處理事件可 被儲存在PEP 124之適當統計計數器128中。 在接收側,微R I S C流處理器1 1 4 a亦展示對耦 至微R I S C流處理器1 1 4 b以監視以及記錄在以流量 爲基礎MA C 1 5 0之內以及之外而被處理之事件。傳統 上,資料係自包含一作爲將訊號解碼成將由 Rx SUPERMAC所接收之適當封包之解碼器之一 J---.------广------ir-------^… (^ΐ^ΓΛΐ'··'·*.:'1··之::is"Jfi、再 e'lvJ本 U ) 本纸張尺度追川中^压家行4*.( CNS ) Λ4^格(2〗0乂297公f ) -29- 4574 44 A7 B7 五、發明説明θ ) 實體(PHY)媒介141。如以下將被詳細描述的, SUPERMAC Tx控制器120—般係負責一例如 自該進來封包中除去先行(假如先行附在該傳送側)之功 能。 .. 且’ SUPERMAC Rx控制器120最好具有 傳送CRC欄至微R I S C流處理器1 1 4 a而不執行習 知除去功能之能力。假如發生的話,C R C移除可在傳送 該傳送封包資料至上層L L C層之前而由微R I S C流處 理器1 14a本身所執行。且,SUPERMAC R x 控制器1 2 0亦可執行I P G捕捉、時間戳記(stamped ) 接收,以及程式化一最小以及最大封包尺寸以避免以十億 位元或更大之速度而墊塞(paddmg)短封包或對大封包回 傳一錯誤。當然,假如要的話,墊塞移除可在 SUPERMAC Rx控制器120內執行。一旦 SUPERMAC Rx自實體媒介141接收一封包時 ,該封包將被傳送至微R I S C流處理器1 1 4以處理然 後傳至多封包佇列F I FO Rxl 08。 而在傳送側,在SUPERMAC Rx控制器 1 2 0以及微R I S C流處理器1 1 4 a兩者中執行之事 件係皆連接至對於在統計計數器1 2 8中之事件負責的微 RISC流處理器114b中"最好是,網路流量管理 FIFO Rx控制器112進一步具有指定一數目至由 FIFO Rx 108所接收之每一個封包。因爲 FIFO Rx控制器112知道指定至每個封包之數目 本紙張尺度中gg家標卑(CNS ) Λ4規格(210X2町公釐) -30- J--.-----——Λ.------‘玎------Μ (1?.?-圮请-!^'而irv-'^^vt'-M^r'i) 45744 4 at B7 五、發明説明辟) ,一控制訊號可傳送至F I FO Rx控制器1 1 2以請 求一儲存在F I FO R X 108之個別數目封包將被 傳送(即,傳送至LLC層或PEP124以便管理)。 —旦資料在一切換環境中自多重封包佇列F I F 0 R X · · 1 08中移出而傳送至網路資料B I C 1 04,則資 料將經由路徑1 1 4 b而傳至網路資料系統匯流排1 0 1 。當然,一單一雙向資料路徑可選擇性的使用在路徑 144a以及144b之處。 如上述,本發明之一優點係在於其平行資料以及控制 處理架構。在圖2,管理/控制匯流排1 02 —般係作爲 經由一分離專職流控制匯流排介面控制器(B I C ) 訂 線 1 2 2而傳送控制訊號以及執行網路管理工作。在此實施 例中,流B I C 1 2 2最好經製備以傳送控制資訊以及 執行資料管理工作。舉例而言,在執行一網路管理工作, 其必須經由網路資料B I C 1 0 4而自正在處理之封包 路徑中拉出(即,過濾)資訊之個別資訊封包。一旦該想 要之封包被確認時,其可藉由微R I S C流處理器 1 1 4 b而被過濾,該處理器設置在平行事件處理器( P E P ) 1 2 4 中。 微R I S C流處理器1 1 4 b最好亦負責程式化新的 事件,過濾想要的封包以及將想要之封包緩衝儲存在一適 當緩衝器中。且,微RISC流處理器114b係具有初 始可程式閘限(thresholding ),警示產生,以及偵測作爲 矩陣統計產生之流量之能力。此外,一硬體計數器之基本 本紙張尺度述州中^囡家標卑(CNS ) Λ4規格(2mx 297公釐) -31 - 457444 A7 B7 五、發明説明钞) 組合以可被提供以負責各種由微R I S C流處理器 1 1 4 b所執行之處理操作。 在此實施例中,網路管理操作一般係作爲決定如流通 量,公設使用,碰撞數目,交通流量特色等之所選擇網路·· 統計。優點是,簡單網路管理協定(SNMP),以及遠 端監視(RMON)皆可經由圖2之PEP 1 24而被 執行。如此技藝所爲人知的,RMON之監視允許一網路 管理者去分析各種交通統計以及網路變數以瞭解網路失誤 診斷,計畫以及效能細估。 -° 線 ί:ϋ.ψ"^"-.ι^Η-τ消资合作打印54 接著,PEP 1 24包含一創造性之封包緩衝器 1 2 5以儲存該藉由如SNMP以及RMON等網路管理 協定而製作之適當封包。舉例而言,假如使用者要監視經 由網路資料B I C 1 0 4而在正被處理之資料流中之一 確定封包,該微RISC流處理器114a以及114b 將過濾出被依序儲存在封包緩衝器中1 2 5之想要之封包 。亦包含在P E P 1 2 4中之係一指令以及狀態暫存器 1 2 6,例如該指令暫存器經由流控制B I C 1 2 2而 自管理/控制匯流排1 0 2接收結合控制訊號。 亦展示負責儲存可發生在SUPERMAC Tx控 制器1 18 ' SUPERMAC管理區塊1 17、 SUPERMAC Rx控制器120、微RISC流處 理器114a、微RISC流處理器114b中之個別事 件。接著,當封包被處理且事件發生時,該事件資訊係流 至微R I S C流處理器1 1 4 b而後儲存在統計計數器 本纸張尺度適圯中因^家標孪{<:?^)/\4規秸(210/297公$) -32- 4 5^44-4 a 7 B7 行;-.部中,¥樣涑局β Η消费合作社印1i 五、 發明説明(30 ) 1 I 1 2 8 e 且 > 多 個 可程式 化 計數 器 1 3 0 係位 在 P E P 1 1 I 1 2 4 以 記 錄 該 現在 爲 定 義 但將在 未 來定 義 之 新 事 件 0 1 1 總 之 > 藉 參 考 圖 2 而描述架構之 優 點 係 很 多 的 〇 廣 [ 言 之 » 該 理 想之 架 構 具 有 以 平行流 線 方 式 而 處 理 資 料以 及·: 1¾ t I 控制 資 訊 Q 此外 » 該 平行 處 理特色 當 封包 資 料 正 經 由 一 流 ίϊ 而 1 I 線 資 料路 徑 而 被 處 理 時 而允許使 用 者 執 行 想 要 之 管 理 工 Λ 1 1 I 作 〇 且 田 平行 處 理特性對於封包結 構 致能 一 以 線 上 封包 再 1 1 I 接 著 封包 爲 基 礎 之 修 改 ο 然 而此 想 要 之架 構 相 信 係可 特 別 Μ 未 1 良 好 工 作的 其 優 點 在 該 類 似之功能 可 藉 使 用 其 他 架 構 而 J! 1 1 被 兀 成 0 1 I 圖 3 係 —- S U P Ε R Μ A C C 0 R Ε 1 1 6 之 方 1 I 塊 圖 該 1 1 6 包 含 S U Ρ E R Μ A C Τ X 控 制 器 1 訂 I 1 1 8 S U P E R Μ A C 管理 區 塊 1 1 7 以 及 1 1 R X S U P E R Μ A C 控 制器 1 2 0 Q 在 一 實 施 例 中 ’ 1 1 S U P E R Μ A C T X 控 制器 1 1 8 包 含各 種 狀 態 機 器 1 I 1 各 負 責 處 理 S 上 層 L L C 層接收 之 資 料 、 以 及 負 責 在 該 線 被 處 理 之 封 包 被 傳 送 至 實 體 層之 刖 予 以 結 合 適 當 之 掛勾 ( hook ) 〇 相 似 的 > S U P Ε R Μ A C R X 控 制 器 1 2 0 j 1 在 該 接 收 側 與 該 實 體 媒 介 1 4 1 以 及 微 R I S C 流 處 理 器 1 1 1 1 4 a 以 及 1 1 4 b 以 及 S U P E R Μ A C 管 理 區 塊 1 1 1 1 7 通 訊 e 1 I 在 此 實 施 例 中 S u Ρ E R Μ A C 管 理 1 1 7 與 該 1 1 | S U P E R Μ A C T X 控 制器 1 1 8 以 及 1 ! S U P E R Μ A C R X 控 制器 1 2 0 介 面 以 將 各 種 傳 送 1 1 1 本紙張尺度適川中SS家樣i? ( CNS ) A4規格(210x297公釐) -33- 457444 A7 B7 -决標iv-局R-T-消於合作打印^: 五、發明説明 ) 1 1 以及 接 收之協 定予以同步。舉 例而言 t 自 動 協 商協定可 白 1 I S U Ρ E R Μ A C管理1 1 7 中 所控 制 以 將 同 步化該傳 送 1 1 以及 接 收網路 達到一最爲有效 以 及最 快 速 通 訊 的速度。 舉 1 I 例而 ,假如 一傳送器具有傳 送 十億 位 元 之 速 度而該接 收:; 1 1 器只 能 以1 0 0 M b p s而接 收 ,則 , 該 傳 送 器將自我 =m -M 背 而 I I 整至 符合該接 收器之最低速度 0 自動 協 商 亦描述在此處 作 1 ! I 爲參 考 之該I Ε Ε E 8 0 2 3 ( U ) 標 準 D 1 1 1 S U Ρ Ε R M A C管理區 塊 11 7 係 負 責 在封包自 il\ 本 1 S U P E R Μ AC Τ x控制 器 11 8 中 傳 出 而傳至 1 1 P Η Y 14 0時之控制。舉 例 而言 y S U P ERMA C 1 I 管理 塊1 1 7可與網路流量 管 理F I F 0 Τ X控制 器 1 1 11 0 相通訊 ,該1 1 0通至 多 重封 包佇 列 1 訂 \ F I F 0 Τ X 1 0 6何時 傳 送資 料 至 微 R I S C流 處 1 1 理器 1 14a 而何時傳送至S U Ρ E R Μ A C Τ X控 制 1 1 器1 1 8以便傳送。優點是, S UP E R Μ A C管理 1 I 11 7 具有當 多重封包佇列F I F 0 Τ X 1 0 6被 傳 線 送或 是 保持資 料時之控制。 因 此,一 旦 S U Ρ E R Μ A C管 理 1 1 7 指不 1 1 F I F 0 T X控制器1 1 0 該 資料 傳 送 係 適 當的時( 即 1 1 ,在 一 預設數 量之封包被儲存在 F I F 〇 T X 10 6 1 1 中之後 ),則 S U Ρ E R Μ A C 管理 區 塊 1 1 7可通知 該 1 | 傳送 未 被許可 。另一方面,S U Ρ E R Μ A C 管理區塊 1 1 1 11 7 亦可在封包被接收時, 而 允許 R I F 0 Τ X控制 1 1 器1 1 0自多 重封包佇列F I F 0 T X 1 0 6中將 封 1 1 1 本紙张尺度返)11中ES家標孪(CNS ) Λ4規格(2ΗΪΧ297公t ) -34- -央*:"-局消费合作·Η印^ 4 6 7 4 4 4 A7 _____B? 五、發明説明辟) 包傳送出來。以下介紹在SUPERMAC Tx控制器 118 (即傳送器側)以及SUPERMAC Rx控制 器1 2 0 (即接收側)中執行功能區塊以及處理功能之詳 細描述。 · 傳送側 圖4是根據本發明之一實施例之S U P E RMA C Tx控制器1 1 8內部結構之方塊圖。如所示,一 3 2位 元寬之資料路徑經展示以傳送至一傳送L L C介面2 0 2 (XLLC—IFC)。在傳送LLC介面202,各種 處理操作可以對將被自一上層L L C層中接收之資料予以 執行。舉例而言,由含在傳送L L C介面2 0 2中暫存器 之功能可包含:(1)程式化一想要之延遲週期;(2) 程式化一理想時槽(slot time )(即,後退單元);(3 )程式化一重試限制;程式化一最小以及最大尺寸等。 亦包含在傳送L L C介面2 0 2者係根據本發明之一 實施例而包含多個作爲修改封包處理之旗標的指令協定暫 存器302。舉例而言,指令協定暫存器302亦包含各 旗標,作爲(1 )致能/解除致能一先行產生以及添加( appending ); (b)致能/解除致能一CRC計算以及添 加:(c)致能/解除致能一載子擴展需求(即*該封包 至少爲512位元組長:(d)控制一全雙工模式;(e )致能/解除致能一自動墊塞功能;(f)致能一開始取 樣線功能;(g )執行一強迫傳送(即,強迫一碰撞以分 ^ i ί 線 f"'-"讀之泣-本.Jr!'再J11·"本 s ) 本紙張尺度適川中KSSi:標津(CNS ) Λ4規格(210Χ 297公釐> -35« 5^-^';.屮"^準局$工消费合作_打印" i a , A7 B7 五、發明説明垆) 析一網路回應):以及(h)致能該傳送處理。 接著說明資料路徑,根據本發明之一實施例,一 1 6 位元寬之資料匯流排將封包資訊傳送至一傳送C R C 204 (XMT — CRC) 。_旦該資料被傳送至傳送 CRC 204,一 CRC計算不是被執行,就是被送出 ,其取決於含在該指令協定暫存器中之C R C旗標設定。 應瞭解在封包資訊正被傳送以及向下處理該資料路徑時, 控制資訊以可同步的被傳送以在任何時間修改封包處理。 舉例而言,假如一封包正被在傳送CRC ·2 0 2中處理 之程序,且控制資訊(即,旗標係設爲TRUE = NO CRC)解除致能CRC在該CRC被添加之前而 被傳送時,沒有CRC將被附加在傳送CRC 202中 一旦資料經由傳送2 0 4而被處理時,該1 6位元資 料該被傳送至負責將所接收封包資訊處理成一適當形式以 經由一實體媒介傳送之一傳送FC/GMI I 206 ( XFC — GMI I)區塊。舉例而言,該以描述之高速以 流量爲基礎MA C 1 5 0最好具有同步以十億位元媒介 獨立介面(GM I I )形式以及以一光纖頻道形式而傳送 。當然,應瞭解該十億以流量爲基礎MA C 1 5 0亦向下 相容於10Mbps系統。 舉例而言,傳送亦被以媒介獨立介面(Μ I I )形式 而執行,且傳送亦可在一時間時以一形式而被執行。即, 儘管可能是同步傳送,GM I I或光纖頻道傳送可在一 -1^^^^之:iv:c-4i.J'h再"'.^本 ) 線 本紙張Λ度进用中KS家標卑(CNS ) Λ4規格(210X297公釐) -36- 4 5 7 4 4 -l. A7 B7 ;--'^..部中^行汰^員-7-消費合作社印4,1冬 五、發明説明04 ) 時間時被執行一個形式。假如’傳送係經由一光纖頻道傳 送而被執行,其必須執行一在編碼器2 0 8中編碼之適當 光纖頻道,該2 0 8係接收一 1 6位元寬資料線以及輸出 —光纖頻道特別是1 0位元寬輸出。優點在於該由編碼器 2 0 8所執行之功能可選擇性的在一媒介獨立傳送F C/ GMII 206中執行而不需一分離之編碼器單元。 當資料經由區塊202,204以及206而被傳送 ,一雙向通訊鍵結2 0 3係在區塊2 0 2以及含三個此處 稱爲乙太112,BACKOFF 216,以及 DEFER 2 1 4之處理區塊之一傳送控制區塊2 1 0 之間而維護=進一步展示的是兩個分離通訊鍵結2 0 5以 及2 0 7,該2 0 5以及2 0 7係個別作爲自傳送控制區 塊2 1 0而與傳送L L C介面2 0 4以及傳送 FC/GMII 206相通訊。一般而言,通訊鍵結 2 0 5以及2 0 7係作爲在以下述封包接著封包爲基礎而 在區塊1 0 4以及2 0 6中控制以及修改處理操作。 ETHER 212—般係負責藉由確保對於框以及 封包之適當乙太標準被滿足而經由以流量爲基礎 MA C 1 5 0而維護正被處理框之整合。在一較高之水準 ’ETHER:(a)確保在當媒介係未處於忙碌下該框 被傳送;(b)決定是否發生碰撞;(c)假如發生碰撞 執行塞滿;(d)決定是否需要載子擴展;以及(6)在 滿足延遲以及後退後重送框。在封包準位, ETHER212亦可:(f)假如需要的話產生一先行 本纸心度適針(料ΰ、Ν5 )_Λ提格(2mx 297公楚) ^37- J——*------A-------、π-----1 ^ (^,^¾¾.¾ 而之;i.w®.Jn再^-,ν-Γ太万) 45744a A7 B? 五、發明説明(35 ) ’ (g)假如需要的話產生CRC:以及(h)對碰撞檢 查。在一實施例中,該由所執行之工作一般係由將在以下 _更爲相加介紹之適當狀態機器而使ETHER 2 12被一 般的執行。當然,該由ETHER2 1 2所執行之處理可 在任何時間藉由傳送控制資訊而與資料處理平行而被修改 〇 在某些例子時,該具有瞬間對於先行以及C R C產生 解除致能之能力可允許使用者在網路上執行各種管理診斷 。舉例而言,當先行以及C R C兩者皆被解除致能時,該 以流量爲基礎MAC 1 5 0將完全傳送原始資料而不處理 。藉由此架構,重要的診斷測試以及管理操作可在該傳送 資料上被執行(即,該資料被傳送而無先行以及C R C ) 。在另一實施例,一使用者可載入一位元圖樣序列以執行 相位鎖住回路(P L L )檢查,以及各種雷射光學檢査。 實際上,以上描述之測試功能可藉由執行該由 SUPERMAC CORE 116之致能而執行各種 掛鉤之適當軟體使用者見面而完成。此外,該上述之測試 可在不使用昂貴習知測試設備下而被執行。Today, there is a wide range of standards-compliant Ethernet products that are used to receive, process, and transmit data over the Ethernet network. For example, these network products are traditionally integrated into network computers, network interface cards (NICs), 'routers', switching hubs, bridges, and repeaters. Until recently, the average data transmission speed via Ethernet was 1 Mbps (Million Bits per Second (Mbps) «However, in order to meet the need for fast data transmission speeds • The IEEE -4-{谙 Read first and pay attention Please fill in the details on this page) This paper size is in accordance with Chinese National Standard (CNS) A4 format (210X297 mm) 457444 A? B7 V. Description of the invention (2) 8 0 2. 3 In May 2015, the "IEEE802.3U standard" was proposed. This standard is also known as the "100 Base T Fast Ether" standard because it can be implemented at data transfer rates up to 1000 Mb ps. Figure 1A is an open system interconnection (OS I) layer module 10 developed by the International Organization for Standardization (I SO) to describe the information exchange between the layers. The 0 S I level module 1 0 is particularly useful for separated technical functions1 and thereby modify and update the specified level without disrupting the function of adjacent levels *. At the lowest level, the 0 S I module 10 has a physical layer 12 which is responsible for encoding and decoding data into information transmitted via a special medium. As is known in the art, the physical layer 12 is also referred to as the "P Η Y layer". Printed by the Ministry of Defence Standards Bureau, Consumer Cooperatives ^ (Read the notes on the back and then fill in the β book I) The line is above the physical layer 12 and a data bond layer 14 is defined to provide Reliable transmission of data over the network implements appropriate interfaces with a physical layer 12 and a network layer 16. As shown, the data bonding layer 1 4 generally includes a logical bonding layer (L L C) 1 4 a and a medium access control layer 14 b. LLC level 14a—Generally a software function to connect control information with data transmitted from network level 16 to MAC level 1 4 b. On the other hand, MAC level 1 4b is responsible for scheduling. Send and receive data on one click. Therefore, the MA C level 1 4 b mainly controls the data flow on the network to ensure that the transmission error is detected to ensure that the transmission system is properly synchronized. As is well known in the art, MA C level 1 4 b—usually uses the well-known carrier-sensing multiple access with collision detection (C SMA / CD) algorithm to apply Chinese national standards (CNS) to actual paper sizes. ) Α4 specification (210 × 297 mm) -5- grams printed by the Central Bureau of Standards Consumer Consumption Cooperative Association 457444 A7 _ B7_______ V. Description of the invention (3) The access data of the body layer 12 is used for scheduling and control. The network layer 16 is responsible for setting a data path 'between nodes of the network,' initializing 'maintenance among users connected to these nodes, and terminating a communication link. The transmission layer 18 is responsible for performing data transmission at a different service quality level. For example, a traditional software protocol used to perform transport layer 18 functions can be TCP / IP, Novell IPX and NetBeui «session layer 2 0 is when a user can determine whether the user's function is full dual Full-duplex or half-duplex transmission to transmit and receive data for control. The presentation layer 22 is responsible for translating, converting, compressing and decompressing the data transmitted through the media. For example, the functions of the presentation layer 22 are generally performed by computer operating systems such as Unix, DOS, Microsoft Windows 95, Windows NT, and Macintosh 0S. Finally, the application layer 24 provides the user with an appropriate interface to access and connect to a network. Figure 1B is a diagram of a traditional Ethernet packet as a data transmission via the network. The packet generally contains a preamble 30, which is traditionally an 8-bit leader. The initial frame boundary (not shown) follows the last byte (or octet) of the preceding text. In the starting frame boundary octet, a destination position (DA) 3 2 which is traditionally one of 6 bytes is used as a node confirming that the Ethernet packet will be received. After DA 3 2, it is a source address (S A) 3 4 which is generally a 6-byte leader, and S A 3 4 is a transmission node that confirms directly on the transmission packet. After the SA34, a length / type column (L / T) 36 (generally 2 bytes) is generally used as a label to indicate the length of the next data field and the size of the paper scale. S ΚΪ ## · ( CNS) A4 ^ (210X297 ^) ΤβΊ '~ --------- k ------ IT ------ 0 (For details, please read the precautions of 16 and then the poor) The Ministry of Justice, the Ministry of Justice, and the TK Industrial and Consumer Cooperation Du printed 4 p 7 4 4 4 Α7 Β7 Five 'invention description (4) state. As is known in the art, if the length is known, the packet is classified into 802.3 packets, and if the type field is provided, the packet is classified as an Ethernet packet. Since the following data field also contains the information that can be edited by the L L C layer 1 4 a :: Code information ’, this field is identified as L L C data 38. As is well known in the art, if a given Ethernet packet is smaller than 64 bytes, most media access controllers add 1's and 0's after the LCC data to add ether. The size of the packet is increased to at least 64 bytes. Once charge 40 is added, if necessary, a 4-byte repeat check (CRC) column is added to the end of the packet to check for damaged packets at the receiving end. As used herein, a "framework" should be interpreted as a sub-portion of the data contained in a packet = as previously stated 'Because the MA C layer 1 4 b is responsible for controlling the data flow on the network, the MAC layer 1 4 b—Generally responsible for encapsulating the received LLC data 38 with an appropriate preamble 30, DA32, SA34, DFL36, Pad40, and CRC 42. A further 'inner packet gap (I PG) is used as an acknowledgement-a span of time between transmitted Ethernet packets. Conventionally, the IPG is a fixed frame defined by the 802.3 standard and placed by an appropriate MA C layer 14b. For further information on Ethernet communication technology, please refer to the equipment and method of full-duplex Ethernet communication with US Patent Nos. 5,3 ii '1 14 and 5,504,738. " These patents are here for reference. Figure 1C is a conventional Ethernet media access controller (MA C) 50 0 This paper size is applicable to China® Home Standard (CNS) A4 specification (210X297 public attack:> (讦 先Please read the notes on the back and fill in this page again). 457444 A7 iii. Printed by the Central Bureau of Standards, T.Bigong Consumer Cooperative ^ __B7_V. The system architecture of the invention description (5). As shown, MA C 5 0 Includes a transmit (Tx) MAC controller 54 as processing data received from an upper LCC layer, and a receive (Rx) MAC controller 56 to process Ethernet packets received from a physical media 84. By On the transmission side, the data: The material is generally received from the upper LCC layer via the system bus 78. As shown, all data transmitted to the MA C 50 is sent to a bus via a path 52. Interface controller 7 4. In addition, the control and command signals are generally also It is transmitted to MA C 50 0 in a serial manner by path 52. Once the data is transmitted to the bus interface controller 74, the data is transmitted to a TxFIF062, which is to be received from the upper LCC layer Buffers for data retention. — In general, both Tx FIFO 62 and Rx FIFO 64 have FIFO control blocks 66 and 68 to transmit control information to the MAC controller 54 and to be stored in TxFIF062 and The transfer of the data stored in RxFIF068 is triggered. Therefore, in the conventional MA C architecture, once a selected processing control is transmitted to the T xMA C controller 5 4 or RxMAC controller 56, the special control information will be It is still "set control" as the default number of Ethernet packets. Then, the processing operations performed by TxMA C controller 54 and R zMAC controller 56 can not be modified during each individual frame transmission ( It can only be modified between transmissions.) Further shown are the instruction status register 72 and the statistical counter 70, the 72 and 70. The conventional system is responsible and aligned on the I and III lines ( #Read the precautions on the back before filling the sheet.) This paper size applies to Chinese National Standards (CNS) A4 specifications (210X297 gong) -8- 4g7444 Printed by the Industrial Standards Bureau of the Ministry of Economic Affairs I7 Consumer Cooperatives (6) The processes performed by the T xMA C controller 54 and the R xMA C controller 56 are tracked. In this conventional MA C design, path 5 2 is generally used as both data transmission and control signals. However, when the information stored in the command status register 72 and the statistical counter 70 is accessed, any data or control signals that are being transmitted to the TxMA C controller 54 will be suspended (which must be Slow down the network). Next, the management of the instruction status register 72 and the statistics controller 70 will also be completed to be used by path 52. Although the conventional MA C architecture 50 can work well, further improvements in processing increased data traffic, processing important flow control events, and processing management and network diagnostic events have been required. This feature is especially needed when the network speed continues to increase. For example, in today's technology, Ethernet does not even attempt to control the flow of work, and most of the data transmission is performed by point-to-point dump through the two selected bonds. That is, once the transmission parameters are set to perform the required processing (that is, the packet architecture variables are set), the sender will continuously pour the packets through the network until the user wants to update the transmitted packets Structural variables. Therefore, if an update is required, the change to the process must be transferred from the LCC layer down to the MAC layer via the same transmission path. However, when both control and data are transmitted via a processing path, the data and control must compete for bandwidth and only one is processed at a time. Then, once a packet transmission or reception function is initialized, the processing variable may not be changed. Know-how of the processing of the Ethernet MA C layer (Notes for reading 5LW) (restructure 3 pages), va-thread paper size applies Chinese National Standard (CNS) A4 specification (210X297 mm) 457444 red ' -'· &Quot; Printed by the Industrial and Commercial Cooperatives of the Bureau of Standards and Decisions of the Ministry of Justice ^ A7 B7 V. Description of the Invention (7) A further disadvantage is that once an incorrect packet is transmitted, it is generally unavoidable or skipped. Therefore, the receiving side must handle more error-prone packet processing. Further, the Ethernet MAC layer of the conventional art is currently unable to process a large stream of packets when the receiving side of the MAC: layer. As is known in the art, the size of the buffer in the MA C layer was increased in previous attempts to solve the problem. Although increasing the size of the buffer can slow down the problems of the prior art 1 OMb ps and 1000Mb ps Ethernet systems, increasing the buffer size is no longer a reasonable answer to the need for increased data traffic. It is further pointed out that the ethernet system of this know-how currently does not have a network management program with a proper level of network execution diagnostic capabilities. For example, when network diagnostics and execution features are performed, network management programs typically perform expensive diagnostics and network detection equipment, which is too expensive to analyze for a normal-sized network. As a result, network management programs are generally selected to update the entire Ethernet system before attempting to resolve network performance errors and flow control restrictions. After observing the above, when the packet is transmitted or received, the media access control (MAC) layer processing method that allows online packet to packet data information and control information processing to modify the characteristics of a packet, and Equipment is required. In addition, a method and a device for the MAC layer processing that allow the user to manage the packet data stream transmitted and received through the network and correctly perform the proficient detection test are needed. < Read the review on the back; I will fill in this page first)) This paper size applies to China National Standard Car (CNS) A4 specification (210X297 mm) -10- 457444 α7 Β7 ¾ ^. ¾. Printing of the Central Standards Bureau Consumer Cooperatives V. Description of the Invention (8) Description of the Invention: In one embodiment, a media access controller will be disclosed. The media access controller includes a transmission media access controller. The controller is configured to process the output packet data received from the received data for transmission to the upper layer of the physical layer. A receiving media access controller is structured to process the input packet data received from the physical layer for transmission to the upper layer. A plurality of packets are transmitted to queue FIF0 to receive output packet data from the upper layer before transmitting to the transmission media access controller. A plurality of packet queues F I F0 are received to receive the input packets received by the receiving medium access controller. The media access controller further includes a media access controller management program that interfaces with the transmitting and receiving media access controllers. The media access controller management system is responsible for transmitting and receiving multiple packet queues FIF0. And manage the packet data stream. In another embodiment, a network interface system as a communication over a network will be disclosed. The network interface system includes a media access controller to process transmission data received from an upper layer and to transmit processed transmission data to a lower layer, and to receive data received from a lower layer to Process and transfer the processed received data to the upper layer. The media access controller is structured to monitor the data flow between the upper and lower layers. The network interface further includes a data bus to communicate with the data and data control information between the upper layer and the media access controller "-the management control bus is to be located at the upper layer and the media access controller Communication between management control information, the management control bus has nothing to do with the data bus. L --------------- 1Τ ------ ^ (诔 Please take note of the fleas first, then fill in the paper 莨) This paper size applies to China National Standard (CNS) Α4 specifications (210 × 297 mm) -11-457444 Λ7 Β7 Printed by the Consumers' Cooperative of the Central Standards Bureau of Shao Yin Ministry 5. Description of the invention (9) In another embodiment, a media access controller will be disclosed as processing data A method for transmitting requests, receiving data requests, and monitoring data flow to a media access controller. The media access controller is architected to communicate with upper and lower layers. The method includes integrating a first bus to transfer data to and from one of the media access controllers. When the data transfer is being performed, a second bus, which communicates management control requests, is integrated into the media access controller. The second bus is coupled to a parallel event processor, which contains A microprocessor as a filter for selected data to be transmitted via the first bus. In another embodiment, a transmission medium access controller is disclosed. The transmission medium access controller includes a transmission interface unit structured to receive packet data from an upper layer, transmit a control signal, and control information. A transmission controller processes the packet data based on the control information received from the upper layer. The transmission control block is coupled to the transmission interface unit in two directions. A transport public block is used for monitoring and processing events in the transport control block. A transmission loop repeat check unit is structured to receive packet data from the transmission interface unit. The transmission loop repeat check unit is in communication with the transmission control block. The transmission medium access controller further includes an interface unit, which is structured to receive packet data from the transmission cycle repeat inspection unit before being transmitted to a physical layer. In another embodiment, a media access controller that has been structured to communicate with an upper layer and a lower physical layer will be disclosed. The media access controller includes a transmission controller to receive and process data transmission requests from an upper layer, and output the received data to the physical layer. The method contains from above ---. ------------ 1Τ ------ 0 (诮 Please read the note on the back first, and then fill out this page) The paper size is in accordance with the Chinese national standard (CNS > Α4 size ( 210X297mm} -12- Central sample of the Ministry of Super-Shanghai " Printed by Bureau of Off-line Consumer Cooperatives ^ 457444 A7 __. _B7_ V. Description of the invention (10) The layer receives data and processes the received data through the transmission controller. The execution of the processing is based on the settings of a plurality of control registers attached to the transmission controller. A control signal is received to modify at least one of the plurality of control registers and the data is processed via the transmission controller. The method further includes changing the processed data in the transmission controller according to the modification of at least one of the plurality of control registers attached to the transmission controller and outputting the processed data. In another embodiment, a transmission medium access controller will be disclosed. The transmission medium controller includes a transmission interface unit, which is structured to receive packet data from upper layers, transmit control signals and control information. A transmission control block includes a state machine to process the packet data. The processing is based on the control information received from the upper layer * and the transmission control block is bidirectionally coupled to the transmission interface unit. A transmission public block is used for monitoring and processing events in the transmission control block. A transmission loop repeat inspection unit is structured to receive packet data from the transmission interface unit. The transmission control block is in communication with the transmission cycle repeat check unit. The transmission medium access controller further includes a transmission fiber channel and a gigabit medium independent interface unit, and is structured to receive the packet data from the transmission cycle repeat check unit before the packet data is transmitted to a physical layer. In another embodiment, a controller is used to control data transfer between the physical layer and the upper layer. The controller includes a transmitter for transmitting data packets between the upper layer and the physical layer. The transmitter is structured to selectively Insert gaps between sequence data packets. The controller further includes a delay period register, which can be selectively written to indicate that it will be transmitted to the actual {count the precautions on the back first and then fill the {page). National Standard (CNS) A4 specification (210X297 mm) -13- 457444 A 7 B7 Ministry of Justice Standards Bureau Shellfish Consumer Cooperatives Co., Ltd. Printing and V. Description of invention (11) Intermediate packets inserted between the body's sequence packet data Gap period D. The delay period register is modified when the transmitter transmits data packets between the upper layer and the physical layer. In another embodiment, a media access controller 'the controller' will be revealed Data transfer between the physical layer and the upper layer. The media access controller includes a transmitter to transmit data between the upper layer and the physical layer. The media access controller further includes a retry limit register. The register can selectively program the number of transfers of the media access controller before the upper layer and the physical layer skip data transfer. The advantage is that the number of transmission attempts by the media access controller can be adjusted upwards to avoid jumps during high traffic cycles. In another embodiment, it will be revealed that a media access controller has been structured to communicate with upper and lower physical layers. The medium access controller includes a receiving controller to process the transmission request from the upper layer and to process the received data from the physical layer. One method for receiving data processing modifications in the receiving controller includes processing the data through the receiving controller, which processing is performed according to the register settings contained in the receiving processor. When the data is processed by the receiving controller, the control signal as a modification register is transferred to the receiving controller. The method further includes changing processing of the data processed in the receiving controller according to the modification of the register included in the receiving controller. In a further embodiment, a receiving medium access controller will be disclosed. The receiving medium access controller includes a physical medium receiving interface unit for receiving packet data from a physical medium and permitting optical fiber channels. ¾. ^ Read the back of the book; 1 fill in the meaning of the β book.} The paper size of the book is applicable to the Chinese National Standard (CNS) A4 specification (2 丨 0X297 public cage). ^ A7 _B7 V. Packet information in one of the (12) format and one billion-bit media independent format will be received. A receiver cycle repeat checker is structured to receive the packet data from the physical media receiving interface unit. A receiving interface unit is structured to receive the interface unit from the physical medium and the receiver periodic repeat checker: receiving packet data. The receiver interface unit is structured to receive multiple transfer control signals and control information from the upper layer. The receiving medium access controller further includes a receiver control block to process the received packet data according to the received transfer control signal and the received control signal. The receiver control block communicates with the receiver interface unit and the physical medium receiving interface unit. It also contains a receiver block to monitor and handle events in the receiver control block. In another implementation, a computer-readable medium will be disclosed including program instructions to drive a media access controller that has been communicated with the upper and lower physical layers through the architecture. The media access controller includes a receiving controller To receive and process requests for received data from lower layers and transfer the received data to the upper layers. The computer-readable medium contains program instructions' to receive data from the lower layer and to process the received data via the receiving controller. The processing is executed according to the setting of a plurality of control registers incorporated in the transfer controller. The program instructions process the data through the receiving controller and are used as receiving control signals to modify multiple control registers. The program instructions change the processing of the data processed in the receiving controller according to the modification of at least one of the plurality of control registers incorporated in the receiving controller, and the program instructions are used to transfer the processing data. The paper size of the paper is in line with the Chinese national standard (CNS 丨 A4 specification (210X297 mm) • 15- Central Department of the Ministry of Standards of the People's Republic of China, Peigong Consumer Cooperatives Co., Ltd. Yinzi 4 5744 A7 _________B7_ V. Description of the invention (13) Another observation and advantages will be made clear by the following detailed description, which will be made clear through the illustration of an example of the principles of the present invention in conjunction with the accompanying drawings. A brief description of the figures: The present invention will be understood in the following detailed description in conjunction with the drawings, in which The reference number specifies the structural elements, and among them: Figure 1A is a diagram of an Open System Interconnection (0 SI) layer module developed by the International Standards Organization (ISO) to describe the exchange of information between layers. 1 β is a diagram of an example of an Ethernet packet, which is conventionally used to transmit data on the network. Figure 1 C shows a system architecture of a conventional Ethernet media access controller (MAC). Figure 2 The architecture diagram of a traffic-based medium access controller (MAC) according to an embodiment of the present invention. Figure 3 is a diagram of the transmission, management and reception functions performed by a logical core according to an embodiment of the present invention Detailed Block Diagram "Fig. 4 is a block diagram of the internal structure of a transmitter controller according to an embodiment of the present invention. Fig. 4A is a block diagram of functional blocks included in the transmission LLC interface of Fig. 4 according to an embodiment of the present invention. Detailed block diagram. Figure 4 shows an example of a control register, which can be included in a control register block according to one embodiment of the present invention. Figure 4C shows a number of suitable flags. The flag is enabled and (Xu's first read the notes on the back and then fill in 5 «:? this page} --- ° The size of the paper is applicable to the Chinese National Standard (CNS) Α4 specification (2〗 〇 × 297mm) * 16-ΛΌ / 4 44 Stomach piece ~: Patent application No. 87 10183 9 2. ; ': I ;; Revised page of the Chinese manual, February 9th, Sept. V. Description of the invention (14) The processing function implemented in the SU P E R M A C T x controller according to the embodiment of the present invention is released. FIG. 4D is a more detailed representation of transmitting a C R C block according to an embodiment of the present invention. Figure 4E shows a common control / data path block to receive sixteen-bit wide data from a suitable multiplexer according to an embodiment of the invention. Figure 4F is a block diagram of the support logic and state machine according to an embodiment of the present invention, the logic and the machine being included in an Ethernet processing block. FIG. 4G is a block diagram showing more detailed functional blocks included in the transmission public block of FIG. 4 according to an embodiment of the present invention. FIG. 5A is a diagram illustrating four packets transmitted via a traffic-based MA C according to an embodiment of the present invention. Fig. 5 B is a state machine diagram, which is implemented in the transmission public block in Fig. 4 according to an embodiment of the present invention. "Fig. 6 is a flowchart showing a data path according to an embodiment of the present invention. The method steps combined in the processing of data. FIG. 7 shows a flowchart to illustrate the steps of the method in combination with control path processing according to an embodiment of the present invention. FIG. 8A is a carrier control state machine (F C S M) included in an Ethernet processing block according to an embodiment of the present invention. FIG. 8B is a frame control state machine (F C S M) included in the E T Η E R processing block according to an embodiment of the present invention. FIG. 9 is a diagram showing a functional block diagram included in a receiver SUPER MAC Rx controller according to an embodiment of the present invention. (Please read the notes on the back before filling in this page)-· I I I I I I Order-------- i? ? Zhang Yidu uses the China 0 standard (CNS) A- 丨 specifications (210 X 297 mm) -17- 457444 _____ B7__ 5. Description of the invention? 5) FIG. 9A is a more detailed block diagram of the L L C interface of the receiver of FIG. 9 according to an embodiment of the present invention. (Please read the precautions on the back before filling this page.) Figure 9B shows an example of a flag included in a receiver control register according to an embodiment of the present invention. FIG. 9C is a more detailed block diagram of the structure contained in the receiver F C / G Μ ϊ I of FIG. 9 according to an embodiment of the present invention. Fig. 9 D is a block diagram showing a more detailed functional block included in a receiving public block according to an embodiment of the present invention-Fig. 10 is a flow-based MAC according to an embodiment of the present invention Flow chart showing the data flow on the receiving side. Fig. 11 is a flowchart showing steps of a method of transmission control in parallel with data processing according to an embodiment of the present invention. Fig. 12 is a state machine for processing execution of the receiver control block of Fig. 9 according to one embodiment of the present invention. FIG. 13 illustrates a packet generator architecture user interface according to an embodiment of the present invention to construct packet data before transmission. Figure 14 shows an example of a packet definition user interface to define the packet characteristics of an embodiment of the present invention. FIG. 15A shows a user interface window as one of the states of transmitting and receiving according to an embodiment of the present invention. Figure 15B is a graphical architecture window shown as an architectural graphics attribute according to an embodiment of the present invention. FIG. 16 is a view showing a received data buffer window as one of the displayed packet data according to an embodiment of the present invention. FIG. 17 is a view showing the management of data received by a receiver according to an embodiment of the present invention. One packet processor rack with filtering function _ 乂 paper & degree applicable to China 阉 national standard (CNSM4 specifications (210 X 297 public "")-18-457444 A7 B7 ^^ printed by Bei Vi Consumer Cooperatives 5i V. Description of the invention ( 16) 1 1 Window □ 〇1 1 Figure 18 is a block diagram of a computer system according to the embodiment of the present invention—an embodiment 1 1 I Example computer system 〇1; '· * if 1 1 Main component comparison table; 1 1 0 1 Network data system bus power 1 ψ 1 1 5 0 Media access controller (Μ AC) • Λ 1 μ 1 1 0 4 Network data bus interface controller 1 1 0 TX Network flow management FIF 0 Controller Τί 1 1 1 0 6 Multiple packet series FIF 0 TX 1 i 1 0 8 Multi-packet Series FIF 〇RX 1 I 1 1 2 RX Network Traffic Management FIF 〇Controller 1 Order 1 1 1 4 a β — RISC Stream Processor 1 1 1 1 8 a TX Ultra M AC Controller 1 1 1 1 7 Ultra M AC Management 1! 1 2 0 RX Ultra M AC Controller Line I 1 4 0 Physical Media i 1 4 1 Physical Media ί 1 0 2 Management Control Bus 1 1 1 2 2 Flow Control Bus Interface Control 1 j 1 2 4 Parallel event processor (PEP) 1 I 1 2 5 Packet buffer 1 1 1 1 2 6 Instruction and status register 1 1 1 2 8 Statistics counter 1 1 f CNS Λ4 specification (210X2W mm). 19, 4574 44 Δ7 Α7 Β7:. -, i ''! 't subscript it1- Bureau κ-ΐ Consumption printed by Hezhusha V. Invention description (17) \ 1 1 3 0 Programmable counter 1 I 1 1 4 b β — RISC stream processor 1 1 -2 2 0 Transfer male 3 / L αχ jpp block 1 1 2 1 0 Transfer control block-: J · 1 2 1 2 Ether 1 1 2 1 6 Back off 1! 2 1 4 Delay term 1 Introduction Μ i 2 0 2 Teleport LLC plane XLLC — Ϊ FC η. I 2 0 4 transmit CRCX mt — CRCH 1 1 2 0 6 transmit FC / G Μ 1 1 XFC — G Μ 1 1 1 I 2 0 8 decoder 1 I 2 5 2 transmit control register ΐ 1 block 1 Order I 2 5 0 Data transfer block 1 1 2 5 4 Area control logic 1 1 3 0 2 Instruction register 1 I 3 0 4 Delay period register line I 3 0 6 Slot register 1 I 1 3 0 8 Retry limit register 1 1 3 1 0 Programmable minimum / 1 = 1 Fetch large packet size register 1 1 2 5 8 CRC calculation U M X 1 I 2 5 6 Data path 1 1 2 6 0 Multiplexer 1 1 2 6 3 -9 6 3 1 0 Gigabit Media Independent-JL- > Interface (G M 1 1) 1 1 2 6 2, 9 6 2 Fiber Optic Ultra Far 1 1 1 Paper Size Applicable in ΚΚΐ: Standard Humble (CNS) Λ4 gauge (2〗 〇297297 mm). 20- β-y 4 7 4 44 A7 B7. --Central market only eliminates the printing of the bamboo company. 5. Description of invention ¢ 8) I! 2 6 1 Command control / data path 1 l 2 6 4 State machine support logic 1 I 2 6 5 Frame control S Μ (FCS Μ) 1 2 6 6 Carrier Control S Μ (CCS Μ) 1 I Please 1 2 8 4 9 8 4 Sigh computer-Ϊ and 1 1 2 8 2 9 8 2 latency and octal counter-¾ 1! 2 8 0 9 8 0 support logical block -f: 1 I 9 0 2 receiver LCC interface RLLC _ IFC ' r:! j. 1 9 0 4 Receiver CRC check LCV — CRC Τί 1 1 9 0 6 Receiver FC / G Μ 1 1 RFC -G Μ 1 1 1 I 9 0 8 Decoder i 1 9 1 0 Receiver control block 1 Order I 9 2 0 Receiver public 1 block 1 1 9 5 4 Receiver public logic 1 f 9 5 0 Data transfer block 1 I 9 5 2 Receiver control register line 1 8 1 6 Microprocessor i! 1 8 2 0 RA Μ 1 1 8 2 2 R 0 Μ 1 1 8 1 8 Memory bus 1 I 1 8 2 6 KBC 1 1 I 1 8 2 4 Peripheral bus 1 i 1 8 1 4 key * n. Tray 1 1 1 1 1 This paper is based on the standard in the Sichuan province. {CNS) A4 specifications {210/297 mm) A7 457444 B7 5. Description of the invention (I9) Detailed description of the preferred embodiment: The present invention is described as a High-speed Ethernet media access control layered circuit core and a method for processing packet data in a packet-by-packet manner * This method allows simultaneous processing of data information and combined control information. _ Also revealed a media access controller, which is particularly suitable for performing packet-to-packet traffic management and properly performing proficient network diagnostic tests. In the following description, many specific details are set to provide a complete understanding of the present invention. For those skilled in the art, however, the present invention can be carried out without some or these special details. In some cases, the well-known processing operations are unnecessary weirdness that makes the present invention unchanged and have not been described in detail. 0 Figure 2 is a flow-based media access controller (MA C) 1 5 0 According to the architecture diagram, the controller is used as a high-speed transmission according to an embodiment of the present invention. In a preferred embodiment, gigabit speed Ethernet transmission is considered. However, one noticeable advantage is that the architecture can be applied equally to other transmission protocols as well as both higher and lower speed transmissions. As shown in Figure 2, the system interfaces with a network data system bus 101 and a management / control bus 102. Among them, 101 processes both data and control information, and 102 transmits control. And management information. In terms of advantages, since the data is transmitted through the network data system bus 1101, it should be processed by various processing blocks based on the traffic MA C 150, and the control information can also be streamed through the network data system at the same time. Row 101 and pass. It is important to understand the type of parallel processing provided at any given time in L ------- I-- ^ 1. I,-II --- _-I I-Ding 1 ^ 1 ^ 1. ---. . . . Λν * ΐ Vo continued f. . w ^. li'lrj. ; ί. 4-4ί. ^ 1Η 'this page) I. · '. . --- 1--: Light " 9 industrial and consumer cooperation ^ print " this paper & standard SK family standard low (CNS) Λ4 now (210x29? Mm) -22- 7-144 A? B7 V. Description of the Invention 卯) The ability to change processing variables based on the traffic-based MAC within 150 (although the packet data is being processed). For example, suppose that data is being received from the upper L L C layer and that the data is being processed through various processing blocks. One of the antecedent columns and one CR C column are joined to form a packet. Because the traffic is based on the parallel processing characteristics of MA C 1 50, control information can be synchronized through the network data system bus 1 101 to modify the portion of the packet that has not yet been processed. Then, the parallel processing characteristics of the flow-based MA C 150 can transmit appropriate controls to change the designated processing variables while the data is still being processed. First refer to the transmitting side. When data starts to be initially received from the upper L L C layer through the network data system bus 1 0 1, the data is transferred to a network data bus interface controller (B I C) 104. In this embodiment, the network data B I C 1 04 may be any appropriate interface controller such as a slave interface and a direct memory access (DMA) onboard interface. As shown, a first data / control path 1 4 4 a and a second data / control path 1 4 4 b can be used when high-efficiency switching is required for traffic-based MAC 1 50. Connect the network data bus interface 101 to the network data BIC 104. For example, the first data / control path 1 4 4 a may be used to perform the transfer from the upper LLC layer to the traffic-based MA C 1 50 and the second data / control path 1 4 4 b may be used Use the execution-based traffic based on MAC 1 50 to transfer to the lower-level LLC layer. Of course, it is also considered that this single bidirectional data / control path can be used to perform the control and data transfer described later. This paper is used in the standard ^^: house standard 绛 ((:? ^) Six 4 specifications (210 ,;! 97 mm) -23-. . . ^^ '^^! 1'. , 'Of. ;1-*. ''-this. Item 4 > | * 1- :, large. 玎) Booking: · 457444 A7 B7 " f: printed by Aphibe K2 Consumer Cooperative; ^ V. Description of the invention) 1 1 — Once the data is transmitted to the network data by the white network data system bus 1 1 BIC At 14:00, the data can be appropriately transferred after the data is a multi-packet 1 1 I queue FIF 〇TX 1 0 6 —- In general * 1 JFIF 〇TX 1 0 6 plays — as a hold will be sent from the upper layer '•. 'Λ 1 1 LLC layer and the data transmitted via the network data system bus 1 0 1 bus iTt i C in this embodiment FIF 〇Τ X 1 0 6 1ST Take% 1 1 I have storage up to ten One or more packet data D. This is a significant improvement on the structure of the conventional single ϊ ϊ t 1 I packet FIF 〇 structure and the traditional structure of the conventional structure is too%! Gigabit speed (Ti 1 1 ie + 1 0 0 0 Μ b PS) Larger storage of increased traffic generated 1 1 Demand 0 1 I — Once an appropriate number of g of packets are buffered into FIF 0 1 Order Ding X 1 0 6 o'clock— 'Network traffic management FIF 〇TX controller 1 1 1 1 0 implemented to manage white FIF 〇TX 1 0 6 and fast stream 1 I in — micro RISC stream processor 1 1 4 a Packet 〇 at a higher level I 1 j network flow management FIF 〇 TX control 1 1 0 can be responsible for adjusting the sequence of the data such as audio jtas, video, graphics, and other forms of data being transmitted through the network. 0 In this way, based on traffic Μ AC 1 5 0 Can be at the same time at 1 The internal stream has multiple simultaneous 1 data streams via FIF 〇 丁 X 1 0 6 0 Among them — the feature is when the packet is being whitened 1 IFIF 〇 丁 X 1 0 6 Any — special packets can be received at 1 I It is skipped without reading the entire packet. 0 In another feature, a packet 1 1 can be whitened by keeping the designated packet for a stylized time 1 1 FIF 〇TX 1 0 6 Medium m transmission e Among the other features—> 1 1 1 This paper music scale is far away in the middle of China® family standard 3M CNS) 4 specifications (2 丨 0X29 "? mm) -24- 4574 44 A7 B7 ΟΛΙ. The medium-sized sample exemption β is eliminated in the cooperative printing " V. Description of the invention P-) 1 I- Once read into FIF 〇 丁 X 1 0 6 The packet can be transmitted to the 1 1 R IS C stream processor 11 4 a before > and 1 was taken out from 1 1 IFIF 0 TX 1 0 6 at a time. In another embodiment, the network flow management FIF 0 TX controller · +-'% 1 1 1 10 is suitable for — V * The bad sequence is coded by Φπη strategy and calculated in each frame received by the upper white layer LLC layer in IFIF 0 TX 1 0 6: i. • δ 1 Ϊ (frame). The loop sequence numbering strategy is best assigned to the first box of "\ 1 I" with a "1 '", and up to all-a preset number (such as 1, 2, 3, too A 4, 5 , 6 t 7… 2 0) while referring to 71 1 1 in a sequential number-up manner, set a number to each—box 0. In this example, the preset number is “2 0”. 1 I — once as large as 2 When the frame of 0 is received at FIF 0 TX 1 0 6, the next received frame of 1 I will encode ηπΙΟ as »» 1 ”again. Then, the numbering strategy 1 is scheduled to be cycled 1 1 Therefore, when Tian transfers traffic to the receiving base 1 AC 1 50, the network traffic management F IF 0 D X controller 1 1 0 will retain the finger 1 t is set to the number of each frame and will therefore confirm the number of frames that may be offline I in the collision. For example, if the number of frames g "5" is related to one collision, frames 5-2 0 Can be directly stored (buffered) at-1 1 F IF TX 0 106 and directly transmitted. As a result, when the transmission is positive-1 1, the frame stored in F IF 〇TX 1 0 6 will be "not taken out by a large amount of 1" until it is marked with a confirmation of successful transmission (A ck). 1 1 C received by the receiving station. If a collision occurs > a standard backoff (1 1) operation is defined in the 80 2 * 3 standard. 1 1 In another embodiment, the control information can be combined in I 1 1 paper if, and the size is used: standard interpretation (CNS) Λ4 specification (210X 297 Gong) -25- 4574 4 A7 B? Ί; θ. ¾. In the ν 桴 汍 round, only -τ · consumer capital is combined. Printed by the press " V. Description of the invention p) FIFO Tx106 buffered in the packet. In this way, the processing variables can be modified on a pipeline-by-packet basis. For example ... the splice control information may include a confirmation of the modification of the processing variable and the information as a special packet to pick out a modification. The advantage is that it has an intelligent network traffic management FIFO Tx controller 11 and uses network management and combined with test protocols. Although it is rare to require processing variables that change for each successive packet, its advantage is that it is a powerful feature to have the ability to modify processing variables for a given packet in the packet stream. Once the network traffic management FIFO Tx controller 11 performs any requested processing based on the received control information, the micro RIS C stream processor 1 1 4 a performs various processing and data filtering tasks well. For example, the micro-RI SC stream processor 1 1 4a operates in a sequential manner to modify the data stream characteristics. Ideally, the micro-RISC stream processor operates on 32-bit characters based on the flow-based M A C 150 to efficiently process information to perform performance at gigabit speeds. Further, the instruction preferably triggers the byte stream. In this embodiment, the micro RIS C stream processor 1 1 4 a is adapted to operate in different addressing modes such as the related byte count mode. Internally, the micro RIS C stream processor 1 1 4 a preferably has a set of general purpose registers, data structure registers, and special function units. For example, the functional unit may include an ALU, a count accumulator, and a checksum calculation unit. Further, the micro RISC stream processor 1 1 4 a should preferably have the ability to provide additional flexibility and improved performance under conditions such as branching and loop mode. ”Finally, the processing means I ----, ------ Guang ------ Order ------ line (-, " wenu rvefIf! Ff " 3 million) This paper music scale applies to the prisoner S family standard rate () A4 specifications (2 丨 (V (〆297 公 漦) -26- A7 B7 V. Description of the invention 0) The micro RISC stream processor 1 1 4 a may include some inventive packet bar control. The control examples include: CUT, CLEAR, COPY, APPEND, INSEERT, AND, OR, XOR, etc. to confirm header generation, separate data and headers: IP_CHK S UM check and length calculation. Still referring to FIG. 2, once the appropriate data and control information is processed in the micro R Ϊ SC stream processor 1 1 4 a, the data is transmitted to a SUPERMAC Tx controller 1 1 8 via a data path 1 13 a The controller is preferably a state machine that is structured to process the packets received from the micro RISC stream processor 1 1 4 a and output the processed packets to a physical (PHY) medium 1 40. As will be described in detail below, the transmission SUPERMAC Tx controller 1 1 8 will mainly be connected as a proper hook to perform management tasks and handle the modification of the requested packet structure. In this way, various packet modification and management operations can be performed well using the traffic-based MAC 150. :-, ^ However, the Central Bureau of quasi-government has only eliminated 3 cooperative printing ii. w2iJL: '-*', r: 之 '; ί. δ · ίίterm -fi ^ ll-. vlj Benshi ') line For example, SUPERMAC Tx controller 1 18 is best adapted to be processed in a sequential packet-by-packet manner, such as "cancel enable" first append, " cancel enable "CRC append, modify (such as Customized city) Internal packet gap (IPG), and packet modification stylized to a minimum packet size (such as enlarging or reducing a standard 64-byte packet to any arbitrary number). In this embodiment, packet modification control Synchronous transmission from a micro RISC stream processor 1 14a to a SUPERMAC Tx controller via a control path 1 1 3 b 1 18 This paper size 14 uses the SK family standard CNS) Λ4 grid (210x297 mm) -27 -457444 A7 ____ V. Invention Description). As mentioned above, the ability to simultaneously transmit control information (such as path 1 1 3 b) while the packet data information (such as path 1 1 3 a) is being processed is allowed The SUPERMAC Tx is the opposite of the conventional system that transmits control and packet information in a sequential manner, and performs modification based on packet connection and packet-based processing. For example, the conventional technology MA C a control The device generally transmits the initial control information that is applied to the packet that is followed by the control information. Then, no change or modification to the packet processing is allowed in a MAC controller. Of course, when the control information is transmitted, the packet information will be Being queued, it will undesirably reduce the processing speed and transmission speed. However, the inventive SUPERMAC D X controller 118 processes packet data and modify processing based on any parallel received control information at the same time. The advantages and features of the controller 118 will be described later. · '. . r,-屮 次 打 ^ 巧 · ^ -1'Moxibustion cooperation · t-India-Figure 2 also shows a SUPERMAC Tx management block 1 1 7 which is responsible for transmitting SUPERMAC Tx controller 1 18 and receiving Interface between SUPERMAC Rx controllers 120. The SUPERMAC management block 1 17 also interfaces between the network traffic management F I FO Tx controller 1 1 0, the network traffic management FIFO Rx controller 112, and the network data BIC 104. Generally speaking, the function of the SUPERMAC management block 117 is an interface for receiving flow control information, automatic coordination instructions, entity management instructions, and pause frame information (ie, the pause frame serves as a receiving unit to remind a transmitting unit to stop the paper size)迸 Use Chinese S standards (CNS) / \ 4 grid (2 丨 0 X297 mm). 〇8-457444 A7 V. Description of the invention 沣) Stop transmitting data until a receiving buffer is vacated). Another implementation in the SUPERMAC management block 117 is keying, initiation and architecture, synchronous collision, forced transmission, and keying monitoring. Moreover, the SUPERMAC management 1 1 7 is well adapted for self-exemption ... It is transmitted from the SUPERMAC Tx until the FIFO Tx 106 is properly loaded, or a preset time period elapses. The advantage is that this allows the rate at which packets are transmitted to the PHY medium 140 to be precisely controlled. In contrast, the SUPERMAC management block 117 can also be set to be transmitted while the packet is received by the FIFO Tx106. In this embodiment, the SUPERMAC Tx controller 1 1 8 and the SUPERMAC Rx controller 1 20 are shown and bonded to a second micro RI SC stream processor 1 1 4b, which is ideally comprised of a parallel event Processor (PEP) 124 »In this embodiment, appropriately processed events occurring within the SUPERMAC Tx controller 1 1 8 and the SUPERMAC Rx controller 1 20 can be converted into micro RISC stream processors 1 1 4b. In this way, the processing events that occur within the SUPERMAC can be stored in the appropriate statistical counter 128 of the PEP 124. On the receiving side, the micro RISC stream processor 1 1 4 a is also shown to be coupled to the micro RISC stream processor 1 1 4 b to monitor and record traffic that is processed inside and outside MA C 1 50 event. Traditionally, data is self-contained as one of the decoders that decodes the signal into appropriate packets to be received by Rx SUPERMAC J ---. ------ 广 ------ ir ------- ^ ... (^ ΐ ^ ΓΛΐ '·' '**. : '1 ·· 之 :: is " Jfi, then e'lvJ this U) The paper size chasing the middle ^ pressure home line 4 *. (CNS) Λ4 ^ lattice (2) 0 乂 297 male f) -29- 4574 44 A7 B7 V. Description of the invention θ) Physical (PHY) medium 141. As will be described in detail below, the SUPERMAC Tx controller 120 is generally responsible for, for example, removing the precedence (if the precedence is attached to the transmitting side) from the incoming packet. . . And, the SUPERMAC Rx controller 120 preferably has the ability to transmit a CRC field to the micro RIS C stream processor 1 1 4 a without performing the conventional removal function. If it occurs, the C R C removal can be performed by the micro RIS C stream processor 1 14a itself before transmitting the transmission packet data to the upper L L C layer. In addition, the SUPERMAC R x controller 12 can also perform IPG capture, stamped reception, and program a minimum and maximum packet size to avoid paddmg at gigabit or greater speeds. A short packet or an error was returned for a large packet. Of course, if desired, pad removal may be performed within the SUPERMAC Rx controller 120. Once SUPERMAC Rx receives a packet from the physical medium 141, the packet will be transmitted to the micro-RISC stream processor 1 1 4 for processing and then to the multiple packet queue F I FO Rxl 08. On the transmitting side, events executed in both the SUPERMAC Rx controller 1 2 0 and the micro RISC stream processor 1 1 4 a are connected to the micro RISC stream processor responsible for the events in the statistics counter 1 2 8 In 114b, it is preferable that the network traffic management FIFO Rx controller 112 further has a number designated to each packet received by the FIFO Rx 108. Because the FIFO Rx controller 112 knows the number assigned to each packet. In this paper scale, gg family standard (CNS) Λ4 specification (210X2 mm) -30- J--. --------- Λ. ------ ‘玎 ------ Μ (1 ?. ?-圮 Please-! ^ 'And irv-' ^^ vt'-M ^ r'i) 45744 4 at B7 5. Invention description), a control signal can be sent to the FI FO Rx controller 1 1 2 to request An individual number of packets stored in FI FO RX 108 will be transmitted (ie, to the LLC layer or PEP 124 for management). -Once the data is removed from the multiple packet queue FIF 0 RX · · 1 08 in a switching environment and transmitted to the network data BIC 1 04, the data will be transmitted to the network data system bus via path 1 1 4 b 1 0 1. Of course, a single two-way data path can be selectively used in paths 144a and 144b. As mentioned above, one advantage of the present invention is its parallel data and control processing architecture. In FIG. 2, the management / control bus 1 02 is generally used to transmit control signals and perform network management tasks through a dedicated full-time control bus interface controller (B I C) order 1 2 2. In this embodiment, the stream B I C 1 2 2 is preferably prepared to transmit control information and perform data management tasks. For example, when performing a network management task, it must pull (ie, filter) individual information packets of information from the packet path being processed via the network data B I C 104. Once the desired packet is confirmed, it can be filtered by the micro RIS C stream processor 1 1 4 b, which is set in the parallel event processor (PEP) 1 2 4. The micro RIS C stream processor 1 1 4 b is also preferably responsible for programming new events, filtering the desired packets and buffering the desired packets in an appropriate buffer. In addition, the micro RISC stream processor 114b has the capability of initial thresholding, alarm generation, and detection of traffic generated as matrix statistics. In addition, the basic paper size of a hardware counter is described in the state ^ 囡 house standard pedigree (CNS) Λ4 specification (2mx 297 mm) -31-457444 A7 B7 V. Description of the invention) Combinations can be provided to take charge of various Processing operations performed by the micro RISC stream processor 1 1 4 b. In this embodiment, the network management operation is generally used to determine the selected network statistics such as traffic, public use, number of collisions, traffic flow characteristics, etc. The advantage is that both Simple Network Management Protocol (SNMP) and Remote Monitoring (RMON) can be implemented via PEP 1 24 in Figure 2. Known for this skill, RMON's surveillance allows a network administrator to analyze various traffic statistics and network variables to understand network error diagnosis, planning, and performance estimation. -° line ί: ϋ. ψ " ^ "-. ι ^ Η-τ Consumer cooperation printing 54 Next, PEP 1 24 includes a creative packet buffer 1 2 5 to store the appropriate packets made by network management protocols such as SNMP and RMON. For example, if the user wants to monitor one of the data streams being processed via the network data BIC 104, the micro RISC stream processors 114a and 114b will filter out and store them in the packet buffer in order. 1 2 5 desired packet in the device. Also included in P E P 1 2 4 is an instruction and status register 1 2 6. For example, the instruction register receives the control signal from the management / control bus 1 102 via the flow control B I C 1 2 2. Also shown are responsible for storing individual events that can occur in the SUPERMAC Tx controller 1 18 'SUPERMAC management block 1 17, SUPERMAC Rx controller 120, micro RISC stream processor 114a, and micro RISC stream processor 114b. Then, when the packet is processed and an event occurs, the event information is streamed to the micro RIS stream processor 1 1 4 b and then stored in a statistical counter. <:? ^) / \ 4 Regulations (210/297 G $) -32- 4 5 ^ 44-4 a 7 B7 Line;-. In the Ministry, ¥ Sample Bureau β ΗConsumer Cooperative Press 1i V. Invention Explanation (30) 1 I 1 2 8 e and> multiple programmable counters 1 3 0 are located in PEP 1 1 I 1 2 4 to record the new event which is now defined but will be defined in the future 0 1 1 In short > The advantages of describing the architecture by referring to FIG. 2 are many. [In short »The ideal architecture has a parallel streamline processing of data and ·: 1¾ t I control information Q In addition» This parallel processing feature is a packet The data is being processed through the first-level data line and the 1 I line data path allows the user to perform the desired management work Λ 1 1 I. The parallel processing feature enables the packet structure to be packetized online and then 1 1 I. Modifications based on packets. However, this desired architecture is believed to be particularly good. The advantages of working well in this similar function can be Using other architectures, J! 1 1 is framed into 0 1 I. Figure 3 Series—- SUP Ε R Μ ACC 0 R Ε 1 1 6 Way 1 I Block Diagram The 1 1 6 contains SU Ρ ER Μ AC Τ X controller 1 Order I 1 1 8 SUPER Μ AC management block 1 1 7 and 1 1 RXSUPER Μ AC controller 1 2 0 Q In an embodiment '1 1 SUPER Μ ACTX controller 1 1 8 contains various state machines 1 I 1 Each is responsible for processing the data received by the upper LLC layer of S, and is responsible for transmitting the packets processed on the line to the physical layer and combining them with appropriate hooks. Similar > SUP ERR ACRX Controller 1 2 0 j 1 on the receiving side communicates with the physical medium 1 4 1 and the micro RISC stream processor 1 1 1 1 4 a and 1 1 4 b and the SUPER M AC management block 1 1 1 1 7 communication e 1 I is implemented here In the example, Su P ER Μ AC manages 1 1 7 and the 1 1 | SUPER Μ AC TX controller 1 1 8 and 1! SUPER Μ ACRX controller 1 2 0 interface for various transmission 1 1 1 This paper size is suitable for Sichuan SS home sample i (CNS) A4 size (210x297 mm) -33- 457444 A7 B7-Final award iv- Bureau RT- Eliminate cooperation printing ^: 5. Description of the invention) 1 1 and the received agreement are synchronized. For example, the t auto-negotiation agreement can be controlled in 1 I S U RP E MR AC management 1 1 7 to synchronize the transmission 11 and the speed of the receiving network to achieve the most efficient and fastest communication speed. For example, if a transmitter has a speed of 1 billion bits and should receive: 1 1 receiver can only receive at 100 M bps, then the transmitter will self = m -M II is set to the minimum speed of the receiver. 0 Auto-negotiation is also described here as 1! I for reference. I Ε E E 0 0 2 3 (U) Standard D 1 1 1 SU Ρ RMAC Management Block 11 7 is responsible for the control when the packet is transmitted from il \ Ben 1 SUPER Μ AC Τ x controller 11 8 to 1 1 P Η Y 14 0. For example, y SUP ERMA C 1 I management block 1 1 7 can communicate with network traffic management FIF 0 Τ X controller 1 1 11 0, the 1 1 0 is connected to multiple packet queue 1 order \ FIF 0 Τ X 1 0 6 When to send data to the micro RISC stream 1 1 processor 1 14a and when to send to SU PER Μ AC TX control 1 1 1 1 8 for transmission. The advantage is that the S UP E R M A C management 1 I 11 7 has control when multiple packet queues F I F 0 TX X 1 0 6 are transmitted by the line or to maintain data. Therefore, once SU PER Μ AC manages 1 1 7 refers to 1 1 FIF 0 TX controller 1 1 0 when the data transmission is appropriate (ie 1 1), a preset number of packets are stored in FIF 0 TX 10 After 6 1 1), the SU PER Μ AC management block 1 1 7 may notify the 1 | transmission is not permitted. On the other hand, the SU PER Μ AC management block 1 1 1 11 7 can also allow RIF 0 TX control 1 1 device 1 1 0 from multiple packet queues FIF 0 TX 1 0 6 when the packet is received. Will seal 1 1 1 this paper size back) 11 ES family standard twin (CNS) Λ4 specifications (2ΗΪ × 297 male t) -34--central *: "-bureau consumer cooperation · Η 印 ^ 4 6 7 4 4 4 A7 _____B? Fifth, the description of the invention) The packet is transmitted. The following is a detailed description of the execution function blocks and processing functions in the SUPERMAC Tx controller 118 (ie the transmitter side) and the SUPERMAC Rx controller 12 (ie the receiver side). · Transmission side Figure 4 is a block diagram of the internal structure of the S U P E RMA C Tx controller 1 1 8 according to an embodiment of the present invention. As shown, a 32-bit wide data path is displayed for transmission to a transmission L L C interface 2 0 2 (XLLC-IFC). In the transmission LLC interface 202, various processing operations can be performed on data to be received from an upper LLC layer. For example, the function of the register included in the transmission LLC interface 202 may include: (1) programming a desired delay period; (2) programming an ideal slot time (ie, Back unit); (3) stylized-retry limit; stylized-minimum and maximum size, etc. Also included in the transmitting L L C interface 200 is a plurality of instruction protocol registers 302 as flags for modifying packet processing according to one embodiment of the present invention. For example, the instruction protocol register 302 also includes flags, which are (1) enabling / disabling enabling a prior generation and appending; (b) enabling / disabling enabling-CRC calculation and addition: (C) Enable / disable enable a carrier expansion requirement (ie * the packet is at least 512 bytes long: (d) control a full duplex mode; (e) enable / disable enable an automatic padding function ; (F) Enable the sampling line function at the beginning; (g) Perform a forced transmission (ie, force a collision to divide ^ i ί line f " '-" Reading Weep -Ben.Jr!' Re-J11 · " This s) This paper size is suitable for Sichuan KSSi: Standard Tianjin (CNS) Λ4 specification (210 × 297 mm) -35 «5 ^-^ ';. 屮 " ^ quasi bureau $ 工 consuming cooperation_printing " ia, A7 B7 V. Description of the invention 垆) Analyze a network response): and (h) enable the transmission process. The data path is described next. According to an embodiment of the present invention, a 16-bit-wide data bus transmits packet information to a transmission CR C 204 (XMT — CRC). _ Once the data is transmitted to the transmission CRC 204, a CRC calculation is either performed or sent out, depending on the setting of the C R C flag contained in the instruction protocol register. It should be understood that while the packet information is being transmitted and the data path is processed downwards, the control information is transmitted synchronously to modify the packet processing at any time. For example, if a packet is being processed in the transmission CRC · 202, and the control information (that is, the flag is set to TRUE = NO CRC) is de-enabled, the CRC is transmitted before the CRC is added. At that time, no CRC will be appended to the transmission CRC 202. Once the data is processed through transmission 204, the 16-bit data should be transmitted to be responsible for processing the received packet information into an appropriate form for transmission through a physical medium. One transfers FC / GMI I 206 (XFC — GMI I) blocks. For example, the described high-speed, traffic-based MA C 1 50 preferably has synchronous transmission in the form of a gigabit media independent interface (GM I I) and in the form of a fiber channel. Of course, it should be understood that the one billion traffic-based MA C 150 is also backward compatible with 10 Mbps systems. For example, transmission is also performed in the form of a media independent interface (M I I), and transmission can also be performed in one form at a time. That is, although it may be synchronous transmission, GM II or fiber channel transmission can be in a range of -1 ^^^^: iv: c-4i.J'h re " '. ^ 本) line paper paper Λ degree in use KS Family Standard (CNS) Λ4 Specification (210X297 mm) -36- 4 5 7 4 4 -l. A7 B7;-'^ .. Ministry ^ 行 kit ^^-7-Consumer Cooperative Cooperative 4,1 Winter five, invention description 04) Time is executed a form. If the 'transmission is performed via a fiber channel, it must perform a suitable fiber channel encoded in the encoder 2008, which receives a 16-bit wide data line and the output-fiber channel special It is a 10-bit wide output. The advantage is that the function performed by the encoder 208 can optionally be performed in a medium-independent transmission F C / GMII 206 without a separate encoder unit. When data is transmitted via blocks 202, 204, and 206, a two-way communication link 2 0 3 is located in block 202 and contains three of these referred to here as Ethernet 112, BACKOFF 216, and DEFER 2 1 4 One of the processing blocks is transmitted between the control blocks 2 1 0 and maintained = further shown are two separate communication bonds 2 5 and 2 7. The 2 5 and 2 7 are individually used as self-transmission control areas. The block 2 10 communicates with the transmission LLC interface 204 and the transmission FC / GMII 206. Generally speaking, the communication bonds 205 and 207 are used to control and modify the processing operations in blocks 104 and 206 based on the following packets followed by packets. ETHER 212 is generally responsible for maintaining the integration of the frames being processed via traffic-based MA C 1 50 by ensuring that the appropriate Ethernet standards for the frames and packets are met. At a higher level, 'ETHER: (a) ensure that the frame is transmitted when the media system is not busy; (b) decide whether a collision occurs; (c) perform a congestion if a collision occurs; (d) decide whether it is needed Carrier expansion; and (6) resending the frame after meeting the delay and backing up. At the packet level, ETHER212 can also: (f) If necessary, generate a prior paper with a suitable heart (material ΰ, Ν5) _Λ 提格 (2mx 297 公 楚) ^ 37- J —— * ---- --A -------, π ----- 1 ^ (^, ^ ¾¾.¾ and then; iw®.Jn again ^-, ν-ΓTaiwan) 45744a A7 B? V. Invention Note (35) '(g) Generate CRC if needed: and (h) Collision check. In one embodiment, the work performed by the ETHER 2 12 is generally performed by a suitable state machine which will be described in more detail below. Of course, the processing performed by ETHER2 12 can be modified at any time in parallel with the data processing by transmitting control information. In some examples, the ability to instantaneously disable the advance and CRC generation can be allowed. Users perform various administrative diagnostics on the network. For example, when both antecedent and C R C are disabled, the traffic-based MAC 1 50 will completely transmit the original data without processing. With this architecture, important diagnostic tests and management operations can be performed on the transmitted data (ie, the data is transmitted without advance and C R C). In another embodiment, a user can load a one-bit pattern sequence to perform a phase-locked loop (PLL) inspection, as well as various laser optical inspections. In fact, the testing functions described above can be accomplished by meeting the appropriate software users who perform the various hooks enabled by SUPERMAC CORE 116. In addition, the above-mentioned tests can be performed without using expensive conventional test equipment.
如上述1傳送控制區塊2 1 0亦含BACKOFF區 塊2 1 6,該2 1 6最好係負責在碰撞發生後而重送發生 前決定該傳送器必須等待之時間。一般而言|後退時間係 以”後退之單位”所表示,且該嘗試重送之前的總流逝時 間係固定數目之後退單位°爲決定該一定數目之”後退單 位”,該傳送器必須等待直到一傳送被重送,一 I E E E 本紙張尺度送州中Kis S:標卑(CNS ) Λ4规格i 2I0x 公嫠) .38- ---'‘------P------π------Ml--——I (^-.ν,^.-ϊ'ν-ϋΙΙν之.;i.a:u-i-.Jf!.^.^-l-:,-i.. ΐ ) 4574 44 A7 B7 五、發明説明绅) 標準演算法可經使用以計算該後退之單元。雖然其他適合 之演算法可經使用以計算後退單元之數目,最好是執行一 經切斷之二進位指數BACKOFF(TBEB)演算法 。進一步,很重要的是該”後退單元”亦可成爲”時槽” 〇 習知上,時槽係一對於1 0以及1 0 0Mb p S傳送 速度網路之一固定時間週期(即,5 1 2位元時間)。本 發明之特別之優點在於該”時槽”可以任何適合之位元時 間數目而被程式化。舉例而言,、對於十億位元乙太傳送 而言,”時槽”可被以最大至一可以是5 1 2位元組時間 之一理想數目位元組之任何適當數目之位元組而予以程式 化。舉例而言,在傳送時一未成功之嘗試之後,該傳送器 將後退且該錯誤被接收之前再次嘗試該傳送最大至16次 (即,表示該媒介係十分忙碌或被切斷)。其優點在於, 該允許重試限制之可程式化進一步使網路流量被最佳化。 亦展示根據本發明之一實施例該負責維護內部封包間 隙(I PGs )之DEFER區塊2 14 ·舉例而言,當 決定該訊號正在該媒介上時(即,該媒介係忙碌中),傳 送該不會嘗試一段時間。在一實施例中,該時間週期將根 據IEEE標準演算法稱爲” 2/3規則”而被計算。對 於2/3規則,請參考該IEEE 802 . 3標準”載 子延遲部份4. 2. 3. 2.1’第26頁”( IS0/IEC 8802-3: 1996 (E) ANS/IEEE)。一般而言,在該2/3規則下, J---r------之‘------訂------線 (^?聞^'背5&之注念事項再堉'|-:-'本石) 本紙疚尺度这用中( CNS ) Λ4規格(210Χ297公漤) -39- ^57444 A7 B7 :Jf^·局 M合竹:^印5^ 五、發明説明07 ) 1 PG載子偵測(如,爲當發生碰撞時之決策)係被執行 以內部封包間隙(I PG)之2/3之週期,且無載子偵 測在最後1 / 3之I P G週期中被執行。 傳統上,該2 / 3規則在當”接收”係接著,’傳送”. 而被遵守,且該I P G係被設定爲約9 6位元時間或更大 。另一方面,當一”傳送”接著一”接收”時,該IPG 可被設定爲9 6位元時間。在此實施例中,I PG由於可 被做得較9 6位元時間爲長或爲短,該I P G最好可被程 式化。因爲流通量可藉由當如偵測到較少之碰撞時減少 1 P G而被增加。 一展示經由一雙向鍵結211而將傳送公設區塊 2 2 0與傳送控制區塊2 1 0通訊》在此實施例中,傳送 公設區塊2 2 0在當適當控制被傳送以決定在任何適當時 間時以流量爲基礎M A C 1 5 0之狀態,以維護一致能狀 態報告之一些狀態計數器。且,傳送公設區塊具有負責傳 送潛伏期(經由一適當之計數器),該潛伏期係定義爲在 傳送在網路被允許之前,消逝之”等待時間”之長度。傳 送公設經整備以記錄一個八進位計數、一重試狀態計數、 一作爲決定網路使用之百分率之公設因素、一位元資訊、 一致能旗標、一單一碰撞旗標(如,決定是否一封包遇到 一單一碰撞)、一多重碰撞旗標、一遲到碰撞旗標(如, 標示在一特別時間窗口到期之後發生一碰撞)、一載子感 應錯誤(其只適用至半雙工),以及一標示是否該上層 L L C層不能提供任何請求資料之一爲溢流旗標。 ;n^--nh而之注"事項再蛸巧本頁)As mentioned above, the 1 transmission control block 2 1 0 also includes the BACKOFF block 2 1 6. The 2 1 6 is preferably responsible for determining the time that the transmitter must wait after a collision occurs and before a retransmission occurs. Generally speaking | the back-off time is expressed in "back-off units", and the total elapsed time before the attempt to resend is a fixed number of back-off units ° To determine the certain number of "back-off units", the conveyor must wait until One transmission is resent, one IEEE paper size is sent to Kis S in the state: standard low (CNS) Λ4 specification i 2I0x public address) .38- ---''-------- P ------ π ------ Ml ------ I (^-. ν, ^ .- ϊ'ν-ϋΙΙν 之.; ia: ui-.Jf!. ^. ^-l-:,-i .. )) 4574 44 A7 B7 V. Description of the invention Gentry) Standard algorithms can be used to calculate the back-off unit. Although other suitable algorithms can be used to count the number of back-off units, it is best to implement a cut-off binary index BACKOFF (TBEB) algorithm. Further, it is very important that the "back-off unit" can also become a "time slot". Conventionally, the time slot is a fixed time period (that is, 5 1) for a transmission speed network of 10 and 100 Mb p S. 2 bit time). A particular advantage of the present invention is that the "time slot" can be programmed with any suitable number of bit times. For example, for a gigabit Ethernet transmission, a "time slot" can be any number of bytes up to one that can be an ideal number of bytes of 5 1 2 bytes of time And stylized. For example, after an unsuccessful attempt at transmission, the transmitter will back off and retry the transmission up to 16 times before the error is received (that is, the medium is very busy or cut off). The advantage is that the programmability of the retry limit further optimizes network traffic. The DEFER block 2 14 responsible for maintaining the internal packet gap (I PGs) according to an embodiment of the present invention is also shown. For example, when it is determined that the signal is on the medium (that is, the medium is busy), the transmission is performed. Shouldn't try for a while. In one embodiment, the time period will be calculated according to the IEEE standard algorithm called "2/3 rule". For the 2/3 rule, please refer to the IEEE 802.3 standard "Carrier Delay Section 4. 2. 3. 2.1 'Page 26" (IS0 / IEC 8802-3: 1996 (E) ANS / IEEE). Generally speaking, under the 2/3 rule, J --- r ------ of '------ subscription ------ line (^? 闻 ^' 背 5 & Note Read the matter again ||-:-'Bonishi' The guilt scale of this paper is in use (CNS) Λ4 specification (210 × 297 males) -39- ^ 57444 A7 B7: Jf ^ · Bureau M Hezhu: ^ 印 5 ^ 5 、 Invention 07) 1 PG carrier detection (for example, for decision-making when a collision occurs) is performed at a period of 2/3 of the internal packet gap (I PG), and no-carrier detection is at the last 1 / 3 is executed during the IPG cycle. Traditionally, the 2/3 rule followed when "receiving" was, and "transmitting". It was followed, and the IPG system was set to about 96 bit times or more. On the other hand, when "receiving" In the next "receiving", the IPG can be set to 96-bit time. In this embodiment, since the IPG can be made longer or shorter than the 96-bit time, the IPG can be preferably set to Stylized. Because the circulation can be increased by reducing 1 PG when fewer collisions are detected. A display will transfer the public block 2 2 0 and the transmission control block 2 1 via a two-way bond 211. "Communication 0" In this embodiment, the public block 2 2 0 is transmitted when appropriate control is transmitted to determine the state of the traffic-based MAC 1 50 at any appropriate time to maintain some status counters for consistent status reports. And, the transmission public block has a transmission latency (via an appropriate counter), which is defined as the length of "waiting time" that elapses before transmission is allowed on the network. The transmission public block is prepared to record an eighth Carry count, retry status Counting, a public factor that determines the percentage of network use, a bit of information, a uniform energy flag, a single collision flag (eg, determining whether a packet encounters a single collision), a multiple collision flag, A late collision flag (eg, a collision occurs after a specific time window has expired), a carrier induction error (which applies only to half duplex), and a flag indicating whether the upper LLC layer cannot provide any requested information One is the overflow flag.; N ^-nh and the note " remember this page again)
A 訂 線 本紙乐尺度適用中SS家標绎(CNS ) Λ4規格(21(1X 297公釐) -40- 5 4A order line This paper music scale is applicable to Chinese SS family standard interpretation (CNS) Λ4 specification (21 (1X 297 mm) -40- 5 4
Λ A A '' ^ A? __B7 五、發明説明绅) 以下表格展示各種狀態資料,該資料係由該所描述實 施例中圖四之傳送公設區塊2 2 0而產生。當然,該傳送 公設區塊可經建構以獲得其他資料。一般而言,公設計數 器一般係對於爲短少流以及溢流而重新負載,且公設最好…· 以6 4位元組而測量。 -^^-1^-.,71¾亨,fi-?riA···-'"Π ) -· .τ·τ 線 表I xmt2hst stat xmtEnabled 傳送器被致能 col Single 一個重試嚐試 colMultiplc 多於一個重試 colLate 在碰撞窗口結束之後發生碰 撞 errorCRS 不是載子感應框本未發生, 就是其在傳送時有來但消失 errorllnderflow 、hst2xmt _data_rdy '在被 請求時卻不在 retryCnt 當傳送時重試計數 xmtLatency 位元組計數在此封包中(潛 伏期計數器亦然) ctrO verflow 計數器過流(可應用至位元 組計數器以及潛伏期計數器 兩者) U tilFactor 公設因數 本纸張处度迖+ 家標绛(CNS )八4規格(210x297公釐) -41 - A7 4 57 4 44 五、發明説明钟) 一狀態機器圖進一步展示如參考圖5 A所描述如下之 傳送公設區塊2 2 0之一些功能。圖4 A係根據本發明之 一實施例中而在圖4之傳送L L C介面2 0 2中所含之功·‘ 能區塊之更詳細區塊圖。如展示一個3 2位元寬L L C資 料路徑係輪入至資料傳送區塊2 5 0,該2 5 0亦自一傳 送控制訊號(X C S )匯流排而接收4位元組之控制資訊 。此外,一控制(C T L )匯流排2 5 3係經使用以自多 重封包FIFO Txl06以及微RISC流量處理器 1 1 4 (圖2 )中而將控制資訊傳送至一傳送控制暫存器 區塊2 5 2。在此實施例,控制匯流排1 5 3最好以 ”hsi2xmt_ctr而確認。以此方式,當適當控制訊號經由控制 匯流排2 5 3而被傳送至一控制暫存器2 5 2,則在控制 暫存器區塊2 5 2中之適當暫存器可在圖3之 SUPERMAC Tx控制器中經選擇以及設定以致能 該適當之理想處理功能。 進一步展示之係一5位元寬控制訊號X C S進入控制 暫存器區塊2 5 2,該2 5 2係作爲選擇暫存器以及設定 所選擇暫存器之閘取(latch )次數。該亦含在傳送LLC 介面2 0 2中之係區域控制邏輯區塊2 5 4,該2 5 4可 接收作爲定義邊界以及封包傳送模式之一個2位元寬 X C S控制訊號。以下係一表格2之例以展示該各種傳送 控制訊化,該訊號可根據本發明之一實施例而被執行。 ------------二ί------訂------練 jj (-'.''-"-"f:而之.""宇 ^^} ϋ-;·'·-中-V標^^合作.7i印欠 本紙乐尺度追用+ ¾¾家標準(CNS ) Λ4規格(210X29:/公釐) -42- 457444 A7 B7 表2 hst2xmt xcs testMode 將傳送器置於測試模式 一 hstClk 載著主機時脈 c m d Valid 在hst2xmt_ctl匯流排之指令 有效 retCntValid 重試計數器係在hst2xmt_ctl 匯流排 slotTimeV alid 對槽係在hst2xnu_ctl匯流排 defPeriodValid 延遲週期係在hst2xmt_ctl匯 流排 pktValid 封包有效且傳送可開始 idle Valid 當傳送器間置時主機要控制 T X D byteEnables 對應位元在hst2xmt_data匯流 排係有效的 klndex KGEN TX_EN 或 TX_ER 輸出 之來源) 「^•κ请;:ν''"-."汔事項^Jl1、巧本 ί ) 五、發明説明妗Ο ) S'!':吹n;i,-"i3c-T"fi·'合作,衫印" 在一實施例中,在執行資料傳送之前,一交握( handshake )係符合在以流量爲基礎之ΜΑ C 1 5 0以及該 上層L L C層之間。舉例而言,一個適合之交握可以是一 由L L C層傳送而表示該資料係以準備之訊號(如,旗標h 5(2又1^_。13_]*(17)以及一由以.流量爲基礎之1^人(:150 本紙張尺度遗用中® S家標卑(CNS ) Λ4規格(210X 297公釐) -43- 457444 "部中央榡浓局負工消於合竹权印到木 A7 B7 五、發明説明碎1 ) 所傳送而表示該1 5 0對於資料係以準備好之訊號。 一旦該適當之旗標已被設定,且該交握已被確認(即 ,封包有效)*則該資料可在上層LLC層以及以流量爲 基礎之M A C 1 5 0之間經由資料匯流排(即, … hst2xmt_dat:a )而被傳送。爲參考起見,圖4 A展示資料留 下傳送區瑰2 5 0以及將如圖4所述的傳送 CRC 204,以及包含該執行在區域控制邏輯252 中之適當暫存器選擇之控制資訊係被傳送至傳送控制區塊 2 10° 如上述,在傳送控制暫存器區塊2 5 2中之該控制資 訊組接著被ETHER 2 1 2所使用,且藉由通訊鍵結 2 0 3,2 0 5以及2 0 7而依序地回傳至資料處理之流 量。舉例而言,假如在傳送控制暫存器區塊2 5 2中之暫 存器經設定以避免附加一先行至正在 SUPERMAC Tx控制器118中之資料,然後處 理將在ETHER 212中執行,且之後經由通訊鍵結 203而回傳至傳送LLC介面202 »接著,區域控制 邏輯2 5 4亦自傳送控制區塊2 1 0中接收控制•該 210係來自於ETHER 212。 以此方式,該位在控制暫存器區塊2 5 2中之適當設 定之執行係獨立的,且與正被傳送之資料同步且經由該資 料路徑而被處理。爲進一步的強調該平行附在處理控制以 及資料之優點’有必要瞭解在資料正被處理時’控制資訊 可被接收以修改資料處理而不必等待資料被完全處理。 本紙张凡廋遥用中囚S家標卑(CNS ) Λ4規格(210 297公釐) -44 - ·.1¾¾ 汴而之"-念本·項4JA'1VV 永頁) ΛΤ· 457444 A7 ______ B, 五、發明説明啐) 在此實施例中,區域控制邏輯2 5 4具有"去以及從•'傳 送控制區塊210之通訊以設定BACKOFF區塊 216以及DEFER區塊214之適當變數。其他可被 使用之訊號包含如一 "xmt2hst_abort”,該訊號可被直接傳送 至ETHER 212以切斷任何現行傳送。以下之表3 展示控制訊號"xmt2hst_rsp”之例子,該訊號直接來自控制匯 流排2 5 3。 .---r------"—— <穴.?-""背而之;1念事項再坨.'-'::太^ ) -"^龙"只二消紇合作牡印^ 本纸张尺度进川中家樣设.(CNS ) Λ4規格(2|〇y297公犛) -45- A? __ _B7五、發明説明抑) 表3 xmt2hst_rsp xmtClk 傳送器時脈 ·… fdplx 全雙工模式 xmtOK 傳送完成(可能有錯誤) xmtCol 傳送器衝突(可用作重設 F I F 0指標) latercy Valid 該位在位元組計數器之資訊 係傳送潛能) octs Valid 該狀態滙流排 (xmt2hst_stat(23: i3)載著入 進位計數資訊) (00) util Valid (01) (10) 計數器工作 潛流 過流 loadData 此訊號可由以一半頻率操作 之主機所使用可選擇性地成 爲 xmt2hst_rdy4data (r-'^K^11:nlp;之·^--亨項再蛸巧本菸) 線 4'、^革^負^消於合作/;1印^ 圖4 B展示該後述之控制暫存器,該暫存器係根據本 發明之一實施例而含在控制暫存器區塊2 5 2中=如所展 示’一指令協定暫存器3 0 2,一延遲週期暫存器3 0 4 ’ 一時槽暫存器3 0 6,一重試限制暫存器3 0 8,以及 本紙乐尺度則( CNS ) Λ4規格(2IGX297公楚) -46- 457444 A7 五、發明説明Μ ) 一可程式化之最小/最大封包尺寸暫存器3 1 0,係含在 傳送控制暫存器區塊2 5 2之中。因此,當所選擇之控制 訊號C T L以及X C S經轉移以傳送傳送控制暫存器區塊 2 5 2,該所選擇暫存器之性質可被改變。以此方式,該· 由SUPERMAC Tx所執行之處理可被修改。 舉例而言,假如一使用者想要取程式化一個別訂製重 試限制,重試限制暫存器3 0 8可藉由傳送一控制訊號以 及一理想閘取時間而被選擇。一旦被閘取,一新的重試限 制將被程式化入從侍限制暫存器3 0 8 »在此實施例中, 重試限制暫存器3 0 8可以是一個五位元之暫存器,該暫 存器可經程式化以成爲任何在0至3 1之間的理想”數目”》 該重試限制暫存器3 0 8之可程式之特性在執行網路流量 管理上係特別有用的。舉例而言,假如該”固定” 802 . 3 標準所定義之重試限制” 1 6 ”將造成太多封包被丟出,則該 重試限制可簡單地向上調整以減少被丟棄封包之數目。 相同的,延遲暫存器3 0 4可以是一個3位元暫存器 (或任何適合尺寸之暫存器),該暫存器最好可程式爲任 何介於約3 2位元次數以及約1 0 2 4位元次數間之數目 ,且更最好是在約3 2位元次數以及約5 1 2位元次數之 間,且最爲理想係在約3 2位元次數以g約1 2 8位元次 數之間。在一例子中,延遲週期暫存器3 0 4可以被程式 爲約9 6位元次數。因爲該延遲週期一般係該內部封包間 隙(IPG),因此當一使用者將該延遲週期程式化時, 將對於正被傳送之該I P G予以修改。對於該I P G改變 本紙張尺度这用中KS冢橾準(CNS ) Λ4规格(210X297公f > -47- I--:------R------ΪΤ------^ (-•1-'..?-|(<:.请3£'之':1^有.項再^>-;'本万') c"部中"標涞局合作社印'^ 457444 A7 B7 _ 五、發明説明忡) 之結果,該正被傳送之封包之B速率”可以被增加或減少。以 此架構,該時槽以可被程式成任何在約2位元組以及約 5 1 0位元組間之數目。在此實施例中’時槽暫存器 3 0 6最好係一個8位元之暫存器9 (或任何適當尺寸之‘·*· 暫存器)《舉例而言,當該8位元暫存器係皆爲壹(即1 1 1 1 1 1 1 1 1 ),則該位元之總數係2 5 5位元。當 該2 5 5位元係乘上可以是1 6之時槽’則該位元之總數 將是4080位元或510位元組。 最後,可程式之最小/最大封包尺寸暫存器3 1 0允 許使用者程式化該傳送封包之理想尺寸。舉例而言’習知 標準定義之封包具有6 4位元組之固定最小尺寸’然而’ 經考慮該在一高速網路中傳送之封包(如,十億位元之速 度或更大)可能需要更大之最小封包尺寸。爲調適此可能 ,可程式之最小/最大封包暫存器優勢地經提供以使使用 者可修改程式最小封包尺寸。 圖4 C展示指令協定暫存器3 0 2之內容*該3 0 2 包含一些適合之旗標以致能以及解除致能在 SUPERMAC Τχ控制器118中所執行之處理功 能。該範例旗標係如以下:(1 ) 一致能X Μ Τ 3 2 0旗 標以初始一資料傳送處理:(2)—全雙工322旗標以 致能全雙工功能(在全雙工中,載子感應被忽略);(3 )—自動墊塞(autopad)旗標以將額外位元墊塞在封包中 以符合一最小所需之尺寸:(4) 一個非CRC326旗 標以解除致能該CRC之計算;(5)—非先行328旗 ^^^^1 ^mv l· ^ ϋ— —.1 t^i^t \ r <”而.cfis¥''ri4^{VJ^i) 本紙张尺度这州中KS家標净(CNS ) Λ4規格(210乂 297公釐) -48- 457444 A 7 B7 五、發明説明) 標以節除對於封包開頭之先行之添加:(6)—非載子擴 展3 3 0旗標經使用以解除致能一最小5 1 2位元組載子 封包尺寸,該尺寸在十億位元乙太標準 IEEE 802 ·3ζ下係必須的;(7) —起始取樣' 線3 3 2旗標以作爲開始對於該傳送線取樣以及產生對於 區塊2 2 0之統計:以及(8 ) —強迫傳送3 3 4旗標以 作爲不管是否該媒介係忙碌的皆強迫一傳送。優點是,當 該適當暫存器設定在控制暫存器區塊2 5 2之內,則該正 在控制暫存器區塊2 5 2中設定之理想封包結構可在資料 正被傳送時被操控。 圖4 D係根據本發明之一實施例之傳送C R C 2 0 4 (圖4 )之更詳細展示。如所示,一 1 6位元寬之資料路 徑自圖4Α之資料傳送區塊2 5 0中被傳送,且同步經由 CTC計算單元2 5 8以及資料路徑2 5 6而被傳送。在 C R C計算單元2 5 8中,一標準週期重複檢查計算係根 據定義演算法之IΕΕΕ 802.3而被執行。然而, 如前述,假如CRC不需藉由將適當旗標3 2 6設定爲 TRUE(如圖4C所展示),則非CRC計算將被執行 或添加在正自資料傳送區塊2 5 0中被傳送之封包。 在此點上•在一適當C R C計算被執行以及附加之後 ,假如必須的話,且該資料被經由資料路徑2 5 6而被傳 送|則經由資料路徑之封包資訊以及C R C計算單元將被 傳送至一適當多工器2 6 0中。一旦被多工處理,一單_ 1 6位元寬資料路竟將引導至圖4 E之一共用控制資料路 J—'丨_------&------1T------0 本紙乐尺度適闵中國因家榡卑(CNS ) Λ4規格(2!〇X297公釐) -49 - 457444 Α7 Β7 βϋνΐ.--'ί'.^ΐί-.局;工消合作it印^ 五、發明説明β ) 徑 2 6 1。 圖4 E展示一自多工器2 6 0中接收該1 6位元寬資 料之共用控制/資料路徑261。在接收到該資料時,該 資料被適當地轉頻至該被確認實體媒介介面單元中之一個 或兩個。舉例而言,一個媒介介面單元可以是一十億位元 介面獨立介面(GM I I ) 2 6 3而另一個可以是一光纖 頻道介面(FC—1) 262。如上述,該圖2以十億位 元流量爲基礎之MAC 1 5 0係完全向下相容的且可因 此經由一媒介獨立介面(MI I )而傳送。 此舛,應瞭解前述媒介操作可被同步被執行或一次一 個。亦展示出的是自傳送控制區塊2 1 0而接收控制資訊 之共用控制/資料路徑2 6 1以確認哪一個操作模式係理 想的。一般而言,FC— 1 ,GMI I *以及MI I定義 該電子標準以及在以流量爲基礎之MA C 1 5 0以及一所 選擇實體媒介間所需之機械介面。 在此實施例中,該經由光纖頻道2 6 2輸出之訊號最 好係包含一txd_fc ( 1 6位元寬)、kgen ( 2位元寬)以 及一發送閒置(旗標)。一般而言,txd_fc (資料)以及 kgen (控制)係經混合以藉由編碼器2 0 8產生適當傳送 符號。該藉由GMI I輸出之訊號最好係tx_en (致能)、 tx_er (錯誤)以及ud (資料)。此資訊之後如圖2所示 被適當的傳送至該實體媒介1 4 0。 進一步地,共用控制資料路徑2 6 1可以自區域控制 邏輯2 5 4中而接收一 閒置有效旗標”訊號。在一實施例中 J---------A------IT------0 {T*:.tisf讀 t 而之;ί.Μ.ώ事項再 M-1-:*本 κ ) 本紙張尺度追圯中SS家樣卑(CNS ) /\4规格(210X 297公f ) -50- 457444 A7 ΒΊ 五、發明説明郎) ,當接收一”閒置有效旗標"時,適當之符號可在適當之時間 內被射出(即,在封包之間)。此在當使用者想要傳送獨 特資訊而不增加網路之附在需求時係特別有用。舉例而言 ,這些特殊符號可在當該網路在習知上係獨特時(即,一_,· IPG週期)時而被傳送。 接著,該符號可表示有8 0 2 . 3標準所定義之所選 擇程式化閒置符號。在一實施例中,該由訂做使用者所定 義之符號可在當一傳送站需要決定一接收站之回應時而發 現特殊之使用。即,當一傳送站將修改使用者所定義之符 號繁殖至該接收站時,該接收站可以或不可以處理該修改 使用者定義之符號,因此提供具有在接收站資料之傳送站 的能力。 圖4 F展示根據本發明之一實施例而含在 ETHER 212之支援邏輯以及狀態機器。如所展示 ,一狀態機器支援邏輯2 6 4係對耦至一空控制狀態機器 (FCSM) 265,以及一載子控制狀態機器( CCSM) 266。狀態機器支援邏輯264 —般係經使 用以支援該所結合之狀態機器功能以及以產生適當中間訊 號。一般而言,該由所揭示狀態機器所執行之處理係經由 平行資料以及控制處理路徑而在封包接著封包之基礎上而 被修改。 因此,當含在傳送控制暫存器區塊2 5 2中之個別暫 存器被修改時,該位在ETHER 212中之處理變數 將被依序同步地在正被處理之資料上而被執行。應瞭解在 -51 - 本紙張尺度適用中SS家標4M CNS ) Λ4圯格(210X297公釐) AR7 Α Δ Δ ι » "•"•-屮"^^而,,只工消资合竹社印" Α7 五、發明説明_ ) 習知技藝之系統中,修改只允許在整個封包傳送之間(而 不是中間封包)。一般而言,FCSM 265係根據設 定在指令協定暫存器3 2 0中設定之旗標而負責處理資料 。舉例而言,假如沒有先行被要求時,將無先行被產生以· 及添加。該F CSM 2 6 5之處理是向將參考圖8B而 被詳細描述於後。相同的,CCSM 266 —般係負責 · (a)決定是否以發送封包而無碰撞:(b)決定是否 需要塞滿(jam) ; (c)決定封包是否爆發(burst) 且需要載子擴展等。該CCSM 266之處理是向將參 考以下圖8 A而詳細描述於後。 仍參考圖4 F,一稱爲” hst2xmt_abort”之訊號係直接展 示在ETHER 2.12中。在一實施例中,115〖2\111〖_31)〇1 t最好係標示一以被初始之處理的一立即切斷(甚至當一事 件框正被處理)。接著,該跳出功能允許使用者在封包傳 送之任何時間時停止傳送且”整個取出(flush out) ”保持 任何未傳輸資料之緩衝器。優點,此允許使用者快速而正 確地自網路中移除任何錯誤並避免在網路上傳送不想要之 資料。 . 圖4 G係一方塊圖以展示根據本發明之一實施例在傳 送公設區塊2 2 0 (圖4 )中所含之功能區塊的更爲詳細 情形。如所展示,一支援邏輯區塊2 8 0最好係使用作爲 支援在傳送控制區塊2 1 0中所執行之功能,該2 1 0係 負責設定時槽其間以及一最小載子封包尺寸爲約5 1 2位 元組。在該中間區塊,該潛伏計數器係作爲負責在傳送發 I--.------A------、玎--------0 (^^^.請^:而之注^事項再^^:太頁) 本紙张尺度迸用中闺1^:標卑(<^’5)八4規格(2丨0;< 297公釐) -52- A7 457444 B7 五、發明説明押) 生之前之時間消逝,以及該八進位計數器係作爲確認每個 封包所傳送之位元組數目。在一實施例中,潛伏係使用作 爲訂第自當請求一個傳送起(如當一封包有效訊號以被接 收且一適當交握被確認)至當試圖傳送止之一時間週期。 因此,假如一碰撞發生時,一新的潛伏週期將被計算。此 外,一旦此資訊被計算時,該資訊將經由一傳送控制訊號" xmt2hst_stat"以及”xmt2hst_rsp”之匯流排2 8 1而相通訊。 如上述,一作爲初始一資料傳送之一適當交握一般係 一接收自上層L L C層之一資料備妥訊號以及一由作爲標 示該MA C層已備妥自該L L C層接收資料之該MA C層 (至該L L C層)所傳送之資料已備妥訊號。最後,一瀑 布式(cascadabie )公設電腦2 8 4經使用以計算溢流,以 及未溢流變數,該等變數使用以根據理想的”最小C P U中 斷”之瀑布式方式而增加之電路。舉例而言· 一旦該C P u 中斷之最小數目被確認時,則該公設電腦電路可以係瀑布 式,即,重複以及整合以增加電力以符合理想處理之要求 。接著,硬體電路之數量可根據使用者對效能之需求而調 整。 圖5 A係根據本發明之一實施例而經由以流量爲基礎 之MA C 1 5 0所正在傳送之四個封包的圖示。爲展示本 發明平行封包內之可程式性,封包A 502、封包 B 504、封包C 506、封包D 508係展示正 經由圖2 以流量爲基礎之MAC 1 50而被傳送。因爲 具有分離之資料處理路徑以及一分離控制處理路徑,該對 --^--Ί--------α·------- -•--t-^'UCH消费合作.71印^ ----線.------ 本紙張尺度追《中國^家標卑(〔\5)刎规格(210/297公釐) -53- 457444 A7 B7 "-"''中央^^局兵工消"、合"、社印^ 五、發明説明戶1 ) 於正經由以流量爲基礎之MA C 1 5 0傳送之事件封包上 所執行之資料處理可在封包正被傳送時被修改。 爲展示此點,舉例而言,封包A 5 0 2之傳送係以 具有一先行欄、一目的位址攔、一來源位址欄、一長度/·· 型態(L/T)欄'一 LLC資料欄、以及一 CRC欄。 現在假設一使用者要對於下一個將被傳送之封包 B 5 0 4之CRC欄予以解除致能。爲對於下一個傳送 封包解除C R C致能,該使用者不必如習知技藝實施例所 要求般對於下一個I P G予以等待。根據本發明之一實施 例,該使用者可在對於封包A 5 0 2之CRC計算後之 任一時間發送一封包B 5 0 4之控制訊號解除致能 CRC。如圖所展示,CRC可在介於時間t!(即,在最 後封包C R C之後)以及時間t 2 (即,在下一個封包 C R C之前)間之任何時間而給解除致能。如上述,具有 對於每個封包瞬間改變處理協定之能力使得可以修改封包 接著封包之處理,該處理對於習知技藝之系統係不可以的 。因此,CRC可在當封包B 504向上傳送時之任何 時間被解除致能直到L L C資料結束或任何適當墊塞前, 該墊塞爲簡化未展示。 在另—例子中,假設該使用者想要對於在即將來臨封 包之先行予以解除致能。在一實施例中,假如想要對先行 解除致能,則對於解除致能之控制必須在處理適當先行之 前而被傳送。舉例而言,一旦封包C 5 0 6開始傳送時 ,該先行不可被解除致能,但是先行可以在介於時間t 4 ( T----------A------.玎------0 i':,.·''^."^〆”而之-念事^再^^^衣頁) 本紙張尺度追用中SS家標卑(CNS ) A4規格(210X297公犮) -54- 457444 .¾^..¾.中次樣浓局β Η消费合竹社印ί木 A7 B7 五、發明説明自2 ) 即’在產生封包c 506之先行之後)以及時間t5(即 ’在產生封包D 5 0 8先行之前)間而對於下一個封包 解除致能。如所示* 一旦在t 4以及t 5間被致能時,該下 —個封包D 5 0 8並不含一先行。相當重要的優點是.· · 該封包D 5 0 8因位在以及t2之間未如前述般地被 解除致能因此並不含一 C R C欄。當然,假如在任何時間 ’ C R C或先行再次被需要時,一適當控制訊號可以平行 封包接著封包爲基礎而被傳送以觸發該所結合之產生以及 添力口。 在一進一步的實施例中,假設一使用者想要修訂程式 化一展示在封包A 502以及封包B 504間之一存 在的I P G ”時間X。”成一較長時間之一段短時間。爲 修改該I P G,該使用者可簡單的傳送一適當控制訊號以 修改在任何經確認封包間之I P G。在此例子中,該使用 者可以增加在封包C 506以及封包D 508間所初 始之I P G。爲完成該修'改,該使用者必須傳送介於時間 t6 (即,在封包B 504之後)以及時間t7 (即,在 L L C資料結尾或任何封包C 5 0 6之適當墊塞之前) 間之適當控制。當然,假如封包C 5 0 6包含在一 CRC欄時,t7係在適當CRC欄位結尾處之前。 如所展示,該I P G之可程式化特性已被實現,且該 I P G時間短距現在係”時間X 〇 + X 1 ” 。一旦被程式化 t ,該新的I P G將被保持直到再次根據本實施例而被修改 。其優點在於具有修改I P G之能力致能一網路管理程式 本紙张尺度述用中SS家標卑(CNS ) Λ4说格(2](Vx 297公嫠) .55 - ~T , i 訂 11 線 (;?· .--¾•讀 *ηΛ 之..1蹋片坨'!-:1本5 > Γί"4Γφ.""-:ΐ·:ν·局貝工消於合作社印- 4^7444 A7 B7 五、發明説明恥) 以修改封包經由媒介傳送之速率。舉例而言,假如I P G 增加,則在一個別之週期時間時較少之封包被傳送。另一 方面,假如IPG減少時,在該相同時間週期時,更多之 封包將被傳送。 圖5 B係根據本發明之一實施例而在傳送公設區塊 220 (圖4)中所執行之狀態機器圖。在此實施例,該 狀態機器一直計算在狀態5 5 0下之前述公設變數。接著 ,在處理於傳送控制區塊中被執行時,該位在傳送公設方 塊210區域中之狀態計數器將一直被更新。以此方式, 該含在計算公設狀態5 5 0之計數器可在任何需要的時候 被讀取。假如在任何時間時,一開始取樣線旗標3 3 2 ( 圖4 C )被設成在狀況5 5 2下爲真,則該狀態將跳至一 初始狀態5 5 4,其中該暫存器被淸除且該計算公設狀態 5 5 0再次重新計算來自於畫板(scratch)中之處理狀態 。假如該狀態之"開始取樣線”旗標不爲真,則該計算公 設狀態將根據在圖4 A之控制暫存器區塊2 5 2中所設定 之暫存器而繼續計算該公設。優點在於,狀態5 5 2係類 似於一種觸發效果,該效果係作爲淸除該等暫存器以及開 始重新計算公設變數。 圖6係一流程圖以展示該經由根據本發明之一實施例 之資料路徑而結合在處理資料之處理步驟。該方法在步驟 6 0 1中開始,該60 1決定是否有封包要傳送。假如沒 有封包要傳送,則該方法將等待在直到有封包要傳送爲止 。假如有封包要傳送時,該方法將進行至步驟6 〇 2,該 本紙浪反度遝/f;中gg家忧净() Λ4規袼(公免) · 56 · ^---;------------IX------線 i-vw.^斤而之^--笋項再坨巧本疗) 457444 ο.部中戎代本而ϋί-χ^资合作社印- 五、發明説明Ρ4 ) 6 0 2中具有一傳送控制訊號(xc S )匯流排之設定封 包有效位元以傳送至標示在3 2位元寬之L L C資料路徑 具有資料要傳送之資料傳送區塊2 5 0。一旦該封包有效 位元在步驟6 0 2中之傳送控制xc S匯流排中被設定時· ’該方法將進行至步驟6 ◦ 4。在步驟6 0 4中,該主機 將被設定以傳送一”資料備妥”旗標以及爲現行封包提供 一在資料匯流排上之資料。 在此實施例中’該主機可視爲一作爲與媒介控制器( MA C )層相通訊之該上層l L C層》—旦該主機被設定 以傳送一 ”資料備妥”旗標以及爲現行封包提供一在資料 匯流排上之資料時,該方法進行至決策步驟6 〇 6,該 6 0 6係決定是否一”備妥資料”旗標已自以流量爲基礎 MAC150C圖2)而傳送至主機(LLC)。假如該 旗標未被傳送’此標示該以流量爲基礎MA C 1 5 0並未 準備自該L· L C層接收資料。在此點,該方法將等待而直 到該以流量爲基礎MA C 1 5 0藉由設定該傳送自主機( LLC)之適當”備妥資料"旗標而準備接收資料。 一旦資料備妥旗標在步驟6 0 6中被設定,該方法將 進行至步驟6 0 8,其中該現行封包資料之下一個3 2位 元係自L L C而供應至圖4之資料傳輸區塊。如圖4A所 述,該資料傳送區塊2 5 0經由一 3 2位元寬路徑而自該 L L C而接收資料。然而,應瞭解任何適合之路徑資料寬 度可在不違背本發明之精神.以及範圍下而被執行。 該方法現在進行至決策步驟6 1 0,該6 1 0係決定 ___ t·^I 訂 t * It i —汰 本紙伕尺度通圯中囡^家橾这*.( CNS ) Λ4規格(21(>;<;297公嫠) -57- 457444 Ά-'-中央.^^局貝-7-消先合竹、社印,ΐ! Α7 B? 五、發明説明自5 ) 是否有更多提供在現行封包下之資料。舉例而言’假如有 對於現行封包而言具有更多3 2位元寬之字元將被傳送時 ,該方法將反轉至決策步驟6 0 6,該6 0 6係決定是否 一備妥資料旗標已被傳送至該主機LLC已被來自於 . L L C之下一個3 2位元資料。假如決定該備妥資料旗標 在步驟6 0 6中已被傳送至該主機,則該方法將再次進行 至步驟6 0 8以及6 1 0,且再次回帶步驟6 0 6直到所 有對於現行封包之資料已被傳送^ 一旦在步驟6 1 0中決定出現行封包沒有資料時,該 方法將進行至步驟6 1 0,其中該封包有效位元以及作爲 傳送”資料備妥”旗標之主機被解除功能以表示此時沒有 現行封包要傳送之資料。當然,一旦該方法回歸至步驟 6 〇 1,其再次決定是否有更多之封包將要被傳送。接著 ,假如此時有更多封包要傳送,則該方法將再次經由步驟 6 1 2而自步驟6 0 2進行直到所有資料之位元組爲下個 位元封包傳送。 圖7展示一流程圖以展示結合在根據本發明之一實施 例之控制路徑之方法步驟。控制路徑處理在步驟6 0 2中 開始,其中其決定是否具有一對於個別控制暫存器之內容 之修改請求被請求。假如其決定其沒有對於個別控制暫存 器之修改請求,則該控制路徑處理將不會開始(即,資料 處理將在沒有任何修改而進行)以及該處理將再次轉換至 決策步驟7 0 2,其中其再次決定對於個別控制暫存器之 內容是否有修改之請求。 JL.------------IX------線 f-:,v w-n--^--^-^^^-1^./-.¾) 本紙乐反度適用中Kg家標缉(CNS ) Λ4現格297公釐) -58- 444 A7B,__五、發明説明砰) 舉例而言,圖4 B展示一組六個控制暫存器’該暫存 器經選擇已以在當其如圖6所述向下傳送該資料路徑時而 修改一個別封包處理之修改。接著,假如該使用者想要重 設在控制暫存器區塊2 5 2中之多個暫存器中之一個’則_ 一控制訊號如圖4 A所示而經由控制匯流排2 5 3而傳送 至控制暫存器區塊2 5 2。一旦一個別暫存器被選擇時’ 該暫存器之內容可經由寫入一個別値以修改D E F E R週 期暫存器3 0 4、時槽暫存器3 0 6、重試限制暫存器 3 0 8、或程式化最小/最大封包尺寸暫存器。 另一方面,假如指令協定暫存器3 0 2被選擇時,在 指令協定暫存器3 0 2中之各種旗標可以被選擇。如圖 4 C所示,此處有各種根據饋流至如圖4 A所示之控制暫 存器區塊2 5 2之控制資訊之型態而被觸發之旗標。舉例 而言,該使用者可藉由選擇fdplx 322旗標而在全雙工模式 下處理,或例如,該使用者可藉由選擇非CRC 326 旗標而對於C R C解除致能。當然,任何適合之暫存器旗 標或暫存器係根據使用者想要的處理協定之型態而被選擇 〇 很重要應瞭解的,該在圖7之控制路徑處理係一與正 在圖6執行之資料處理平行執行之分離處理。結果,經由 圖流處理之資料路徑所處理之資料,由於控制可如圖7而 被平行傳送,因此可在資料處理路徑與何時控制被傳送無 關時之任何點而被修改*因此,假如其在步驟7 0 2決定 對於個別控制暫存器內容之修改請求有需求時,該方法將 - 欠, 訂 腺 <^.^*之;i.-i5.?_!r;-3rw-v-;.本 F' ) 本紙张尺度进圯中KS家標卑(C:NS ) Λ4规格(2lOx297公楚) -59- 457444 Α7 Β7 五、發明説明π ) 進行至步驟7 0 4,其中該將被修改之個別控制暫存器被 確認且該對應被設定在xc S匯流排上之旗標被設定係爲 真。一旦該對應旗標被設定爲真,該對應控制資訊亦被設 定在控制匯流排上。舉例而言,假如沒有先行旗標被設定 在圖4 C之指令協定暫存器3 0 2中,該在圖6描述中正 被平行傳送之封包將不在具有添加在封包開頭處之對應先 行。 該方法現在進行至步驟7 0 6,其中一閘取控制係由 作爲驅動該X C S匯流排之L L C所設定=一旦該閛取控 制在7 0 6中設定,該方法將進行至步驟7 0 8,其中該 經辨識之控制暫存器爲了正被處理之個別封包而負載。一 旦該經辨識之控制暫存器在步驟7 0 8中被負載時,該方 法將進行至步驟7 1 0,其中該閘取控制被移除。一旦該 閘取控制在步驟7 1 0中被移除,該方法將回歸至步驟 7 0 2,其中其將再次決定是否需要對個別控制暫存器內 容之修改。假如需要的話,該方法將再次經由7 0 4至 7 1 0而執行。 圖8A係一載子控制狀態機器(CCSM) 266 ’ 該2 6 6係根據本發明之一實施例而包含在Ε ΤΗ E R區 塊2 1 2中。在此實施例,在當未有由圖3之 SUPERMAC Tx控制器118所正在執行之傳送 時,該狀態起始在一閒置狀態8 0 2 β當其在狀態8 0 4 中決定以接收一封包有效訊號、一延遲備妥訊號以及一後 退備妥訊號,則該狀態將移動至框狀態8 0 6,其中確實 本紙法尺及追川中枒卑(OS’S ),\4規格(210Χ 297公f ) -60- 4574 4 Α7 Β7 五、發明説明钟) 封包資料傳送係被處理。而在框狀態8 0 6中,C C SM 係持續在狀態8 0 8中決定在傳送封包時是否有碰撞發生 ϋ 舉例而言1假如一碰撞在狀態8 0 8中被偵測(如,· 其標示在一封包正被傳送時另一站台正試圖傳送),則該 狀態機器將跳至一壅塞狀態8 1 2,其中一壅塞訊號經由 該網路而向外送出且任何現行傳送將停止。該壅塞訊號亦 確保該所有在網路之其他站台亦偵測一碰撞且相同的停止 其傳送。一旦該其他站台接收該壅塞訊號且停止傳送時| 所有傳送暫將等待一任意”時槽”數目之預設後退週期, 該數目係經由使用前述切斷二進位指數後退演算法而計算 9 而在壅塞狀態8 1 2中,其被持續在狀態8 2 4中決 定是否壅塞已被完成。假如壅塞未被完成,該壅塞狀態將 繼續壅塞直到該壅塞狀態被完成。一旦其決定該壅塞以在 狀態8 2 4中完成時,該狀態將回歸至一閒置狀態8 0 2 〇 現再次參考狀態8 0 8,假如其在狀態8 0 8決定其 無碰撞,則該狀態將進行至另一狀態8 2 0,其中該 8 2 0決定是否該封包以停止。假如該封包未停止,該狀 態將回歸至框狀態8 0 6。另一方面,假如該封包在狀態 8 2 0中結束,該狀態將回歸至另一狀態8 2 2,該 8 2 2係決定封包是否大量湧現或載子擴展係需要的。如 所述,假如載子擴展係需要的,則該經傳送之封包最好係 {•'••-""化”而之^-念事^-再堉巧夂石) 本紙乐尺度遥用中ΚΚ家津(CNS ) Λ4叹格(210X297公釐> -61 - 4574 4·^ A7 B7 五、發明説明种) 至少5 1 2位元組長° —般而言’一封包係一載子事件之 部分且當每個封包傳送時’一512位元組之載子事件週 期必須在一新封包被傳送之前而消逝。因此,假如一封包 係小於5 1 2位元組資料,則最大至5 1 2位元組之其他 位元組一般將包含載子擴展符號。 假如其在狀態8 2 2決定出需要封包大量湧現或載子 擴展,則該狀態將進行至載子擴展狀態8 1 8,其中 8 1 8將如前述而執行適當載子擴展處理。而在載子擴展 狀態中,其在狀態8 1 6中決定以完成載子擴展。假如載 子擴展未完成,則載子擴展狀態將被維護。一旦載子擴展 已被完成,則其將在狀態8 1 4中決定是否需要封包大量 湧現(即,更多封包追隨)。假如在狀態8 1 4中需要封 包大量湧現’則該狀態該進行至步驟8 1 0。在狀態 8 1 0 ’其決定是否一延遲備妥狀況符合於該新封包。假 如延遲仍未備妥’在狀態將在載子擴展狀態8 1 8中被維 護’該818將繼續直到其在狀態816中決定一載子擴 展已被完成。另一方面,假如延遲已在狀態8 1 〇中備妥 ’則該狀態機器將決定是否一封包有效狀態複合狀態 8 11。 假如狀態8 1 1係符合的,則該狀態將回歸進行至前 述之狀態框8 0 6。另一方面,假如該封包有效狀態 8 1 1未符合’該狀態機器將回歸至閒置狀態8 〇 2。應 瞭解當在全雙工模式下,沒有載子感應也沒有碰撞偵測將 在狀態8 0 8中執行。一旦一致能旗標在步驟8 〇 5中設 本故“度制中賊家制(rNS 公髮) —--^— -r--,-----1在------^------@ (-""^'''”而之^&事^再-^‘::^^打) ί:Λ ii ,τ. f: /v Ik f > A7 B7 五、發明説明即) 定時,圖8 B中之一框控制狀態機器(F C SM)將被初 始。雖然該C C SM以及F C SM狀態機器係以分離狀態 機器而被描述,但應瞭解該兩個狀態機器之每一個可當作 一大的狀態機器而被操作。此外,很重要的是許多在 C C SM以及F C SM中執行之操作最好係被平行執行。 圖8 B係起始在狀態8 5 0,其中該框控制狀態機器 根據本發明之一實施例係在一閒置狀態8 5 0。由狀態 8 5 0中,該狀態機器係移動至一狀態8 5 1,其中經下 一決策以決定”致能”在圖8 A之C C S Μ狀態機器中係 真。一旦其在狀態8 5 1中決定該致能係真,則該狀態機 器將移動至狀態8 5 5,其中其決定是否需要一先行。舉 例而言,如圖4 C所展示,未先行3 2 8旗標可對於在以 流量爲基礎MAC 1 5 0中正被處理之每個封包予以適當 設定。假如一先行係需要的| 一適當的先行被產生且被添 加至正被處理之封包中。如上所示,先行一般係包含同步 資訊以及標示該框之開始的一開始框界線。 而在先行狀態8 5 2,其在狀態8 5 6中決定是否添 加先行已在先行狀態下完成。假如其爲完成,則先行狀態 8 5 4將繼續。一旦該適當先行已在狀態8 5 2中被添加 時’,則該狀態將移動至一資料狀態8 5 3,其8 5 3之資 料係經由適當資料路徑而被傳送。而在資料狀態8 5 2中 ,其在狀態8 5 8中繼續決定是否有碰撞。如前所述,假 如在當現行站台正在傳送時有其他站台試圖傳送時,一碰 撞將會發生。假如其決定出一碰撞以發生,則該狀態將回 -;ΐ1^..,5'ρ··之';i-$';fi再^) " -63- ^7444 i、發明説明自1 ) 歸至閒置狀態8 5 1且保持在閒置以等待一來自圖8 A之 C C S Μ中之一新的”致能”。 另一方面,假如其在狀態8 5 8中決定其沒有碰撞,. 則其在狀態8 6 0決定是否該封包以結束傳送。當然,假 如該封包需要墊塞,自動墊塞將在資料狀態8 5 2中執行 ’且因此該墊塞係被傳送封包之一部份。在此實施例中* 該在資料狀態8 5 3而正被傳送之封包並未包含CRC。 假如其在狀態8 6 0決定該封包仍未結束其傳送時,則該 狀態將回歸至資料狀態8 5 3,該8 5 3之資料將繼續傳 送直到完成》當其決定該封包以完成傳送以及狀態8 6 0 ’則其進一步決定CRC在狀態8 6 2中是否需要。 ..屮 '於合竹.ΐ 印" 舉例而言,如圖4C所示,假如非CRC 326旗 標被設定爲真,則非C R C該被附加至正在傳送之適當封 包的結尾。假如該C RC旗標並未在狀態8 6 2中設定爲 真,則該狀態將回歸至閒置以標示該整個封包已被傳送而 不需CRC。另一方面,假如該CRC旗標並未設定爲真 ’則C R C該添加在正被傳送之封包上且該狀態將進行至 —添加CRC狀態8 6 4,其中該8 6 4之正被傳送之現 行封包係具有一適當C R C之資訊。 接著,框控制狀態機器(FCSM) 265現已適當 傳送具有非先行、非C R C中之任一且偵測任何之碰撞* 當然1假如該圖4 C之全雙工3 2 2被設定爲真,則狀態 8 5 8將不被決定且將沒有碰撞偵測之嘗試· 本机依凡度远用ϋΊ:標i? ( CNS ) Λ4况格(2ΙΟΧ 297公楚) -64 - ixe 赶".部中欢棉^"M^-消贽合竹社印^ 4- Μ >1 A7 B7 ____ 五、發明説明自2 ) 接收器之一側 該圖2之以流量爲基礎MAC 1 5 0之接收側現在將 根據本發明之一實施例而描述。如所示,該圖2之接收側 一般係接收來自於實體媒介1 4 1之訊號,該訊號係輸入· 至SUPERMAC Rx控制器120。接著,以下描 述將展示在SUPERMAC Rx控制器120中所含 之操作區塊。 圖9展示一可被含在根例中之一接收器超傳「控制器 1 2 0中之功能方塊圖。如所示,其具有一主要資料路徑 ,該路徑係自一光纖頻道或一個十億位元媒介獨立介面( GMI I) 906而進入一接收器。雖然任何實體媒介可 被連接至接收器FC/GMI I 906中’一光纖頻道 解碼器9 0 8 —般係接收一個十位元訊號’該訊號係根據 眾人所知之光纖頻道標準所解碼。一旦被解碼’一個1 6 位元寬度之資料路竟被輸出至一接收器 FC/GMII 906。 亦展示的係一饋送至接收器FC/GMI I 906 中之一GMII 8位元寬之輸入。如所述,一適當 GMI I介面一般係具有讀取接收自各種型態之實體層裝 置之標準電子以及機械之訊號。一旦接收器 FC/GMI I 9 0 6接收並轉換該適當訊號至一適當 1 6位元寬之資料路徑時’該資料被轉移至一接收器 CRC檢查9 0 4中,該9 0 4之一 CRC檢查係對於該 所接收之封包上執行以決定是否在傳送時有一錯誤發生β 本紙張尺度遍用中1;围家標净(〔7^)/\4規格(210/297公釐) -65- ^»57444 A7 B7 五、發明説明$3 ) 經參考該傳送側而解釋,當一封包被傳送時,c R C被產 生且以一個四位元組之C R C欄而添加至該封包之尾端。 接著,在接收側,該接收器CRC檢查9 0 4執行相同之 C R C計算以決定是否在傳送時有一錯誤發生。 一般而言,假如該在區塊9 04之該CRC檢查輸出 與該添加在傳送側之區塊不同時,該錯誤一般係被認.爲係 在傳送時發生的。在C R C被檢查之同一時間,該資料被 傳送至接收器LLC介面902,該902之適當處理係 在對於該所接收之封包予以執行。舉例而言,墊塞移除、 開始取樣線、自我接收以及接收致能操作可根據在將參考 圖9 A以及9 B而詳細描述之接收器控制器暫存器中之適 當旗標而對於該所接收封包予以執行。 "".部中决標準局員工消费合作社印?衣 一旦該接收器L L C介面9 0 2在所接收封包中執行 適當之處理時,一個3 2位元之資料被輸出至該L L C上 層。一般而言,接收器L L C介面9 0 2係拫據該接收器 控制區塊910之狀態而對於該接收封包執行適當之處理 。在此實施例中,接收器控制區塊9 1 0最好係一具有可 控制該位在SUPERMAC Rx控制器1 20中執行 之適當處理操作。以展示的係一接收器公設區塊9 2 0, 該9 2 0最好經修改以維護該接收器之統計。在一實施例 中,傳統接收器統計訊號係展示在以下表4之中。 -66- (許先閲讀背而之注意事項再楨(1;本頁) 本紙張尺度適用中囡园家標绰(CNS ) A4規格(210X297公釐) 457444 A7 B7 五、發明説明P ) 經-¾.部中决標卑局•負-T消贽合作枉印鬈 表4 rcv2hst stat rc vEnabled 接收器正作用(致能) .. rcvError 接收有誤 errorCRC 具有C R C錯誤 erroLong 該封包過長(大於1 5 1 8 位元組):當然,標準封包 尺寸係根據本發明之實施例 而程式化 errorShort 封包較6 4位元組爲短,然 而,其可程式化 errorFrame 偵測到框錯誤(R X E R ) errorOverFlow 緩衝器過流 errorCRE 載子事件過長 error Protocol 在第一個封包完成512位 元組之前有新的封包進來 (只有十位位元) macControl 該封包係一 MA C控制封包 pkt8023 該封包係一802.3封包 recei velPG 所接收I P G之値 octsCnt 八進位計數器之値 ctrOflo w 計對數(對於IPG或位元 計數器)過流 Itilization factor 公設因數値 对先閱讀f而之注意事邛再楨.r-:J本頁j v° f «I. * I - . 本紙張尺度述州中KS家標肆(CNS ) Λ4規格(210X 297公i ) -67- 457444 A7 B7 五、發明説明05 ) 一實施例而在圖9之接收器 塊圖。如所示,一資料傳送區 C/GMII中接收一個16 收器控制暫存器9 5 2中之暫' ’ 器控制邏輯9 5 4之適當閘取 A C Rx控制器120將執 流排9 5 3傳送一適當控制( 自傳送控制訊號匯流排( 擇之處理控制將自接收控制暫 之處理區塊。在此實施例中, 接收控制區塊9 2 0,接收器 區塊920(圖9),以及接 A )。 ^"_部中吹標汍局員τ;消奸合作权印^ 圖 9 A 係根 據 本 發 明 之 L L C 介 面 9 0 2 之 詳 細 方 塊 9 5 0 白 圖 9 之 接 收 器 F 位 元 寬 之 資 料 〇 根 據 含在 接 存 器 的狀 態 以 及 由 一 接收 時 間 控制 j 該 S U P E R Μ 行 該 想 要 之 處 理 0 舉 例而 言 > 一 旦 控 制 匯 C Τ L ) 指 令 且 一 閘 取控制 X C S ) 所 傳 送 * 則一所 選 存 器 9 5 2 而 傳 送 至 所 m 擇 該 適 當 控制 資 訊 係 被 傳 送 至 F C / G Μ I I J 接 收 公 設 收 器 控 制 邏 輯 9 5 4 ( 圖 9 接 著 j 該 接 收 器 控 制 邏 ( 如 > 狀 態 機 器 ) 9 1 0 以 9 0 6 〇 在 — 實 施例 中 C 9 0 2 中 被剝 除 或 者 可 被 傳 理 器 1 1 4 a > 而在 該 處 理 塞 在傳 送 時被 添 加 至 資 料 欄 提 供 時 1 亦 可被傳 送 至 微 R 以 此 方式 > 墊 塞 資 訊 可 被 傳 1 1 4 a 中 以 作 爲 特殊 發 明 優 點 在於 傳 送 墊 塞 資 (許尤閱讀背而之注意事項再"Ά本頁) 輯9 5 4將與接收器控制區塊 及接收器FC/GMI I R C可在接收器L L C介面 送至圖2之微_RISC流處 器中執行剝除。此外,假如墊 ,該墊塞在一位元組致能未被 I SC流處理器1 14a中。 送至該微—R I SC流處理器 性之處理。 訊至L L C將允許在塾塞欄中 -68- 本紙張尺度述用中国國家榡卑(CNS ) Λ4規格(2]0Χ 297公釐) '邱十央枒^-^tH 合η-Ηίρ-^. 7 d 4 4 A7 ______B7 五、發明説明@6 ) 適當資訊之包含。在一進一步之實施例中,傳送該墊塞將 提供額外頻寬以包含管理資訊,該資訊可被用作確認在框 流中重要的個別框。在另一實施例中,假如該墊塞被傳送 時’該電待亦可包含時間戳記資訊,該資訊可用作決定網 路潛伏期。如上述,此潛伏期可被確認爲該將一即將在網 路傳送之封包資訊取出而到回傳至該傳送站之間的時間。 當然’墊塞只對具有小於6 4位元組之資料封包有效。另 一方面’假如該最小封包尺寸經程式化而增大爲6 4位元 組以上時,更多之封包將需要墊塞。 圖9 B展示根據本發明之一實施例中在一接收器控制 暫存器9 5 2中所含之旗標〃該第一旗標係一接收致能 990旗標,該旗標係標示該SUPERMAC Rx控 制器係備妥以接收資料。在此實施例中,致能9 9 0旗標 可由接受器控制邏輯9 5 4以及資料傳送區塊9 5 0所使 用以初始該接收協定。該下一旗標係一移除墊塞9 9 2旗 標’該旗標係用作設定墊塞移除操作。一般而言,任何所 需墊塞移除係在接收器控制區塊910狀態機器中執行, 該將在以下詳細描述。 該下一旗標係一開始取樣線9 9 4旗標,該旗標係作 爲觸發在該接收側之取樣。舉例而言,當開始取樣線 9 9 4被觸發時,該公設計數器被完全的復新(refresh ) ,且該接收之公設再次自塗寫區中記錄。該最後旗標係一 自我接收9 9 6旗標,該旗標係作爲致能所接收資料,該 資料係在當診斷操作執行時,藉由該傳送器而傳送。當然 才ϋ尺度適用中國S家樣单.(CNS ) Λ4^格(210X 297公釐) -69- ~ ~ ίίι閧讀背而之注意事邛再填巧本頁) 裝· 4 5^144 *;-部-B-央標準局兵T;消f合作权印掣 A7 B7 五、發明説明狖) ,假如操作係在半雙工且該媒介係Μ I I作用,該訊號將 被正常的自動傳回。雖然只有指定旗標被確認,但應瞭解 該任何數目之適當旗標或額外暫存器等可根據使用者需求 而被包括。 圖9 C展示一根據本發明之一實施例而包含在圖9之 接收器FC/GMI I 906中之結構的更詳細方塊圖 ==在此實施例中,一個第一輸入可被供應在自解碼器 9 0 8而輸入至光纖頻道(F C _ 1 )之一個1 6位元寬 之訊號,且第二(GM I I ) 8位元寬訊號可被輸入一個 十億位元媒介獨立介面處理區塊9 6 3。應瞭解該區塊 9 6 2以及9 6 3係獨立處理區塊。舉例而言,其他如向 下相容於100/10Mbps MI I介面單元之其他 介面亦可被實施。 以展示的是一共用控制資料路徑,該路徑係自光纖頻 道962以及GMII 963兩者接收而組合該控制以 及資料資訊而成爲1 6位元寬之多工訊號。一旦該資料以 及控制資訊在區塊9 6 1中多工化,則該流通將進行至上 述之接收器C R C檢查9 0 4以及接收器L L C介面 9 0 2。當然,假如只有單一訊號自該實體層中接收,該 接收器F C/GM I I亦具有在單一時間接收一個訊號而 不執行一多工操作之能力。 圖9 D係一方塊圖,展示根據本發明之一實施例而含 在接收公設區塊9 2 0 (圖9 )中之功能區塊之詳細情形 。如所展示,一支援邏輯區塊9 8 0係被使用以支援在接 本紙張尺度適用中國围家標夺(CNS ) Λ4規格(2]OX297公釐) -70- J---<ί·- II----% ------訂·------線 .I/ (誚1聞讀背而之注意亨項再^.¾本I ) 457444 A7 B7 五、發明説明押) 收控制區塊2 1 0中執行之功能。在中間區塊9 8 2 ’ 一 個內部封包間隙(I P G )以及八進位計數器係作爲記錄 所接收封包之I P G,並確認在每個封包所接收之位元組 之數目。舉一個在接收公設區塊9 2 0中所維護之變數表‘ 的例子,一個經由回應匯流排”rcv2hst_rsp”所接收而確認適 當統計之表格5係在以下展示。在一進一步的實施例,回 應匯流排"rcv2hst_rsp”之部分亦可由其他模組而驅動。 ^ T'"訂------線-- (-7 fW讀背而之"意事項洱崎、r':J本頁) #:-'部屮-乂標龙局資工消贽合作社印策 -71 - 本紙張尺度適用中國围家標埠(CNS ) Λ4规格(210X 297公釐) 457444 A7 B7 五、發明説明㈣) 表5 ^-••部屮^-^^员^消泠合^^印^ rc v2hst_rsp rc vClk 對於註冊該狀態資訊係有用 的 rc vDone 所接收封包以及封包狀態位 元係有效的 pkt Valid 接收器主動地接收封包(不 含先行) idle Valid 來自解碼器輸出之所要求方 向資料或GMII係有效的 byteEnable 對應之位元在rcv2hst_data匯 流排上係有效的 f c Kg en 當該KFLAG自FC-1埠或 RX_DV中接收,當RX_ER在 GMII埠中接收 padValid 現在P A D資料正在資料匯 流排上 ipgValid I P G資訊在狀態匯流排上 係有效的 octsValid 位元計數在狀態匯流排上係 有效的 (00) utilValid (〇 1) (10) 計數工作 潛流 過流 本紙張尺度这用中圔國家標卑(CNS ) Λ4規格(2丨0X297公釐) (許先閱^-介'&之注意事項再4巧本頁) 72- 457444 Α7 Β7 五、發明説明㈧) 仍然參考圖9 D,一瀑布式公設電腦9 8 4係作爲計 算使用根據一理想的"最小數目之C Ρ ϋ中斷"而可以瀑布式 方式而增加之電路的接收器公設。如上述’ 一旦該理想的 最小數目C P U中斷被確認時,該公設電腦電路可被瀑布· 式(即,對於增加之處理電力予以複製以及整合)以符合 理想之處理需求。接著,硬體電路之數量可根據一使用者 之效能需求而調整。 圖1 0係根據本發明之一實施例而在L L C之接收側 之資料流量之流程圖1 0 0 0。其優點在於該資料以及控 制資訊係以上述之平行方式而被處理。該資料路徑方法係 開始在步驟1 0 0 2,該步驟係決定一個封包有效訊號是 否爲真。假如一封包有效訊號不爲真,則該方法將等待直 到一封包有效訊號已被傳送以適當地標示該接收器係對封 包已備妥。當封包有效訊號爲真時,該方法將進行至步驟 1 0 0 4,該步驟中主機被設定以標示該主機是否備妥資 料。 在此實施例中,該主機係爲該上層L L C層,該層正 自圖2之以流量爲基礎之MA C 1 5 0中接收資料。當主 機在步驟1 0 0 4中標示其已備妥資料時,該方法將進行 至決策步驟1 0 0 6,該步驟係決定是否該接收器具有該 主機之資料。舉例而言,在此步驟中,其決定是否以流量 爲基礎之MA C 1 5 0具有將要被傳送之L L C層之資料 。假如其決定該接收器不具有將被傳送至L L C層之資料 ,則該方法將進行至決策步驟1 0 1 0,該步驟係決定是 -73- (兑先閱^背而之注念事項再^..'1,5本頁) 本紙乐尺度過用中KS家標卑(CNS ) Λ4現格(210Χ 297公f ) 45744 y部中决桴卑局Ηί-Τ消fr合作社印繁 A7 B7 五、發明説明(71 ) 否其具有一封包有效。 假如一封包有效訊號出現時,該方法將回歸至決策步 驟1 0 0 6,該步驟係再次決定是否該接收器具有主機之 資料。當該接收器不具有主機之資料,則該方法將進行至' 步驟1008,該1008中將含在該接收器中之資料( 如,下個32位元)傳送至該LLC層。另一方面,假如 其在步驟1 0 1 0中決定該封包有效訊號不存在,則該方 法將回歸至步驟1 0 1 2,該步驟中將主機(LLC)解 除對於標示其已備妥資料之縱作用。 以此點觀之,該方法將回歸至決策步驟1 0 0 2,該 步驟係再次決定該一封包有效訊號是否以被建立。此處, 該方法可繼續經由步驟1 0 1 0而自步驟1 0 0 2中流動 傳送之資料直到所有要求之資料以被傳送。 圖1 1係展示根據本發明之一實施例中結合在與一資 料路徑相平行之傳送控制之方法步驟的流程圖1 1 0 0。 在此實施例中,係描述結合在位於圖2之以流量爲基礎之 MA C 1 5 0的接收部份處理控制變數之修改中之方法步 驟。該方法步驟係開始在步驟1 1 0 2,該步驟係決定是 否需要對於個別接收內容暫存器之計數器的修改請求。 舉例而言,該接收控制暫存器可以是如前述含在接收 器控制暫存器區塊9 5 2中之暫存器。因此,適當之旗標 可以是含在接收器控制暫存器區塊9 5 2中之暫存器。即 ,假如該使用者想要去致能移除墊塞旗標9 9 2,則適當 控制訊號可藉由圖9 A之控制匯流排9 5 3而傳送至接收 ^---V------"------訂------喷!4 (攰先閱讀背而之.上意事項再坫巧本頁) 本紙張尺度述州中ΚΕΙΐ:標準(CNS ) Λ4規格(2I0X297公嫠) -74- 457444 A7 B7 五、發明説明作) 控制暫存器9 5 2,且一傳送控制訊號(XC S )將標示 該選擇之一閘取時間。Λ A A '' ^ A? __B7 V. Description of the invention The following table shows various status data, which is generated by transmitting the public block 2 2 0 in Figure 4 in the described embodiment. Of course, the transmission public block can be constructed to obtain other data. Generally speaking, common design devices are generally reloaded for short flows and overflows, and the best settings are ... Measured with 64 bytes. -^^-1 ^-., 71¾ Henry, fi-? RiA ···-'" Π)-· .τ · τ Line table I xmt2hst stat xmtEnabled The transmitter is enabled col Single One retry attempt colMultiplc multiple In a retry colLate collision occurred after the end of the collision window errorCRS Either the carrier sensor frame did not occur, or it came during transmission but disappeared errorllnderflow, hst2xmt _data_rdy 'RetryCnt when requested but retry count xmtLatency when transmitted The byte count is in this packet (the same is true for the latency counter) ctrO verflow counter overcurrent (can be applied to both the byte counter and the latency counter) U tilFactor public factor paper position 迖 + house mark CN (CNS) 8 4 specifications (210x297 mm) -41-A7 4 57 4 44 V. Inventive clock) A state machine diagram further shows some functions of transmitting the public block 2 2 0 as described below with reference to FIG. 5A. FIG. 4A is a more detailed block diagram of work and energy contained in the transmission L L C interface 200 of FIG. 4 according to an embodiment of the present invention. For example, a 32-bit wide L L C data path is rotated to the data transmission block 250, and the 250 also receives 4-byte control information from a control signal (X C S) bus. In addition, a control (CTL) bus 2 5 3 is used to transmit control information to a transmission control register block 2 from the multi-packet FIFO Tx106 and the micro RISC traffic processor 1 1 4 (Figure 2). 5 2. In this embodiment, the control bus 1 5 3 is best confirmed with “hsi2xmt_ctr. In this way, when the appropriate control signal is transmitted to a control register 2 5 2 via the control bus 2 5 3, The appropriate register in the register block 2 5 2 can be selected and set in the SUPERMAC Tx controller of Fig. 3 to enable the appropriate ideal processing function. Further shown is a 5-bit wide control signal XCS entry Control register block 2 5 2, the 2 5 2 is used as a selection register and set the number of latches of the selected register. This is also included in the transmission LLC interface 2 0 2 area control Logical block 2 54, which can receive a 2-bit wide XCS control signal that defines the boundary and packet transmission mode. The following is an example of Table 2 to show the various transmission control signals, which can be based on One embodiment of the present invention is executed. ------------ Two ί -------- Subscribe ------ Exercise jj (-'.''- "-" f: And. " " 宇 ^^} ϋ-; · '·-中 -V 标 ^^ Cooperation. 7i Printing and paper paper scale follow-up + ¾ ¾ Standard (CNS) Λ4 specification (210X29: / Mm) -42- 457444 A7 B7 Table 2 hst2xmt xcs testMode Put the transmitter into test mode-hstClk carries the host clock cmd Valid The instruction of hst2xmt_ctl bus is valid retCntValid retry counter is at hst2xmt_ctl bus slotTimeV alid to the slot The hst2xnu_ctl bus defPeriodValid delay period is hst2xmt_ctl bus pktValid The packet is valid and transmission can start idle Valid When the transmitter is interposed, the host must control TXD byteEnables The corresponding bit is in the hst2xmt_data bus. The valid klndex KGEN TX_EN or TX_ER output Source) "^ • κPlease ;: ν" "-. &Quot; 汔 事 ^ Jl1, Qiaoben ί) V. Description of the invention 妗 〇) S '!': Blowing n; i,-" i3c-T & quot 'fi ·' cooperation, shirt printing " In one embodiment, before performing data transmission, a handshake is matched between the traffic-based MA C 1 50 and the upper LLC layer. For example In other words, a suitable handshake can be a signal transmitted by the LLC layer to indicate that the data is prepared (eg, flag h 5 (2 and 1 ^ _. 13 _] * (17) and one by 1 ^ people based on .flow (150 paper size legacy in use ® S family standard (CNS) Λ4 specification (210X 297 mm) -43- 457444 " The work of the Central Conservation Bureau was cancelled by the combination of the right of the bamboo and the wooden seal A7 B7 5. The description of the invention 1) was transmitted and said that the 1 50 was a ready signal for the data. Once the appropriate flag has been set and the handshake has been confirmed (ie, the packet is valid) *, the data can be passed through the data bus between the upper LLC layer and the traffic-based MAC 1 50 (ie , ... hst2xmt_dat: a). For reference, FIG. 4A shows that the data leaves the transmission area 255 and the transmission CRC 204 as described in FIG. 4 and the control information system including the appropriate register selection performed in the area control logic 252. It is transmitted to the transmission control block 2 10 °. As described above, the control information block in the transmission control register block 2 5 2 is then used by ETHER 2 1 2 and is keyed by communication 2 0 3, 2 0 5 and 2 0 7 and sequentially return to the data processing traffic. For example, if the register in the transfer control register block 2 5 2 is set to avoid appending a data that is going to the SUPERMAC Tx controller 118 first, then the processing will be performed in ETHER 212 and afterwards It is transmitted back to the transmission LLC interface 202 via the communication link 203 »Then, the area control logic 2 5 4 also receives control from the transmission control block 2 10 • The 210 is from ETHER 212. In this way, the appropriately set execution of this bit in the control register block 252 is independent and is synchronized with the data being transmitted and processed through the data path. To further emphasize the advantages of this parallel processing control and data 'it is necessary to understand that while the data is being processed,' control information can be received to modify the data processing without waiting for the data to be fully processed. This paper is used by the prisoner S family standard (CNS) Λ4 specification (210 297 mm) -44-· .1¾¾ 汴 And " -Read this book item 4JA'1VV permanent page) ΛΤ · 457444 A7 ______ B, V. Description of the invention 啐) In this embodiment, the area control logic 2 5 4 has "to and from" the communication of the control block 210 to set the appropriate variables of the BACKOFF block 216 and the DEFER block 214. Other signals that can be used include, for example, "xmt2hst_abort", which can be transmitted directly to ETHER 212 to cut off any current transmission. Table 3 below shows an example of the control signal " xmt2hst_rsp ", which comes directly from the control bus 2 5 3. .--- r ------ " —— < Acuity.?-" " Behind the scenes, read the matter again .'- ':: Too ^)-" ^ 龙 " Only two elimination 纥 cooperation 印 印 ^ This paper scale into the middle of Sichuan Suppose. (CNS) Λ4 specification (2 | 〇y297 public 牦) -45- A? __ _B7 V. Description of the invention) Table 3 xmt2hst_rsp xmtClk Transmitter clock ... fdplx Full-duplex mode xmtOK Transmission completed (may have errors) ) XmtCol transmitter conflict (can be used to reset the FIF 0 indicator) latercy Valid The information of the bit counter is transmission potential) octs Valid The status bus (xmt2hst_stat (23: i3) carries the carry count information) (00) util Valid (01) (10) Counter work substream overcurrent loadData This signal can be used by the host operating at half the frequency and can optionally become xmt2hst_rdy4data (r-'^ K ^ 11: nlp; of ^- Henry Xiang replied with the present cigarette) line 4 ', ^ leather ^ negative ^ eliminated in cooperation /; 1 ^ ^ Figure 4B shows the control register described later, the register is according to an embodiment of the present invention Included in control register block 2 5 2 = as shown 'an instruction protocol register 3 0 2 and a delay period register 3 0 4' Time slot register 3 06, a retry limit register 3 0 8 and the paper scale (CNS) Λ4 specification (2IGX297 Gongchu) -46- 457444 A7 V. Description of the invention) A programmable The minimum / maximum packet size register 3 10 is included in the transmission control register block 2 5 2. Therefore, when the selected control signals C T L and X C S are transferred to transmit the transmission control register block 2 5 2, the properties of the selected register can be changed. In this way, the processing performed by SUPERMAC Tx can be modified. For example, if a user wants to program a custom retry limit, the retry limit register 308 can be selected by transmitting a control signal and an ideal gate time. Once gated, a new retry limit is programmed into the slave limit register 3 0 8 »In this embodiment, the retry limit register 3 0 8 can be a five-bit temporary register The register can be programmed to become any ideal "number" between 0 and 31. The programmable characteristics of the retry limit register 3 0 8 are special in performing network traffic management. useful. For example, if the "fixed" 802.3 standard retry limit "1 6" will cause too many packets to be dropped, the retry limit can simply be adjusted upwards to reduce the number of dropped packets. Similarly, the delay register 3 0 4 can be a 3-bit register (or any suitable size register). The register is preferably programmable for any number of times between about 32 bits and about The number between 1 0 2 4 bit times, and more preferably between about 3 2 bit times and about 5 1 2 bit times, and most preferably between about 32 bit times and g about 1 Between 2 and 8 bit times. In one example, the delay period register 3 0 4 can be programmed to approximately 96 bits. Because the delay period is generally the internal packet gap (IPG), when a user programs the delay period, the IPG that is being transmitted will be modified. For this IPG to change the size of this paper, use the KS Tsukasa Standard (CNS) Λ4 specification (210X297 male f > -47- I-: ------ R ------ ΪΤ ---- -^ (-• 1-'..?-| ( <:. Please 3 £ 'of': 1 ^ Yes. Item again ^ >-; 'Benwan') c " Ministry & Broadcasting Bureau Cooperatives' ^ 457444 A7 B7 _ V. Description of Invention 忡) As a result, the B-rate of the packet being transmitted can be increased or decreased. With this architecture, the time slot can be programmed to any number between about 2 bytes and about 5 10 bytes. In this embodiment, the 'time slot register 3 0 6 is preferably an 8-bit register 9 (or any appropriate-sized register'). For example, when the 8-bit register The registers are all one (that is, 1 1 1 1 1 1 1 1 1 1), then the total number of bits is 2 5 5 bits. When the 2 5 5 bit system is multiplied by 16 time slots 'The total number of bits will be 4080 bits or 510 bytes. Finally, the programmable minimum / maximum packet size register 3 1 0 allows the user to program the ideal size of the transmitted packet. For example' A conventionally defined packet has a fixed minimum size of 64 bytes. However, after considering that a packet transmitted over a high-speed network (eg, a gigabit speed or greater) may require a larger minimum Packet ruler In order to adapt to this possibility, a programmable minimum / maximum packet register is advantageously provided so that the user can modify the minimum packet size of the program. Figure 4C shows the contents of the instruction protocol register 3 0 2 * The 3 0 2 Contains some suitable flags to enable and disable the processing functions performed in the SUPERMAC TX controller 118. The example flags are as follows: (1) The Uniform Energy X Μ 3 2 0 flag is Data transfer processing: (2) —The full-duplex 322 flag enables the full-duplex function (in full-duplex, the carrier sensing is ignored); (3) —the autopad flag to set the extra bits The meta pad is packed in the packet to meet a minimum required size: (4) a non-CRC326 flag to deactivate the calculation that enables the CRC; (5) —the non-leading 328 flag ^^^^ 1 ^ mv l · ^ ϋ— —.1 t ^ i ^ t \ r < ”And .cfis ¥ '' ri4 ^ {VJ ^ i) KS Family Standard Net (CNS) Λ4 Specification (210 乂 297 mm) -48- 457444 A 7 B7 V. Invention Description It is marked with the deletion of the antecedent addition to the beginning of the packet: (6) —The non-carrier extension 3 3 0 flag is used to de-enable a minimum 5 1 2 byte carrier packet size, which is one billion bits The Yuan Ethernet standard is required under IEEE 802 · 3ζ; (7) —Initial sampling 'line 3 3 2 flag is used to start sampling the transmission line and generate statistics for block 2 2 0: and (8) — Forced transfer 3 3 4 flag as a forced transfer regardless of whether the medium is busy or not. The advantage is that when the appropriate register is set within the control register block 2 5 2 then the control register is being controlled. The ideal packet structure set in the memory block 2 52 can be manipulated while the data is being transmitted. Figure 4D shows a more detailed transmission CRC 2 0 4 (Figure 4) according to an embodiment of the present invention. As shown, a 16-bit wide data path is transmitted from the data transmission block 2 50 in FIG. 4A, and is synchronized via the CTC calculation unit 2 58 to The data path 2 5 6 is transmitted. In the CRC calculation unit 2 58, a standard periodic repetition check calculation is performed according to the IEEE 802.3 defining the algorithm. However, as mentioned above, if the CRC does not need to If the standard 3 2 6 is set to TRUE (as shown in Figure 4C), the non-CRC calculation will be performed or added to the packet being transmitted in the data transmission block 250. At this point • An appropriate CRC calculation After being executed and appended, if necessary, and the data is transmitted via the data path 2 5 6 | the packet information and CRC calculation unit via the data path will be transmitted to an appropriate multiplexer 2 60. Once Being multiplexed, a single _16-bit wide data path will lead to one of the shared control data paths J— '丨 _------ & ----- 1T-- ---- 0 The scale of this paper music is suitable for China ’s family inferiority (CNS) Λ4 specification (2.0 × 297 mm) -49-457444 Α7 Β7 βϋνΐ .-- 'ί'. ^ Ϊ́ί-. Bureau; Cooperation it printed ^ V. Description of the invention β) diameter 2 6 1. Figure 4 E shows a shared control / information that receives the 16-bit wide data from the multiplexer 2 60. Material path 261. When the data is received, the data is appropriately transcoded to one or two of the identified physical media interface units. For example, a media interface unit may be a billion-bit interface independent The interface (GM II) 2 6 3 and the other may be a fiber channel interface (FC-1) 262. As mentioned above, the MAC 1 50 based on the gigabit traffic in Figure 2 is completely backward compatible and can therefore be transmitted via a media independent interface (MI I). Therefore, it should be understood that the aforementioned media operations can be performed simultaneously or one at a time. Also shown is a shared control / data path 2 6 1 that transmits control block 2 10 and receives control information to confirm which operation mode is ideal. In general, FC-1, GMI I *, and MI I define this electronic standard and the mechanical interface required between flow-based MA C 1 50 and a selected physical medium. In this embodiment, the signal outputted via the optical fiber channel 2 62 preferably includes a txd_fc (16 bits wide), kgen (2 bits wide), and a transmission idle (flag). In general, txd_fc (data) and kgen (control) are mixed to generate the appropriate transmission symbol by the encoder 208. The signals output through GMI I are preferably tx_en (enable), tx_er (error), and ud (data). This information is then appropriately transmitted to the physical medium 140 as shown in FIG. 2. Further, the shared control data path 2 61 can receive an idle valid flag "signal from the area control logic 2 54. In one embodiment, J --------- A ----- -IT ------ 0 {T * :. tisf read t and then; ί.Μ.ώ Matters again M-1-: * 本 κ) SS home samples in the paper size tracking (CNS) / \ 4 specifications (210X 297 male f) -50- 457444 A7 ΒΊ 5. Invention Description Lang), when receiving a "idle valid flag", the appropriate symbol can be shot in the appropriate time (that is, in the packet between). This is especially useful when users want to send unique information without increasing the need for network attachment. For example, these special symbols may be transmitted when the network is uniquely known (i.e., an IPG cycle). This symbol can then indicate that there is a selected stylized idle symbol as defined by the 802.3 standard. In an embodiment, the symbol defined by the customized user may find a special use when a transmitting station needs to determine the response of a receiving station. That is, when a transmitting station propagates a modified user-defined symbol to the receiving station, the receiving station may or may not be able to process the modified user-defined symbol, thus providing the ability of a transmitting station with data at the receiving station. Figure 4F shows the support logic and state machines included in ETHER 212 according to one embodiment of the invention. As shown, a state machine support logic 264 is coupled to an air control state machine (FCSM) 265, and a carrier control state machine (CCSM) 266. State machine support logic 264 is generally used to support the combined state machine functions and to generate appropriate intermediate signals. In general, the processing performed by the disclosed state machine is modified on a packet-by-packet basis through parallel data and control processing paths. Therefore, when the individual registers contained in the transfer control register block 252 are modified, the processing variables of this bit in ETHER 212 will be executed sequentially and synchronously on the data being processed. . It should be understood that -51-SS family standard 4M CNS in the application of this paper standard) Λ4 圯 grid (210X297 mm) AR7 Α Δ Δ ι »" • " •-屮 " ^^ And, only the consumption竹 竹 社 印 " Α7 V. Description of the invention _) In the system of know-how, modification is allowed only between the entire packet transmission (not the middle packet). Generally speaking, FCSM 265 is responsible for processing data according to the flags set in the instruction protocol register 3 2 0. For example, if no antecedent is required, no antecedent is generated and added. The processing of the F CSM 2 65 is described in detail below with reference to FIG. 8B. Similarly, CCSM 266 is generally responsible for (a) determining whether to send packets without collision: (b) determining whether jamming is required; (c) determining whether the packet bursts and requires carrier expansion, etc. . The processing of the CCSM 266 is described in detail below with reference to FIG. 8A below. Still referring to FIG. 4F, a signal called “hst2xmt_abort” is directly displayed in ETHER 2.12. In one embodiment, 115 [2 \ 111 〖_31) 〇1 t is preferably marked as an immediate cut-off (even when an event box is being processed). The bounce function then allows the user to stop the transmission at any time during the packet transmission and "flush out" to keep a buffer of any untransmitted data. Advantages, this allows users to quickly and correctly remove any errors from the network and avoid sending unwanted data over the network. Fig. 4G is a block diagram showing a more detailed situation of the functional blocks contained in the transmission public block 220 (Fig. 4) according to an embodiment of the present invention. As shown, a support logic block 2 0 0 is preferably used as a support function performed in the transmission control block 2 10, which is responsible for setting the time slot and a minimum carrier packet size as About 5 1 2 bytes. In the middle block, the latency counter is responsible for transmitting I --.------ A ------, 玎 -------- 0 (^^^. Please ^ : And note ^ matters again ^^: too pages) This paper size is in use 1 ^: standard ( < ^ ’5) Eight 4 specifications (2 丨 0; < 297 mm) -52- A7 457444 B7 V. Description of the invention) The time before birth elapses, and the octal counter is used to confirm the number of bytes transmitted by each packet. In one embodiment, the latency is used as a time period from when a transmission is requested (for example, when a packet is valid to be received and a proper handshake is confirmed) to when an attempt is made to transmit. Therefore, if a collision occurs, a new latency period will be calculated. In addition, once this information is calculated, the information will be communicated via a bus 2 8 1 which transmits a control signal " xmt2hst_stat " and "xmt2hst_rsp". As described above, a proper handshake as an initial data transmission is generally a data preparation signal received from an upper LLC layer and a MA C signal indicating that the MA C layer is ready to receive data from the LLC layer. Layer (to the LLC layer) is ready for signal. Finally, a Cascadabie public computer 2 8 4 is used to calculate overflow and non-overflow variables. These variables use circuits added in accordance with the ideal "minimum C P U interrupt" waterfall method. For example · Once the minimum number of CPu interruptions is confirmed, the public computer circuit can be waterfall-type, that is, repeated and integrated to increase power to meet the requirements of ideal processing. Then, the number of hardware circuits can be adjusted according to the user's demand for performance. FIG. 5A is an illustration of four packets being transmitted via a traffic-based MA C 150 according to an embodiment of the present invention. To demonstrate the programmability within the parallel packets of the present invention, packets A 502, B B 504, C C 506, and D 508 are shown as being transmitted via the traffic-based MAC 1 50 in FIG. Because there is a separate data processing path and a separate control processing path, the pair-^-Ί -------- α · --------• --t-^ 'UCH consumer cooperation .71 Indian ^ ---- line. ------ This paper scale follows "China ^ Jiabiao Bei ([\ 5) 刎 Specifications (210/297 mm) -53- 457444 A7 B7 "-" `` Central ^^ Bureau Ordnance Industry ", &", company seal ^ V. Inventor 1) Data processing performed on event packets being transmitted via traffic-based MA C 1 50 Can be modified while the packet is being transmitted. To show this, for example, the transmission of packet A 502 is to have a look-ahead column, a destination address block, a source address column, and a length / type column (L / T). LLC information column, and a CRC column. Now suppose a user has to de-enable the CRC column of the next packet B 5 0 4 to be transmitted. In order to deactivate the C R C for the next transmission packet, the user does not have to wait for the next IPG as required by the conventional art embodiment. According to an embodiment of the present invention, the user can send a control signal of the packet B 5 04 to disable the CRC at any time after the CRC calculation for the packet A 50 2. As shown in the figure, the CRC may be de-enabled at any time between time t! (I.e., after the last packet CRC) and time t2 (i.e., before the next packet CRC). As mentioned above, having the ability to change the processing agreement for each packet instantaneously makes it possible to modify the processing of the packet and then the packet. This processing is not possible for systems of conventional skill. Therefore, the CRC may be de-enabled at any time when packet B 504 is transmitted upwards until the end of the L LC data or before any appropriate padding, which is not shown for simplicity. In another example, suppose that the user wants to disable the preemption of an upcoming packet. In one embodiment, if antecedent deactivation is desired, then control over deactivation must be transmitted before the appropriate antecedent is processed. For example, once packet C 5 0 6 begins to be transmitted, the antecedent cannot be de-enabled, but the antecedent can be between time t 4 (T ---------- A ------ . 玎 ------ 0 i ':,. · "^. &Quot; ^ 〆" And-read ^^^^^ Page) SS Family Standards (CNS) A4 specifications (210X297) 犮 -54- 457444 .¾ ^ .. ¾. Middle-level sample concentration bureau β ΗConsumer Hezhusha Yinfeng A7 B7 V. Description of the invention since 2) That is, 'in the generation of packet c 506 After) and time t5 (that is, 'before the generation of packet D 5 0 8 first) and the next packet is de-enabled. As shown * Once enabled between t 4 and t 5, the next packet D 5 0 8 does not include a look-ahead. The important advantage is that the packet D 5 0 8 does not include a CRC column because it is not enabled as described above and t2. Of course, If at any time a 'CRC or antecedent is needed again, an appropriate control signal may be transmitted on a packet-by-packet basis to trigger the combined generation and addition. In a further embodiment, it is assumed that a use Think Revision of a program displayed in one of 504 packets A 502 and B exist in the packet I P G "time X. "Into a longer period of time. In order to modify the IPG, the user can simply send an appropriate control signal to modify the IPG in any confirmed packet. In this example, the user can add a packet C The initial IPG between 506 and packet D 508. To complete the modification, the user must transmit between time t6 (ie, after packet B 504) and time t7 (ie, at the end of the LLC data or any packet C 5 0 6 before proper padding). Of course, if packet C 5 0 6 is included in a CRC field, t 7 is before the end of the appropriate CRC field. As shown, the IPG is programmable The characteristics have been implemented, and the short time range of the IPG is now "time X 0 + X 1". Once stylized t, the new IPG will be maintained until it is modified again according to this embodiment. The advantage is that it has modifications The ability of IPG enables a network management program. This paper uses the SS family standard (CNS) Λ4 Grid (2) (Vx 297 cm). 55-~ T, i order 11 lines (;? ·. --¾ • Read * ηΛ 之 .1 蹋 片 坨 '!-: 1 本 5 > Γί " 4Γφ. " "-: ΐ ·: ν · Bei Beigong disappeared in the cooperative seal-4 ^ 7444 A7 B7 V. Invention description) To modify the rate at which packets are transmitted through the media. For example, if IPG increases , Fewer packets are transmitted at another cycle time. On the other hand, if the IPG is reduced, more packets will be transmitted at the same time period. Figure 5 B is implemented according to one of the inventions For example, the state machine diagram executed in the transmission public block 220 (Figure 4). In this embodiment, the state machine always calculates the aforementioned public variables under the state 5 50. Then, it is processed in the transmission control block. When it is executed, the status counter of this bit in the transmission public block 210 area will always be updated. In this way, the counter included in calculating the public status 5 50 can be read at any time. If at any time At time, the initial sampling line flag 3 3 2 (Figure 4C) is set to be true under condition 5 5 2 and the state will jump to an initial state 5 5 4 where the register is erased And the calculation public status 5 5 0 is recalculated again The processing status in the scratch. If the "Start Sampling Line" flag of this status is not true, the calculation public status will be set according to the control register block 2 5 2 in Figure 4 A Continue to calculate the public settings. The advantage is that the state 5 5 2 is similar to a trigger effect, the effect is to eliminate these registers and start to recalculate public variables. FIG. 6 is a flowchart showing the processing steps combined with processing data via a data path according to an embodiment of the present invention. The method starts in step 601, which determines whether there are any packets to transmit. If no packet is to be transmitted, the method will wait until there is a packet to be transmitted. If there is a packet to be transmitted, the method will proceed to step 6 〇2, the paper wave inversion 遝 / f; Zhonggg Jiayoujing () Λ4 Regulations (public exemption) · 56 · ^ ---; --- ---------- IX ------ line i-vw. ^ Jin Erzhi ^-bamboo shoots and then repetitive ingenuity) 457444 ο. Ministry of Central Rongdaiben and ϋ-χ ^ Cooperative cooperative seal-V. Description of the invention P4) 6 0 2 has a transmission control signal (xc S) bus set packet effective bit to transmit to the LLC data path marked 32 bits wide with data to be transmitted Data transfer block 2 50. Once the packet is valid, the bit is set in the transmission control xc S bus in step 602 · ’The method will proceed to step 6 ◦ 4. In step 604, the host will be set to transmit a "data ready" flag and provide data on the data bus for the current packet. In this embodiment, 'the host can be regarded as an upper layer LC layer which communicates with the media controller (MAC) layer'-once the host is set to transmit a "data ready" flag and the current packet When providing data on the data bus, the method proceeds to decision step 6 06, which is to determine whether a “ready data” flag has been transmitted to the host from the traffic-based MAC150C (Figure 2) (LLC). If the flag is not transmitted, this indicates that the traffic-based MA C 1 50 is not ready to receive data from the L·LC layer. At this point, the method will wait until the traffic-based MA C 1 50 is ready to receive data by setting the appropriate "ready data" flag sent from the host (LLC). Once the data is ready the flag The target is set in step 606, and the method will proceed to step 608, in which a 32-bit bit under the current packet data is supplied from LLC to the data transmission block of Fig. 4. As shown in Fig. 4A As stated, the data transmission block 250 receives data from the LLC via a 32-bit wide path. However, it should be understood that any suitable path data width can be used without departing from the spirit and scope of the present invention. The method now proceeds to decision step 6 1 0, which 6 1 0 is determined by ___ t · ^ I Order t * It i —Tile paper size standard in China 囡 橾 家 橾 此 *. (CNS) Λ4 specifications (21 (>; <; 297 public 嫠) -57- 457444 Ά -'- Central. ^^ 局 贝 -7- 消 先 合 竹 、 社 印, ΐ! Α7 B? V. Description of invention since 5) Is there more available in Information under the current packet. For example, 'If there are more 32-bit wide characters for the current packet to be transmitted, the method will be reversed to decision step 6 06, which is 6 6 determines whether a data is ready A flag has been transmitted to the host. LLC has been sourced from a 32-bit file under. LLC. If it is determined that the prepared data flag has been transmitted to the host in step 6 06, the method will proceed to steps 6 8 and 6 1 0 again, and step 6 6 will be brought back until all the current packets are The data has been transmitted ^ Once it is determined in step 6 10 that there is no data in the line packet, the method will proceed to step 6 10, where the packet has valid bits and the host transmitting the "data ready" flag is Deactivate the function to indicate that there is no data to be transmitted in the current packet. Of course, once the method returns to step 601, it again decides if there are more packets to be transmitted. Then, if there are more packets to be transmitted at this time, the method will go through step 6 12 again from step 602 until all the data bytes are transmitted for the next bit packet. Fig. 7 shows a flowchart showing method steps incorporated in a control path according to an embodiment of the present invention. Control path processing begins in step 602, where it determines whether a modification request for the contents of an individual control register is requested. If it decides that it does not have a modification request for an individual control register, the control path processing will not start (ie, data processing will be performed without any modification) and the processing will be transferred to decision step 702 again, It again decides whether there is a request for modification of the content of the individual control register. JL .------------ IX ------ line f-:, v wn-^-^-^^^-1 ^. /-. ¾) Kg Family Standard (CNS) Λ4 is now 297 mm in the applicable degree) -58- 444 A7B, __V. Description of the invention Bang) For example, Figure 4B shows a set of six control registers' The temporary The register has been selected to modify a packet-specific modification when it transmits the data path down as described in FIG. 6. Then, if the user wants to reset one of the plurality of registers in the control register block 2 5 2 'then_ a control signal is shown in FIG. 4A via the control bus 2 5 3 And it is transmitted to the control register block 2 5 2. Once a different register is selected, the contents of this register can be modified by writing to a different register of the DEFER cycle register 3 0 4, time slot register 3 0 6, retry limit register 3 0 8, or stylized min / max packet size register. On the other hand, if the instruction agreement register 3 2 is selected, various flags in the instruction agreement register 3 2 can be selected. As shown in Figure 4C, there are various flags that are triggered according to the type of control information fed to the control register block 2 5 2 shown in Figure 4A. For example, the user may process in full-duplex mode by selecting the fdplx 322 flag, or, for example, the user may de-enable CR C by selecting the non-CRC 326 flag. Of course, any suitable register flag or register is selected according to the type of processing agreement desired by the user. It is important to understand that the control path processing system shown in FIG. 7 and FIG. 6 Data processing performed Separate processing performed in parallel. As a result, the data processed through the data path processed by the graph stream can be modified in parallel at any point when the data processing path has nothing to do with when the control is transmitted because the control can be transmitted in parallel as shown in FIG. Step 7 0 2 When it is determined that there is a demand for an individual control register content modification request, the method will-owe, order < ^. ^ * 之; i.-i5.? _! r; -3rw-v-;. This F ') This paper standard is included in the KS family standard (C: NS) Λ4 specification (2lOx297) ) -59- 457444 Α7 Β7 V. Invention description π) Proceed to step 7 0 4 where the individual control register to be modified is confirmed and the corresponding flag set on the xc S bus is set. Is true. Once the corresponding flag is set to true, the corresponding control information is also set on the control bus. For example, if no antecedent flag is set in the instruction protocol register 3 02 of FIG. 4C, the packet being transmitted in parallel in the description of FIG. 6 will not have the corresponding antecedent added at the beginning of the packet. The method now proceeds to step 706. One of the gate control is set by the LLC that drives the XCS bus = once the capture control is set in 706, the method will proceed to step 708. The identified control register is loaded for the individual packets being processed. Once the identified control register is loaded in step 708, the method proceeds to step 710, where the gate control is removed. Once the gated control is removed in step 7 10, the method will return to step 7 2 0, where it will again decide whether to modify the contents of the individual control registers. If necessary, the method is executed again from 704 to 7 1 0. Fig. 8A is a carrier control state machine (CCSM) 266 '. The 2 6 6 system is included in the E T Η E R block 2 1 2 according to an embodiment of the present invention. In this embodiment, when there is no transmission being performed by the SUPERMAC Tx controller 118 of FIG. 3, the state starts in an idle state 8 0 2 β when it decides to receive a packet in the state 8 0 4 A valid signal, a delayed ready signal, and a back-ready signal, the state will move to the frame state 806, where the paper ruler and the Chuanchuan Zhongbei (OS'S), \ 4 specifications (210 × 297 male f) -60- 4574 4 Α7 Β7 V. Description of invention bell) The packet data transmission system is processed. In frame state 8 06, the CC SM system continues to determine whether there is a collision when transmitting packets in state 8 0. For example, 1 if a collision is detected in state 8 0 (eg, its Indicates that another station is trying to transmit while a packet is being transmitted), then the state machine will jump to a congestion state 8 1 2 where a congestion signal is sent out through the network and any current transmission will stop. The congestion signal also ensures that all other stations on the network also detect a collision and stop its transmission in the same way. Once the other station receives the congestion signal and stops transmitting | all transmissions will temporarily wait for a preset back-off period of any number of "time slots", which is calculated by using the aforementioned cut-off binary index back-step algorithm to calculate 9 and Congestion state 8 1 2 is continued in state 8 2 4 to determine whether congestion has been completed. If congestion is not completed, the congestion state will continue to be congested until the congestion state is completed. Once it decides that the congestion is to be completed in state 8 2 4, the state will return to an idle state 8 0 2 0. Now refer to state 8 0 8 again. If it determines that it has no collision in state 8 0 8, the state Will proceed to another state 8 2 0, where the 8 2 0 decides whether the packet should stop. If the packet is not stopped, the state will return to the frame state 806. On the other hand, if the packet ends in state 8 2 0, the state will return to another state 8 2 2. The 8 2 2 determines whether a large number of packets emerge or the carrier expansion is needed. As mentioned, if the carrier expansion is needed, the transmitted packet should preferably be {• '••-" " 化 "and ^-念 事 ^-堉 巧 堉 石) Paper scale In remote use, ΚΚ 家 津 (CNS) Λ4 intersect (210X297 mm > -61-4574 4 · ^ A7 B7 V. Description of the invention) At least 5 1 2 bytes long-Generally speaking, a packet is one The part of the carrier event and when each packet is transmitted, the period of a 512-byte carrier event must elapse before a new packet is transmitted. Therefore, if a packet contains less than 5 1 2 bytes of data, then Other bytes up to 5 1 2 bytes will generally contain a carrier expansion symbol. If it decides in state 8 2 2 that a large number of packets need to emerge or carrier expansion, this state will proceed to carrier expansion state 8 18, of which 8 1 8 will perform the appropriate carrier expansion processing as described above. In the carrier expansion state, it is decided in state 8 1 6 to complete the carrier expansion. If the carrier expansion is not completed, the carrier The expansion state will be maintained. Once the carrier expansion has been completed, it will decide in state 8 1 4 A large number of packets need to emerge (ie, more packets to follow). If a large number of packets need to emerge in state 8 1 ', then the state should proceed to step 8 1 0. In state 8 1 0' it determines whether a delay is ready. Complies with the new packet. If the delay is not yet ready, 'In state will be maintained in carrier extension state 8 1 8' The 818 will continue until it determines in state 816 that a carrier extension has been completed. On the other hand If the delay has been prepared in the state 8 1 0, then the state machine will determine whether a packet is valid and the state 8 11. If the state 8 1 1 is consistent, the state will return to the aforementioned state box 8 0 6. On the other hand, if the packet valid state 8 1 1 does not meet the state, the machine will return to the idle state 8 02. It should be understood that when in full duplex mode, there is no carrier sensing and no collision detection. Executed in state 8 0. Once the consensus energy flag is set in step 8 05, "the thief family in the system (rNS public)--^--r-, ----- 1 In ------ ^ ------ @ (-" " ^ '' '"and ^ & 事 ^ 再-^' :: ^^ 打) ί: Λ ii, τ. F: / v Ik f > A7 B7 V. Explanation of the invention) Timing, one of the box control state machines (FC SM) in Figure 8B will be initialized. Although the CC SM and FC SM state machines are described as separate state machines, but it should be understood that each of these two state machines can be operated as a large state machine. In addition, it is important that many of the CC SM and FC The operations performed in the SM are preferably performed in parallel. Fig. 8 B is started in a state of 850, where the box controls the state machine according to an embodiment of the present invention in an idle state of 850. From the state 850, the state machine moves to a state 851, where the next decision is made to determine that "enable" is true in the CCSM state machine in Fig. 8A. Once it decides that the enabling is true in state 8 51, the state machine will move to state 8 5 5 where it decides whether a look-ahead is needed. For example, as shown in Fig. 4C, the unprecedented 3 2 8 flag can be appropriately set for each packet being processed in the traffic-based MAC 150. If an antecedent is needed | an appropriate antecedent is generated and added to the packet being processed. As shown above, the look-ahead usually contains synchronization information and the first frame border that marks the beginning of the frame. In the advanced state 8 5 2, it is determined in the state 8 5 6 whether the addition of the advanced state is completed in the advanced state. If it is complete, the antecedent state 8 5 4 will continue. Once the appropriate antecedent has been added in state 8 5 2 ', the state will move to a data state 8 5 3 whose data is transmitted via the appropriate data path. In the data state 8 5 2, it continues to determine whether there is a collision in the state 8 5 8. As mentioned earlier, if another station attempts to transmit while the current station is transmitting, a collision will occur. If it decides that a collision will occur, the state will return-; ΐ1 ^ .., 5'ρ ·· 之 '; i-$'; fi 再 ^) " -63- ^ 7444 i. Description of the invention since 1) Return to the idle state 8 51 and remain idle to wait for a new "enable" from one of the CCS Ms in Figure 8A. On the other hand, if it decides that it has no collision in state 8 58, then it decides in state 8 6 0 whether the packet should end transmission. Of course, if the packet needs padding, automatic padding will be performed in the data state 852 and therefore the padding is part of the transmitted packet. In this embodiment * the packet being transmitted in the data state 8 5 3 does not contain a CRC. If it is in the state 8 60 that the packet has not yet completed its transmission, the state will return to the data state 8 5 3, and the 8 5 3 data will continue to be transmitted until completion. "When it decides the packet to complete the transmission and State 8 6 'then it further determines whether the CRC is needed in state 8 62. .. 屮 '于 合 竹 .ΐ 印 " For example, as shown in Figure 4C, if the non-CRC 326 flag is set to true, the non-CRC should be appended to the end of the appropriate packet being transmitted. If the C RC flag is not set to true in state 8 62, the state will return to idle to indicate that the entire packet has been transmitted without a CRC. On the other hand, if the CRC flag is not set to true, then the CRC should be added to the packet being transmitted and the state will proceed to-add the CRC state 8 6 4 where the 8 6 4 is being transmitted. The current packet is information with an appropriate CRC. Next, the Frame Control State Machine (FCSM) 265 has now properly transmitted any non-preemptive, non-CRC and detects any collisions * Of course 1 if the full duplex 3 2 2 of this FIG. 4 C is set to true, Then the state 8 5 8 will not be determined and there will be no collision detection attempts. · This machine is far-fetched according to the standard: ii? (CNS) Λ4 格格 (2ΙΟΧ 297 公 楚) -64-ixe rush ". Huan Mian Huan ^ " M ^ -elimination of the combined bamboo company seal 4- 4-M > 1 A7 B7 ____ V. Description of the invention from 2) One side of the receiver The flow-based MAC of Figure 2 MAC 1 5 0 The receiving side will now be described according to an embodiment of the invention. As shown, the receiving side of FIG. 2 generally receives a signal from the physical medium 1 41, which is input to the SUPERMAC Rx controller 120. Next, the following description will show the operation blocks contained in the SUPERMAC Rx controller 120. Figure 9 shows a functional block diagram of a receiver overdrive "controller 120" that can be included in the root case. As shown, it has a main data path, which is from a fiber channel or a ten Gigabit Media Independent Interface (GMI I) 906 into a receiver. Although any physical medium can be connected to the receiver FC / GMI I 906 'a fiber channel decoder 9 0 8-generally receives a ten bit The signal 'The signal is decoded according to the well-known optical fiber channel standard. Once decoded', a 16-bit wide data path is actually output to a receiver FC / GMII 906. Also shown is a feed to the receiver One of the GMII 8-bit wide inputs in FC / GMI I 906. As mentioned, a suitable GMI I interface generally has standard electronic and mechanical signals for reading and receiving from various types of physical layer devices. Once the receiver When FC / GMI I 9 0 6 receives and converts the appropriate signal to an appropriate 16-bit wide data path, the data is transferred to a receiver CRC check 904, one of the CRC checks Execute on the received packet to determine yes No An error occurred during transmission β The paper size is in common use 1; Wei Jia Biao Jing ([7 ^) / \ 4 size (210/297 mm) -65- ^ »57444 A7 B7 V. Description of invention $ 3) Explained with reference to the transmitting side, when a packet is transmitted, c RC is generated and added to the end of the packet with a CRC field of four bytes. Then, on the receiving side, the receiver CRC check 9 0 4 Performs the same CRC calculation to determine whether an error occurred during transmission. In general, if the CRC check output in block 9 04 is different from the block added on the transmission side, the error is generally caused by It is considered to have occurred at the time of transmission. At the same time that the CRC is checked, the data is transmitted to the receiver LLC interface 902, and the proper processing of the 902 is performed on the received packet. The plug removal, start of sampling line, self-receiving, and receiving enabling operations may be performed on the received packet according to the appropriate flags in the receiver controller register which will be described in detail with reference to FIGS. 9A and 9B. &Quot; " .Ministerial Standards Bureau Industrial and consumer cooperative printing? Once the receiver LLC interface 9 0 2 performs appropriate processing in the received packet, a 32-bit data is output to the upper layer of the LLC. Generally speaking, the receiver LLC interface 9 0 2 is based on the state of the receiver control block 910 and appropriate processing is performed on the received packet. In this embodiment, the receiver control block 9 1 0 is preferably a device with a controllable bit in the SUPERMAC Rx control. Appropriate processing operations performed in the processor 120. A public block 9 2 0 of a receiver is shown. The 9 2 0 is preferably modified to maintain statistics of the receiver. In one embodiment, the conventional receiver statistics are shown in Table 4 below. -66- (Xu first read the back of the precautions before (1; this page) This paper size is applicable to Zhongyuan Garden Standard (CNS) A4 specification (210X297 mm) 457444 A7 B7 V. Description of the invention P) -¾. The Ministry of China and the Ministry of Justice finalize the decision. • Negative-T cancellation cooperation seal. Table 4 rcv2hst stat rc vEnabled Receiver is working (enable). RcvError Received error errorCRC has CRC error erroLong The packet is too long (greater than 1 5 1 8 bytes): Of course, the standard packet size is stylized according to the embodiment of the present invention. The errorShort packet is shorter than 64 bytes. However, its programmable errorFrame detects a frame error (RXER). errorOverFlow Buffer overcurrent errorCRE Carrier event is too long error Protocol A new packet comes in before the first packet completes 512 bytes (only ten bits) macControl This packet is a MA C control packet pkt8023 This packet is a 802.3 packet recei velPG received IPG 値 octsCnt octal counter 値 ctrOflo w logarithmic (for IPG or bit counter) overcurrent Itilization factor public factor 値 read first f's attention matters again. r-: J page jv ° f «I. * I-. This paper size is described in the KS family standard (CNS) Λ4 specification (210X 297 male i) -67- 457444 A7 B7 5. Invention Description 05) An embodiment is shown in the receiver block diagram of FIG. 9. As shown, a data transfer area C / GMII receives a 16 register control register 9 5 2 temporarily '' device control logic 9 5 4 the appropriate gate AC Rx controller 120 will execute the current row 9 5 3 Transmit an appropriate control (Self-transmitting control signal bus (The selected processing control will self-receive the control block temporarily. In this embodiment, the receiving control block 9 2 0, the receiver block 920 (Figure 9) , And then A). ^ &Quot; _Bid in the ministry 汍 Bureau member τ; stamp of cooperation rights ^ Figure 9 A is a detailed block 9 0 2 of the LLC interface 9 0 2 according to the present invention 9 5 0 White receiver F Bit-width data 0 According to the status of the register and a receiving time control, the SUPER M line should be processed as desired 0 For example > once the control sink C T L) instruction and a gate control XCS ) Transmitted * then a selected register 9 5 2 is transmitted to the selected one. The appropriate control information is transmitted to FC / GM IIJ receiving public receiver control logic 9 5 4 (Figure 9 followed by j Receiver control logic (eg, > state machine) 9 1 0 to 9 0 6 〇— In the embodiment C 9 0 2 is stripped or can be used by the processor 1 1 4 a > When transmitting, it is added to the data column. When provided, 1 can also be transmitted to micro R. In this way, pad information can be transmitted in 1 1 4 a as a special invention. The advantage lies in the transmission of padding data (Xu You reads the back (Notes on this page) Series 9 5 4 The receiver control block and receiver FC / GMI IRC can be sent to the micro_RISC processor in Figure 2 to perform stripping. In addition, If the pad, the pad is plugged in a tuple that is not enabled by the I SC stream processor 1 14a. Send to the micro-RI SC stream processor for processing. The message to LLC will be allowed in the congestion column- 68- This paper uses the Chinese National Standards of Humble (CNS) Λ4 specification (2) 0 × 297 mm) 'Qiu Shiyang 桠 ^-^ tH and η-Ηίρ- ^. 7 d 4 4 A7 ______B7 5. Description of the invention @ 6) Contains appropriate information. In a further embodiment, transmitting the pad will provide additional bandwidth to include management information, which can be used to identify individual boxes that are important in the box flow. In another embodiment, if the pad is transmitted, the radio may also include time stamp information, which can be used to determine the network latency. As mentioned above, this latency can be confirmed as the time between when the packet information to be transmitted on the network is retrieved and returned to the transmitting station. Of course, 'padding' is only valid for data packets with less than 64 bytes. On the other hand, if the minimum packet size is increased to 64 or more bytes by programming, more packets will need to be plugged. FIG. 9B shows a flag included in a receiver control register 9 5 2 according to an embodiment of the present invention. The first flag is a receiving enable 990 flag, and the flag indicates that The SUPERMAC Rx controller is ready to receive data. In this embodiment, the enable 990 flag can be used by the receiver control logic 954 and the data transfer block 950 to initiate the receiving protocol. The next flag is a removing plug 9 9 2 flag ', and the flag is used to set a plug removing operation. In general, any required plug removal is performed in the receiver control block 910 state machine, which will be described in detail below. The next flag is the initial sampling line 9 9 4 flag, which is used as a trigger for sampling on the receiving side. For example, when the start sampling line 9 9 4 is triggered, the public counter is completely refreshed (refresh), and the received public register is recorded from the scratch area again. The last flag is a self-receiving 9 9 6 flag. The flag is received as enabling data, which is transmitted by the transmitter when a diagnostic operation is performed. Of course, the standard is applicable to the sample list of the Chinese family. (CNS) Λ4 ^ grid (210X 297 mm) -69- ~ ~ ίί read the back of the matter and fill in this page) 4 5 ^ 144 * ; -Ministry-B-Central Bureau of Standards T; Removal of cooperation rights A7 B7 V. Description of the invention 狖), if the operation is in half duplex and the media is M II, the signal will be automatically transmitted normally return. Although only the designated flags are confirmed, it should be understood that any number of appropriate flags or additional registers, etc. may be included according to user needs. FIG. 9C shows a more detailed block diagram of a structure included in the receiver FC / GMI I 906 of FIG. 9 according to an embodiment of the present invention == In this embodiment, a first input can be supplied at Decoder 9 0 8 and input a 16-bit wide signal to the fiber channel (FC _ 1), and the second (GM II) 8-bit wide signal can be input to a gigabit media independent interface processing area Block 9 6 3. It should be understood that 9 6 2 and 9 6 3 are independent processing blocks. For example, other interfaces that are downwardly compatible with the 100 / 10Mbps MI I interface unit can also be implemented. Shown is a shared control data path. The path is received from both fiber channel 962 and GMII 963, and the control and data information are combined to form a 16-bit wide multi-mode signal. Once the data and control information are multiplexed in block 961, the circulation will proceed to the receiver C R C check 9 0 4 and the receiver L L C interface 9 0 2 described above. Of course, if only a single signal is received from the physical layer, the receiver F C / GM I I also has the ability to receive a signal at a single time without performing a multiplexing operation. Fig. 9D is a block diagram showing the detailed situation of the functional block included in the receiving public block 920 (Fig. 9) according to an embodiment of the present invention. As shown, a support logic block 980 is used to support the application of the Chinese Enclosure Standard (CNS) Λ4 specification (2) OX297 mm at the paper size -70- J --- <-· II ----% ------ Order · ------ line. I / (诮 1 read the back and pay attention to the item again ^ .¾ this I) 457444 A7 B7 V. Description of the invention bet) The functions executed in the control block 2 10 are received. In the middle block 9 8 2 ′, an internal packet gap (IPG) and octal counter are used to record the IPG of the received packet and confirm the number of bytes received in each packet. As an example of the variable table ‘maintained in the receiving public block 9 2 0, a table 5 confirming the appropriate statistics received by the response bus“ rcv2hst_rsp ”is shown below. In a further embodiment, the part responding to the bus " rcv2hst_rsp " can also be driven by other modules. ^ T '" Order ------ line-- (-7 fW read the back " meaning Matters (Sakizaki, r ': J this page) #:-' 部 屮-乂 标 龙 局 资 工 消 贽 社 贽 印 印 -71-This paper size is applicable to China Weijia Standard Port (CNS) Λ4 specification (210X 297) (Centi) 457444 A7 B7 V. Description of the invention ㈣) Table 5 ^-•• 部 屮 ^-^^ 员 ^ 消 合 合 ^^ 印 ^ rc v2hst_rsp rc vClk The packets received by rc vDone that are useful for registering this status information and The packet status bit is valid. The pkt Valid receiver actively receives the packet (excluding the leading one). Idle Valid The required direction data from the decoder output or the byteEnable corresponding to GMII is valid. The corresponding bit is valid fc on the rcv2hst_data bus. Kg en When the KFLAG is received from FC-1 port or RX_DV, when RX_ER receives padValid in GMII port PAD data is now on the data bus ipgValid IPG information is valid on the status bus octsValid bit count is on the status bus Active (00) utilVal id (〇1) (10) Counting work flow through the current paper size This paper uses the Chinese National Standard (CNS) Λ4 specification (2 丨 0X297 mm) (Xu Xianyou ^-介 '& Note and then 4 smart books Page) 72-457444 Α7 Β7 V. Description of the invention ㈧) Still referring to FIG. 9D, a waterfall public computer 9 8 4 series is used for calculation according to an ideal " minimum number of CP interrupts " The receiver public of the added circuit. As described above, once the ideal minimum number of CPU interrupts is confirmed, the public computer circuit can be waterfall-style (that is, the increased processing power is copied and integrated) to meet the ideal. Processing requirements. Next, the number of hardware circuits can be adjusted according to a user's performance requirements. Figure 10 is a flowchart of data flow on the receiving side of the LLC according to an embodiment of the present invention. The advantage is that the data and control information are processed in a parallel manner as described above. The data path method starts at step 102, which determines whether a packet valid signal is true. If Packet valid signal is not true, then the method waits until a valid signal has been transmitted packet appropriately to the receiver based on the designated sealing the package is ready. When the packet valid signal is true, the method will proceed to step 104, in which the host is set to indicate whether the host is ready for data. In this embodiment, the host is the upper L L C layer, which is receiving data from the traffic-based MA C 1 50 in FIG. 2. When the host indicates that it has prepared the information in step 104, the method will proceed to decision step 106, which determines whether the receiver has the information of the host. For example, in this step, it is decided whether the traffic-based MA C 1 50 has the data of the L L C layer to be transmitted. If it decides that the receiver does not have the data to be transmitted to the LLC layer, the method will proceed to decision step 1 0 1 0, which is determined to be -73- (commenting with the first consideration and the other considerations before ^ .. '1,5 pages) KS Family Standards (CNS) used in this paper music standard Λ4 is present (210 × 297 male f) 45744 Ministry of Chinese Ministry of Justice 桴 Bureau 桴 -Τ 消 fr Cooperatives Indo A7 B7 V. Description of the invention (71) Whether it has a package is valid. If a valid signal of a packet appears, the method will return to decision step 106, which decides again whether the receiver has the data of the host. When the receiver does not have the data of the host, the method will proceed to step 1008 in which the data contained in the receiver (eg, the next 32 bits) is transmitted to the LLC layer. On the other hand, if it decides that the packet valid signal does not exist in step 10 10, the method will return to step 10 12 in which the host (LLC) is released from marking the information that it has prepared.横 效应。 Vertical effect. From this point of view, the method will return to the decision step 10 02, which decides again whether the valid signal of the packet is to be established. Here, the method may continue to flow the data transmitted in step 10 2 through step 10 10 until all requested data is transmitted. FIG. 11 is a flow chart showing the steps of a method for controlling transmission in parallel with a data path according to an embodiment of the present invention. In this embodiment, the method steps are described in combination with the modification of the processing control variables of the receiving part of the traffic-based MA C 1 50 located in FIG. 2. The method steps start at step 1 102. This step determines whether a modification request to the counter of the individual received content register is required. For example, the reception control register may be a register included in the receiver control register block 952 as described above. Therefore, the appropriate flag may be a register contained in the receiver control register block 9 5.2. That is, if the user wants to enable the removal of the pad flag 9 9 2, the appropriate control signal can be transmitted to the receiver by the control bus 9 5 3 of FIG. 9 A ^ --- V --- --- " ------ Order ------ Spray! 4 (Please read the reverse first. The above matters are not included on this page.) This paper refers to KEKI in the state of the paper: standard (CNS) Λ4 specification (2I0X297) 嫠 -74- 457444 A7 B7 V. Description of the invention) Control The register 9 5 2 and a transmission control signal (XC S) will indicate a gate time of the selection.
*1T 一旦一修改在步驟1 1 〇 2中被請求,則該方法將進 行至步驟1 1 0 4,該步驟中該適當接收控制暫存器被確 認且該對應旗標被設定在xcs匯流排,且設定爲真。此 外,一旦該旗標被設定在該X c s匯流排,該對應控制訊 號係位在該C T L 9 5 3控制匯流排中。該方法進行至步 驟1 1 0 6,該步驟中閘取控制係對事當旗標設定。一旦 閘取控制在步驟1 1 0 6對該適當旗標設定時,該方法進 行至步驟1 1 0 8,該步驟中被確認之接收控制暫存器係 經由圖9之接收L L C介面9 0 2而對適當處理予以載入 。一旦該適當控制暫存器在步驟1 1 〇 8中被載入,該方 法進行至步驟1 1 1 0,該步驟中閘取控制係被移除。重 要的是’該接收控制路徑1 1 0 0可與正經由圖1 〇之接 收資料流量路徑1 0 0 0而傳送之資料平行處理。 圖1 2係根據本發明之一實施例而對於圖9接收器控 制區塊9 1 0之一狀態機器圖。初始的,該狀態機器係在 閒置狀態且保持非作用下直到其決定一封包資料係來自於 實體媒介中C如,圖9之實體媒介141)。舉例而言, 在狀況1 2 0 4 ’假如其決定一封包資料正進來時,則該 狀態機器將行進至一資料狀態1 2 0 6,在該狀態中該現 行封包係經由該接收器FC/GMI I 9 06以及接收 器L L C介面而被處理。 而在資料狀態1 2 0 6中,其亦在狀況1 2 0 8中決 本紙張尺度適用中囡國家標卑(CNS ) A4规格(210.X297公釐) •75- /1674 44 A7 B7 五、發明説明(73 ) 定是否一封包正在繼續,且假如一封包正在進入,該狀態 機器將保持在資料狀態1 2 0 6,該狀態中該接收封包係 經由SUPERMAC Rx控制器120。然而,假如 其在狀況1 2 0 8中決定沒有封包在進入時,則該狀態將‘ 進入一載子延展狀態1 2 1 0,該狀態中一適當載子延展 係被處理。在此實施例中,該現行封包將保持在載子延展 狀態1210直到其在狀況1212中決定該適當封包長 度至少爲5 12位元組(當在載子擴展模式)。一旦其決 定該封包長度係有效時,該狀態將回歸至標示該現行封包 以由接收器而被正確處理之閒置狀態1 2 0 2。 另一方面,假如其在狀況1 2 1 2決定該適當封包長 度不爲有效,且其在狀況1 2 1 4中決定一封包正進入, 則該狀態機器將進入一淸洗(flush )狀態,該狀態中該非 有效封包以及進入之封包係被淸洗(即,兩個封包被淸洗 )。假如沒有封包正在進入,則該狀態將進入至閒置狀態 1 2 0 2 ° 當該狀態機器係在載子擴展狀態,其再次在狀況 1 2 1 4中決定一封包是否正在進入。例如,假設一個第 —封包係處於正有效的狀態1 2 1 0中而被處理,且一個 第二封包在該第一封包有效之前而到達(即,狀況 12 14係真)。當此發生時,該狀態機器將進入淸除狀 態1 2 1 8,該狀態中第一以及第二封包兩者亦被淸除。 即,該第一封包以及在第一封包正有效時到達之第二封包 兩者皆在狀態1 2 1 8中被淸除《此外,假如一封包以及 -76- (計先閱讀背而之注意事項再填i:li本頁) 本紙張尺度適用中国囚家標津(C'NS ) /\4規格(210 X 297公釐) 5 4 74 44 A7 ______B?五、發明説明P ) 任何其他封包在該狀態機器處在淸除狀態1 2 1 8中而如 狀況1 2 1 6中所決定般的進入,則該封包區域亦被淸除 。接著’一處理單元1 2 2 0 —般在載子擴展模式下,是 將非有效封包之接收以及任何避免先前所接收封包之封包… 免於有效至最大至封包長度約爲512位元組。 一旦該不想要的封包被淸除,該狀態機器將回歸至閒 置而不接收側不磨損之封包。其優點在於,此特色是進一 步地根據本發明之一實施例而在圖3之S U P E RMA C CORE 1 1 6所執行之彈性以及精確錯誤檢査之例 子。 圖1 3係根據本發明之一實施例之一封包產生架構 1 3 0 2使用者介面以作爲在傳送之前建構封包資料。在 此實施例中,一封包計數欄1 3 2 0係展示在封包產生架 構1 3 0 2之頂部左手邊角落以確認含在一封包欄 1306中之封包數目(即,在封包中)。如所述,封包 欄1 3 0 6包含一些引例封包,包含封包1 3 2 2以及封 包1 3 2 4。當然,任何數目之封包可以含在封包欄位 1 3 0 6中,且額外封包可根擄本發明之一實施例而由選 擇ADD圖像鈕1 3 2 6而加入。 如所示,每個含在封包欄位1 3 0 6中之封包具有各 種結合之特性,該特性係根據使用者之喜好。舉例而言, 適當變數可包含:內部封包間隙(IPG) 1 308、先 行1310、目的位址1312、來源位址1314、長 度欄位1 3 1 6、以及資料欄位1 3 1 8。在此實施例中 (-1¾靖汴而之注意事項再粬巧本頁) 本紙張尺度遥用中国S家標4M C'NS ) Λ4規格(2IOx2W公釐) -77- Α7 Β7 w:;p:.-i!r-,中决標隼局工消费合作.牡印1i 五、發明説明p ) ,數字1 0標示” 1 6位元”增加之個數,該個數係定義 接合在一個別內部封包間隙之實際數目。接著,在此例子 中,該引例封包1 322之I PG係(1 〇χ 1 6位元= 1 6 0位元)1 6 0位元。因此,一使用者可在I PG欄· 位1 3 0 8中程式化任何之數目,且該數目可乘上1 6以 達到內部封包間隙之實際位元數目。 在此例子中,該先行欄位1 3 1 0之展示係在封包 1 3 2 2致能時,然而,應瞭解該先行之解除致能可如上 述以簡單的對一先行選擇欄位之修改而解除致能。當然, 該使用者介面畫面係驅動適當軟體以及內含之積體電路硬 體,該軟硬體可根據此實施例而執行處理操作。以此方式 ,一目的位址1312以及來源位址1314係以可根據 使用者需求而修改之任意位址而展示。優點在於,該上述 模組允許使用者藉由簡單選擇一封包以及修改其在一以封 包接著封包爲基礎而修改其變數。 亦所展示的是長度欄位1 3 1 6,該1 3 1 6係確認 引例封包1 3 2 2之長度爲5 1 2位元組,雖然任何適當 長度可藉由適當輸入該理想値而選擇。最後,資料欄位 1 3 1 8確認封包1 3 2 2之資料以作爲修改。在此技藝 所爲人所知的,該資料欄位可以是以下任何適當位元建構 ,包含:所有爲零、所有爲壹 '間隔地壹以及零、連續四 個壹接著四個零、連續五個壹接著五個零、任意位元配置 、以及一修改使用者提供之位元圖樣。在此例子中,該資 料欄位1318包含使用者提供之修改資料。 (τίι閱讀背而之注急事項再坫巧本I j -丨 訂 沒-· 本紙張尺度述用中® S家橾绰(C'NS ) Λ4規格(2丨0 乂297公嫠) -78- 457444 A7 ______B7五、發明説明怍) 進一步展示的是一具有I P G爲2 0之第二引例封包 1 324。如前所述,一個爲20之I PG係乘上1 6以 達到該可程式化之內部封包間隙的3 2 0位元。在此例子 中,引例封包1 3 2 4之先行係以解除致能而被展示,且‘ 適當之目的以及來源位址位數可由使用者適當輸入。進一 步的,該引例封包1 3 2 4之長度係以6 4位元組而展示 ,且該資料欄位1 3 1 8係如前述以所有爲壹(所有爲壹 )而展示。 圖1 4展示根據本發明之一實施例之引例封包定義使 用者介面1 4 0 2。經由此使用者介面,一使用者可精確 地以封包接著封包爲基礎而定義該適當封包特性。接著, 一旦一使用者自圖1 3之封包欄位1 3 0 6中選擇一個別 的封包欄位時,圖1 4之封包定義使用者介面1 4 0 2可 顯示被使用者以便修改。從此使用者介面,該使用者可適 當的設定內部封包間隙欄位1 3 0 8、目標位址欄位 1 3 1 2、來源位址欄位1 3 1 4、長度欄位1 3 1 6、 以及資料樣式欄位1 3 1 8。 此外,使用者亦可選擇分別對應於目的位址1 3 1 2 以及來源位址1314之適當模式1414a以及 1414b。舉例而言|藉由改變模式1414以及 1 4 1 4 b,該使用者可適當的增加或減少該適當輸入目 的位址或來源位址。在另一實施例中,該使用者亦可選擇 1 4 1 4 a以及1 4 1 4 b以提供任意的目的位址或來源 位址。因此,優點在於該使用者對於根據本發明各使用者 J— ---^ ------It ---I I 訂 I_ -I - -- I— n < IJ. j Jt n. (^;cw請背νξ之..vi意事項本頁) 本紙尺度適用中囡囚家標净(CNS ) /\4规格(2丨0X297公嫠) -79- 457444 Α7 Β7 五、發明説明β ) 介面之每個正經由以流量爲基礎ΜΑ C 1 5 0 (圖2 )而 傳送封包的特性予以適當修改的高度控制以及模組化。 進一步展示的是選擇盒1 4 2 4,該1 4 2 4允許使 用者選擇先行、自動墊塞、CRC、位元錯誤' 以及序 。如前所述,假如該使用者選擇先行、CRC、自動墊塞 、位元錯誤、以及序號時,這些功能將被適當的應用至現 在被選擇之封包。在此實施例中,位元錯誤允許將一任意 數目之錯誤位元導至正被依序傳送之一封包中以決定一接 收站之回應。且,序號允許該使用者對於正被傳送之每個 封包增加序號,而使得使用者可確認以及決定該具有附接 序號之固定封包是否在一碰撞。因此,當含有序號之封包 被傳送時,其可能決定任何所傳送封包是否係在一碰撞或 具有任何錯誤在其中。此在當封包具有短小特性且正根據 本發明之一實施例而以接近十億位元之速度被傳送時,更 爲具有特色。 根據本實施例,所提供之序號之能力係允許該使用者 在傳送下而不必提供一載子擴展以增加封包尺寸。最後, 封包定義窗口 1402展示一資料欄位1420,該 1 4 2 0係作爲顯示該含在個別記憶位址位置1 4 2 2中 之原始資料。因此,如熟知此技藝者所知的,對於每個記 憶位置位置,將接合對於圖1 3所選擇封八所正傳送之資 料》 . 圖1 5Α係一狀態介面窗口 1 5 0 2之使用者介面, 該1 5 0 2係根據本發明之一實施例而作爲顯示傳送以及 -80- ----·----I I s^- f 句1閱讀背而之注总事項再本頁) I . Λ- 本紙浓尺度適中國®家樣卑(C'NS ) Λ4规格(21flx 297公嫠) 4 4 4 A7 B7五、發明説明78 ) 接收狀態資訊。一般而言’狀態介面1 5 0 2包含一封包 產生狀態表列1 5 0 8 ’該1 5 0 8展示正在處理傳送操 作之各種特性。舉例而言,封包產生狀態表列1 5 0 8顯 示之變數包括:(a) —個總計傳送封包欄位;(b) —' 個總計傳送位元組欄位;(c) —個廣播欄位;(d) — 個多重傳播欄位;(e) —個單一廣播欄位;(f) 一個 單一碰撞欄位:(g) —個多重碰撞欄位:(h) —個最 近碰撞欄位;(I) 一個過度碰撞欄位:(j) 一個過度 碰撞延遲:(k) 一個延遲欄位:(1) 一個不足欄位; 以及(m ) —個跳出欄位。 在此實施例中 > 該適當欄位顯示在實際傳送封包資料 時在"及時(real-time ) ”之資訊。接著,具有此種型態 之資訊允許如網路管理者之使用者監視一個別網路之傳送 特性。在此實施例中,當一傳送圖像(icon ) 1 5 0 4或 一傳送鈕被選擇時,傳送被適當的放置,且”傳送速率" 圖形窗口 1 5 1 4可經顯示以圖像地辨識封包資料傳送特 性。 亦所展示的是一封包處理器狀態表列1 5 1 0,該 1 5 1 0係根據本發明之一實施例而負責處理正由以流量 爲基礎MAC 1 50之SUPERMAC Rx控制器 1 2 0所接收之封包資料之處理。舉例而言,封包處理器 狀態表列1 5 1 0包含資訊如下:(a )總計接收封包; (b )總計接收位元組:(c.)廣播;(d )多重傳播: (e)單一廣播:(f)CRC錯誤;(g)結合錯誤; J . .i- I I i 1 I I--線 r IJ - 1—Ί 本紙张尺度遍用中國1¾家標绛(CNS )八4現格(2丨Οχ297公釐) 81 - 5 4 4 4 A7 _B7 五、發明説明作) (h) runts (不足尺寸封包);(i)巨大(giants ):以及(j )溢流(overflow )此外,架構資訊亦供給 封包產生器狀態表列1 5 0 8以及封包處理器狀態表列 1 5 1 0兩者。 對於封包產生狀態表1 5 0 8,架構資訊係對傳送模 式以及封包計數兩者提供。對於封包處理器狀態表 1 5 1 0,架構資訊係對於雜項資料、多重廣播、廣播資 料、C R C錯誤資料、排列錯誤資料' 短少封包資料、以 及巨大封包資料而提供。接著,當在接收操作時,一接收 器圖像鈕1 5 0 5或一接收鈕1 5 2 2係經選擇以初始封 包處理器狀態表1 5 1 0之接收功能,該1 5 1 0係可在 接收速率窗口1516中以數字以及圖形而顯示。 在此例子中,傳送速率窗口1 5 1 4以及接收速率窗 口 1 5 1 6兩者對於將由適當接收以及傳送單元所傳送或 接收之相關的每秒封包速率(即,pkts/sec )之資訊予以顯 示。如所示,該傳送速率係每秒1 7 5個封包,且該接收 速率係每秒1 0 0 0個封包。然而,應瞭解該接收以及傳 送速率指示一實施例且任何適當之傳送以及接收速率可根 據所結合網路之參數而顯示在傳送速率窗口1514以及 接收速率窗口1516之中。 此外,傳送速率窗口 1 5 1 4以及接收速率窗口 1 5 1 6兩者係具有一標度(scaling)圖形使用者介面尺 以標度在每個圖形窗口中之適當顯示資訊。且,藉由選擇 一圖形圖像1 5 0 6,該使用者可適當的標度正在圖形窗 ^1 1 li I - n ^^1 Jii!1先闓請背而之·江意事項-44¾本莨)* 1T Once a modification is requested in step 1 102, the method will proceed to step 1 104, in which the appropriate reception control register is confirmed and the corresponding flag is set on the xcs bus And set to true. In addition, once the flag is set on the X c s bus, the corresponding control signal is located in the C T L 9 5 3 control bus. The method proceeds to step 1 106, where the gate control is set to the event flag. Once the gate control is set to the appropriate flag in step 1 0 6, the method proceeds to step 1 1 8. The receiving control register that is confirmed in this step is via the receiving LLC interface 9 0 2 of FIG. 9. Instead, load the appropriate treatment. Once the appropriate control register is loaded in step 11 08, the method proceeds to step 1 110, where the gate control system is removed. The important thing is that the receiving control path 1 1 0 0 can be processed in parallel with the data being transmitted through the receiving data flow path 1 0 0 0 of FIG. 10. FIG. 12 is a state machine diagram for one of the receiver control blocks 9 10 of FIG. 9 according to an embodiment of the present invention. Initially, the state machine is in an idle state and remains inactive until it decides that a packet data comes from the physical medium (e.g., the physical medium 141 of FIG. 9). For example, in condition 1 2 0 4 'if it decides that a packet of data is coming in, the state machine will proceed to a data state 1 2 0 6 in which the current packet is passed through the receiver FC / GMI I 9 06 and receiver LLC interface are processed. In the data state 1 2 06, it is also determined in the state 1 2 0 8 that the paper size applies to the Chinese National Standard (CNS) A4 specification (210.X297 mm) • 75- / 1674 44 A7 B7 5 The invention description (73) determines whether a packet is continuing, and if a packet is entering, the state machine will remain in the data state 1 2 0 6 in which the received packet is passed through the SUPERMAC Rx controller 120. However, if it decides in state 1208 that no packet is entering, the state will ‘enter a carrier extension state 1 2 1 0 in which a proper carrier extension system is processed. In this embodiment, the current packet will remain in the carrier extended state 1210 until it determines in the state 1212 that the appropriate packet length is at least 5 12 bytes (when in carrier expansion mode). Once it decides that the packet length is valid, the state will return to the idle state 1 2 0 2 indicating that the current packet is being processed correctly by the receiver. On the other hand, if it decides that the appropriate packet length is not valid in state 1 2 1 2 and it decides that a packet is entering in state 1 2 1 4, the state machine will enter a flush state, The inactive packet and the incoming packet in this state are washed (ie, two packets are washed). If no packet is entering, the state will enter the idle state 1 2 0 2 ° When the state machine is in the carrier expansion state, it again determines whether a packet is entering in state 1 2 1 4. For example, suppose a first-packet is processed in the valid state 1 2 1 0, and a second packet arrives before the first packet is valid (ie, state 12 14 is true). When this happens, the state machine will enter the erasure state 1 2 1 8 in which both the first and second packets are also eradicated. That is, both the first packet and the second packet that arrived when the first packet was valid are deleted in state 1 2 1 8 "In addition, if a packet and -76- Refill the matter i: li this page) This paper size applies to Chinese prisoner Biaojin (C'NS) / \ 4 size (210 X 297 mm) 5 4 74 44 A7 ______B? V. Description of the invention P) Any other package in The state machine is in the erasure state 1 2 1 8 and enters as determined in the state 1 2 1 6, then the packet area is also eradicated. Then a processing unit 1 2 2 0-generally in the carrier expansion mode, is to receive non-valid packets and any packets that avoid previously received packets ... from valid to a maximum packet length of about 512 bytes. Once the unwanted packet is purged, the state machine will return to idle without receiving packets that are not worn on the receiving side. This has the advantage that this feature is an example of the flexibility and precise error checking performed in S U P E RMA C CORE 1 1 6 according to an embodiment of the present invention further. FIG. 13 is a packet generation architecture according to an embodiment of the present invention. The user interface is used to construct packet data before transmission. In this embodiment, a packet count column 1320 is displayed at the top left-hand corner of the packet generation structure 1302 to confirm the number of packets contained in the packet column 1306 (i.e., in the packet). As mentioned, the packet column 1306 contains some example packets, including packets 1 3 2 2 and packets 1 3 2 4. Of course, any number of packets can be included in the packet field 1306, and additional packets can be added by selecting the ADD image button 1 3 2 6 according to an embodiment of the present invention. As shown, each packet contained in the packet field 1306 has various combined characteristics, which are based on user preferences. For example, appropriate variables may include: internal packet gap (IPG) 1 308, prior 1310, destination address 1312, source address 1314, length field 1 3 1 6 and data field 1 3 1 8. In this embodiment (-1¾ Jingji's precautions are repeated on this page) The paper size is used in China S house standard 4M C'NS) 4 size (2IOx2W mm) -77- Α7 Β7 w:; p : .- i! r-, in the final award, the cooperation of local labor and consumption. Mu Yin 1i V. Invention description p), the number 10 indicates the number of "16-bit" increase, and the number is defined as a joint The actual number of individual internal packet gaps. Then, in this example, the I PG system of the cited packet 1 322 (16 × 16 bits = 160 bits) is 160 bits. Therefore, a user can program any number in the I PG field · bit 13 0, and the number can be multiplied by 16 to reach the actual number of bits in the internal packet gap. In this example, the display of the antecedent field 1 3 1 0 is when the packet 1 3 2 2 is enabled, however, it should be understood that the antecedent deactivation can be simply modified as described above with respect to an antecedent selection field And disabling. Of course, the user interface screen drives appropriate software and the integrated circuit hardware included therein, and the software and hardware can perform processing operations according to this embodiment. In this way, a destination address 1312 and a source address 1314 are displayed at arbitrary addresses that can be modified according to user needs. The advantage is that the above module allows the user to modify its variables by simply selecting a packet and modifying it on a packet-by-packet basis. Also shown is the length field 1 3 1 6. The 1 3 1 6 confirms that the length of the sample packet 1 3 2 2 is 5 1 2 bytes, although any appropriate length can be selected by appropriately entering the ideal frame. . Finally, the data field 1 3 1 8 confirms the data of the packet 1 3 2 2 for modification. As is known in this art, the data field can be any of the following appropriate bit constructs, including: all zeros, all one's spaced one and zero, four consecutive one followed by four zeros, five consecutive One by one followed by five zeros, arbitrary bit configurations, and a modified bit pattern provided by the user. In this example, the data field 1318 contains modification data provided by the user. (τίι read the back-of-the-moment note and re-catch this book I j-丨 booked-· This paper is in use ® S 家 橾 聪 (C'NS) Λ4 specification (2 丨 0 乂 297 public 嫠) -78 -457444 A7 ______ B7 V. Description of the invention 怍) Further shown is a second example packet 1 324 with an IPG of 20. As mentioned earlier, an I PG of 20 is multiplied by 16 to reach the 3 2 0 bits of the programmable internal packet gap. In this example, the antecedent packet 1 3 2 4 is displayed in order to de-enable it, and the ‘appropriate purpose and number of source addresses can be appropriately entered by the user. Further, the length of the cited packet 1 3 2 4 is displayed in 64 bytes, and the data field 1 3 1 8 is displayed as all (one for all) as described above. Figure 14 shows an example packet definition user interface 1420 according to an embodiment of the present invention. Via this user interface, a user can precisely define the appropriate packet characteristics on a packet-by-packet basis. Then, once a user selects another packet field from the packet field 1306 of FIG. 13, the packet definition user interface 1420 of FIG. 14 can be displayed by the user for modification. From this user interface, the user can appropriately set the internal packet gap field 1 3 0 8, the destination address field 1 3 1 2, the source address field 1 3 1 4, the length field 1 3 1 6, And data style fields 1 3 1 8. In addition, the user can also choose the appropriate patterns 1414a and 1414b corresponding to the destination address 1 3 1 2 and the source address 1314, respectively. For example | By changing the mode 1414 and 1 4 1 4 b, the user can appropriately increase or decrease the appropriate input destination or source address. In another embodiment, the user may also select 1 4 1 4 a and 1 4 1 4 b to provide any destination address or source address. Therefore, the advantage is that the user orders I_ -I--I- n < IJ. J Jt n. ^; cw please recite νξ..vi intentions on this page) This paper is applicable to the standard of Chinese prisoners (CNS) / \ 4 (2 丨 0X297) 嫠 -79- 457444 Α7 Β7 V. Description of the invention β) Each of the interfaces is highly controlled and modularized by appropriately modifying the characteristics of the transmission packets based on the traffic-based MA C 1 50 (Figure 2). Further shown is a selection box 1 2 4 4 which allows the user to select antecedent, automatic padding, CRC, bit error ', and sequence. As mentioned above, if the user selects preemption, CRC, automatic padding, bit error, and serial number, these functions will be applied to the currently selected packet appropriately. In this embodiment, bit errors allow an arbitrary number of erroneous bits to be directed into a packet being transmitted in order to determine the response of a receiving station. Moreover, the serial number allows the user to add a serial number to each packet being transmitted, so that the user can confirm and decide whether the fixed packet with the attached serial number collides. Therefore, when a packet containing a sequence number is transmitted, it may determine whether any transmitted packets are in a collision or have any errors in them. This is even more characteristic when the packet has a short characteristic and is being transmitted at a speed close to one billion bits according to an embodiment of the present invention. According to this embodiment, the ability to provide serial numbers allows the user to transmit without having to provide a carrier extension to increase the packet size. Finally, the packet definition window 1402 displays a data field 1420. The 1420 is used to display the original data contained in the individual memory address position 1422. Therefore, as known to those skilled in the art, for each memory location, the data being transmitted to the selected one in Figure 8 will be joined ". Figure 15A is a user of a status interface window 1520 Interface, the 152 is a display transmission according to an embodiment of the present invention and -80- ---- · ---- II s ^-f sentence 1 read the back note of the general matter on this page) I. Λ- This paper's thick scale is suitable for China® Family Sample (C'NS) Λ4 specification (21flx 297 cm) 4 4 4 A7 B7 V. Invention Description 78) Reception status information. Generally speaking, the 'status interface 1 50 2 contains a packet and generates a status list 1 5 0 8'. The 1 5 0 8 shows various characteristics of the transfer operation being processed. For example, the variables displayed in the packet generation status table 1508 include: (a) — total transmission packet fields; (b) — 'total transmission byte fields; (c) — broadcast field (D) — a multiple broadcast field; (e) — a single broadcast field; (f) a single collision field: (g) — a multiple collision field: (h) — a most recent collision field (I) an excessive collision field: (j) an excessive collision delay: (k) a delayed field: (1) an insufficient field; and (m) a jump field. In this embodiment > the appropriate field displays the " real-time " information when the packet data is actually transmitted. Then, this type of information allows users such as network managers to monitor Transmission characteristics of a separate network. In this embodiment, when an transmission image (icon) 1 5 0 4 or a transmission button is selected, the transmission is appropriately placed, and the "transmission rate" graphics window 1 5 1 4 It can be displayed to identify the characteristics of packet data transmission. Also shown is a packet processor status table 15 1 0, which is according to an embodiment of the present invention and is responsible for processing the SUPERMAC Rx controller 1 2 0 based on the traffic based MAC 1 50 Processing of received packet data. For example, the packet processor status table 15 1 0 contains the following information: (a) total received packets; (b) total received bytes: (c.) Broadcast; (d) multiple propagation: (e) single Broadcast: (f) CRC error; (g) Combining error; J. .I- II i 1 I I--line r IJ-1—Ί This paper standard is used in China 1¾ house standard (CNS) 8 4 (2 丨 〇χ297mm) 81-5 4 4 4 A7 _B7 V. Description of the invention) (h) runts (undersized packets); (i) giants: and (j) overflow. In addition, The architecture information is also provided in the packet generator status table 15 08 and the packet processor status table 15 1 0. For the packet generation status table 158, the architecture information is provided for both the transmission mode and the packet count. For the packet processor status table 151, the architecture information is provided for miscellaneous data, multiplex broadcasts, broadcast data, C R C error data, misalignment data 'short packet data, and huge packet data. Then, during the receiving operation, a receiver image button 1 5 0 5 or a receive button 1 5 2 2 is selected to receive the function with the initial packet processor status table 1 5 1 0, the 1 5 1 0 system It can be displayed numerically and graphically in the reception rate window 1516. In this example, both the transmission rate window 1 5 1 4 and the reception rate window 1 5 1 6 give information about the relevant packet rate per second (ie, pkts / sec) that will be transmitted or received by the appropriate receiving and transmitting unit. display. As shown, the transmission rate is 175 packets per second, and the reception rate is 1000 packets per second. However, it should be understood that the reception and transmission rate indicates an embodiment and any appropriate transmission and reception rate may be displayed in the transmission rate window 1514 and the reception rate window 1516 according to the parameters of the combined network. In addition, the transmission rate window 1 5 1 4 and the reception rate window 1 5 1 6 both have a scaling graphic user interface ruler to appropriately display information in each graphic window. And, by selecting a graphic image 1 5 0 6, the user can properly scale the graphic window ^ 1 1 li I-n ^^ 1 Jii! 1 Please take the back, Jiang Yi matters -44¾ (Benedict)
'1T 本紙張尺度適川中111¾¾:標牵(C'NS ) Α4規格(210x297公釐> -82- 457 4 4 A7 B7 :·-'ϋ;ν屮·ν#^局兵-T-:.ift费合作"印*''衣 五、發明説明钞) 口中顯示之資訊或改變該正顯示資訊之特性。當然’當處 於及時傳送以及接收狀態產生時,該使用者可藉由選擇一 按鈕1 5 2 0而適當停止傳送,或藉由選擇一按鈕 1 5 2 4而停止接收功能。 圖15B展示一圖形架構窗口 1550 ’該1550 係以圖15A之所選擇圖像1506而顯示給使用者。舉 例而言,該使用者可選擇圖形1或2以畫出任何在封包產 生狀態表1 5 0 8或封包處理器狀態表1 5 1 0中數字顯 示之資訊。接著,雖然爲了解釋以及說明之方便,只有傳 送以及接收速率,但應瞭解的是任何適當的資訊皆可在圖 1 5 A之圖形窗口中顯示。亦所顯示的是分別對於圖形 1以及圖形2之”取樣週期”(每秒)1 5 5 6以及 1 5 5 8,其可經使用以選擇結合在圖1 5A之每個窗口 之適當取樣速率。最後,一標度最大量/最小量可經適當 標度圖1 5 B之圖像1 5 5 0之適當選擇而使用。 圖16係一接收資料緩衝窗口 1602,該1602 可根據圖1 5A之所選擇接收資料緩衝器圖樣1 5 0 7而 顯示給使用者。在一顯示欄位1 6 0 4中,一由接收器所 接收之封包表列係顯示者使用者資訊。在此例子中,封包 數1,封包數2 ’而上至封包數N係顯示在顯示欄位 1 604之中。一旦一個別封包自顯示欄位1604中選 擇時,使用者可藉由執行一適當選擇裝置而選擇一個別封 包。一旦一封包被選擇時,該適當封包特性係在封包特性 欄位1 6 0 4而顯示給使用者。 -----------^------訂------^ —l· ("也閱讀背而之..;1-恋事^再堉3本頁) 本紙烺尺度造用中國囤家標4* ( ('NS ) Λ4規格(2IOX25»7公釐) -83- 45744. A7 B7 五、發明説明π ) 封包特性欄位1 6 0 4確認該所接收封包之各種特色 之特性。舉例而言,該相關於長度1 6 0 6、目的位址 1608、來源位址1610、資料位址1612、 CRC 1 6 1 4、以及序列1 6 1 6之所接收封包資訊· ‘ 係顯示使用者資訊。亦所提供的是檢查盒,該盒係確認該 所接收封包是否具有一 C R C錯誤、一排列錯誤、或是短 小封包或巨大封包。接著,一旦每個封包已被接收,該使 用者僅在封包欄位1 6 0 4中之個別封包,且所有其適當 特性將顯示使用者之簡易資訊。亦所展示的是一原始記憶 體資料傾倒(dump)欄位1620,該1620係用 作顯示接收自圖2之以流量爲基礎MA C 1 5 0之接收側 之封包資料之屬性。當然,該所接收之資料以包含所結合 記憶體位址以簡化修改以及參考。 圖17係一封包處理器架構窗口1702,該 1 7 0 2係使用作爲執行根據本發明之一實施例而由一接 收器所接收資料之管理過濾功能。舉例而言,一個一般選 擇欄位1704之展示包含:(a)雜項,(b)多重廣 播,(c)廣播,(d)CRC錯誤,(e)排列錯誤, (f )短小封包,以及(g)巨大封包選擇特性。在此例 子中,雜項選擇檢查盒係在執行診斷分析時,使用作爲過 濾以及檢查所接收封包之每一個部份(即,儘管錯誤發生 )。多重廣播選擇檢查盒在當使用者要去建構該封包處理 器以接收以及檢査具有多重廣播目的位址之封包時而被使 用。廣播選擇檢査盒經使用以建構該封包處理器以檢查被 (讳先閱讀背而之:^意事項再邛寫本頁) 本紙张尺度適用中國K家標準(('NS ) Λ4规格(210X297公t ) -84- -劣#4'-局@工消費合作社印製 A / ^—I* 、 A7 B7五、發明説明辩) 廣播至該網路(即,目的位址係一廣播位址)。CRC錯 誤選擇檢查盒經使用以建構該封包處理器以檢查(即’過 濾以及檢査)具有C R C錯誤之封包。 排列錯誤選擇檢査盒經使用以致能該含有排列錯誤之‘ 接收封包。如眾所周知的,對於1 〇Mb p s之系統,排 列錯誤係以涓滴(dribble )而描述,而對於100 M b p s,排列錯誤係以四位元錯誤而描述(4位元), 而位於1 0 0 0 M b p s系統(即,十億位元),排列錯 誤係以位元組錯誤而描述。最後,短小封包選擇檢查盒經 使用以致能較6 4位元組爲小之所示封包,而巨大封包選 擇檢查盒經使用以致能較1518位元組爲大之所示封包 。當然,根據本發明之一實施例,一個使用者可藉由適當 設定在圖3之SUPERMAC核心116中之適當暫存 器而修改定義封包最小量以及封包最大量。另外,此設定 可經由一適當軟體使用者介面而執行。 修改過濾部位1 7 0 6提供使用者對於目的位址 1708、來源位址1710、以及資料圖樣1712之 個別部份之過濾的選擇。舉例而言,藉由適當選擇該目的 位址的部份(如,遮罩所選擇目的位址的部份),以及藉 由輸入一適當對應位元圖樣,而使用者可過濾掉適當資訊 以執行管理以及診斷之操作。接著,該使用者亦可遮罩以 及對應目的位址之超過一個部份。如所展示的,該使用者 可遮罩以及對應目的以及來源位址之兩個部份。 然而,應瞭解的是,該使用者介面可經延展以更爲詳 ί 1 ! Γ. n Ini - ^--1 I. i 1 -- - I (对先閱讀背而之注意事項再硪{:(ΐ本頁) 本紙張尺度適用中國國家標绛(CNS ) Α4規格(公釐) -85- 4 4 Α7 __ Β7___ 五、發明説明(83 ) 細以及對應於符合使用者需求之操作。對於一資料圖樣 1 7 1 2,該使用者以可藉由將適當資訊輸入在對應欄位 而自適當封包初始點(即,一般係一個1 6位元間距( offset ))而選擇一適當間距。一旦一適當間距經選擇’該 使用者可再次確認正被過濾之資料圖樣之一遮罩以及一對 應。 如此處所使用的,對於IEEE 802.3標準之 參考應瞭解以包含所有現行IEEE 802·3標準’ 包含;(a) IEEE 802. 3 標準( 10 0 Mbps -快速乙太網路) IEEE std 802.3u-1995; ( b ) *?τ IEEE 802. 3z 標準(1000Mbps —十億 位元乙太網路):以及(c) ISO/ IEC 8 8 0 2 - 3 ' ANSI/ ◊ I * -y IEEE Std 802. 3(第六版 1996)。所 有以上所示之標準係經結合以供參考。 :r;'"·部屮决桴準局β-τ'·'·;β"合作社印製 本發明之執行可經由使用任何型態之積體電路邏輯或 軟體驅動電腦所執行之操作。舉例而言,一硬體描述語言 (H D L )爲基礎之設計以及合成程式可經使用以設計根 據本發明之一實施例而對於適當執行資料以及控制操作爲 必須之一種矽準位電路。舉例而言,一種由紐約之 I Ε Ε Ε組織所發展之VHD L®硬體描述語言可經使用以 設計一適當矽準位架構。雖然可以使用任何適當之設計工 具,另外的價購工具亦包含硬體描述語言” Verilog®'該工 木紙張尺度適用中国國家標绛(CNS )从规格(297公漦) -86- /1 Λ Λ Μ Β7 i?".部中史样涞局β-τ消合作社印製 五、發明説明Μ ) 具係由 Cadence Design System, Inc. of Santa Clara, California 所發展。 該發明係使用多種相關於儲存在電腦系統中資料之電 腦執行操作。此操作係一些需要實體數量之實體操控。一· 般而言,儘管並不需要,此數量以可被儲存、傳送、組合 、比較,否則就是操控,之電子或磁性訊號之形式而存在 。進一步的,該操控之執行通常最好係以如產生、確認、 決定或比較之形式存在。 任何在此處描述之形成本發明部份之操作通常係機器 操作。本發明亦相關於一種裝置或設備以執行此些操作。 該設備特別可對於所需要的目的而建構,或者其可以是一 由儲存在電腦中之電腦程式所選擇性觸發或建構之一般目 的電腦。特別是,多種一般目的機器可以使用在根據此處 之所示之電腦程式中,或者其可以更方便的建構一個更特 殊之設備以執行所需之操作。以下描述本發明之一實施例 之結構。 圖1 8係電腦系統1 8 0 0實施例之方塊圖以執行本 發明之處理。該電腦系統1 8 0 0包含一數位電腦 1802,一顯示畫面(或監視器)1804,以及一鍵 盤1806,一軟式磁碟機1808,一硬式磁碟機 1810,一網路介面1812,以及一鍵盤1814。 該數位電腦1 8 0 2包含一微處理機1 8 1 6,一記憶體 匯流排1818,隨機存取記憶體(RAM) 1820, 唯讀記憶體(ROM) 1822,一周邊匯流排1824 n^p. - i n^— -HI 1 ^^^1 ----I ^^^1 n f^i--.J • · ·ν *-° (讀背而之注意事項再"Ά本頁} 本紙張尺度適用中國囤家榡绛((、以)六4規枱(2!0><297公漤) -87- 457444 A7 B7 五、發明説明自5 ) ,以及一鍵盤控制器1 8 2 6。該數位電腦1 8 0 0可以 是一個人電腦(如I B Μ相容性個人電腦、麥金塔電腦或 麥金塔相容性電腦)、一工作站電腦(如S U Ν微系統或 惠普工作站)、或一些其他式樣的電腦。 該微電腦1 8 1 6係一種一般目的之數位處理器,該 處理器係控制該電腦系統1 8 0 0之操作。該微處理器 1 8 1 6可以是一個單一晶片處理器或可以與多個構件相 執行。藉由使用獲取自記憶體之指令,該微處理器 1 8 1 6控制輸入資料之接收以及操控,而輸出以及顯示 資料至輸出裝置。根據本發明,微處理器1 8 1 6之個別 功能係在封包處理以及網路管理工作中予以協助。 該記憶體匯流排1 8 1 8係有微處理器1 8 1 6所使 用以存取該RAM 1820以及ROM 1822。該 RAM 1 8 2 0係由該微處理器使用爲一般儲存區以及 畫板記憶體’且亦可使用以儲存輸入資料以及經處理之資 料。該ROM 1822可經使用以儲存該接在該微處理 器1 8 1 6以及其他資料之後之指令或程式碼。 該周邊匯流排1 8 2 4係經使用以存取該由數位電腦 1 8 0 2所使用之輸入 '輸出以及儲存裝置。在上述實施 例中,此些裝置包含:該顯示畫面1 8 0 4,該印表機裝 置1806、該軟碟磁碟機1808,該硬碟機1810 ,以及該網路介面1 8 1 2。該鍵盤控制器1 8 2 6係經 使用以接收來自於於鍵盤1 8 1 4之輸入,且經由網路 1 8 2 8而發送每個所壓下之解碼符號至微處理器 (兑1閱讀背而之注意亨項再Mg本頁) 本紙後尺度4用中國ES家標準(C’NS ) Λ4規格(210X 297公釐) -88- 457444 A7 B7 ^#"中央^準^妈^消费合竹?:!印絜 五、發明説明郎) 18 16° 該顯示畫面1 8 0 4係一輸出裝置,該裝置係顯示經 由周邊匯流排1 8 2 4而在電腦系統1 8 0 0中由微處理 器1 8 1 6所提供或由其他構件所提供而顯示資料之影像 。該印表機裝置1 8 0 6在當以印表機操作時•係將影像 供應在紙張上或一類似表面。其他如製圖機,式樣設定器 可用來取代或加入該印表機裝置1 8 0 6中。 該軟碟機1 8 0 8以及該硬碟機1 8 1 0可經使用以 儲存各種式樣之資料。該軟碟機1 8 0 8可經使用以傳送 此些資料至其他電腦系統,而硬碟機1 8 1 0允許對於所 儲存大量資料之快速存取。 該與作業系統一豈知微處理器1816經操作以執行 電腦碼以及產生及使用資料。該電腦碼以及資料可常駐在 RAM 1820,ROM 1822,或硬碟機 1 8 2 0中。該電腦碼以及資料亦可常駐在可移動式程式 媒介,且在需要時予以載入或裝置至該電腦系統。可移動 式媒介包含如:CD — ROM,PC — CARD,軟碟以 及磁帶。 該網路介面1812經使用以經由連接至其他電腦系 統之網路而發送以及接收資料。介面卡或類似裝置以及由 該微處理器1816所執行之適當軟體可經使用以將電腦 系統1 8 0 0連接至一存在之網路,並根據標準協定而傳 送資料。 該鍵盤1 8 1 4經使用以輸入指令以及其他指令至該 (^先閱讀背而之.1·1-念事項4"=1巧本頁) 本紙張尺度诮用中KS家標準(C-NS ) Λ4規袼U】0_X 297公漤) -89- tty部中决標準局β-t消费合作社印製 4 4 4 A7 ______B7_ _ 五、發明説明$7 ) 電腦系統1 8 0 0。其他樣式之使用者輸入裝置在本發明 中亦可使用。例如,如電腦老鼠,軌跡球,尖筆,寫字板 之指向裝置可經使用以操控一般電腦之螢幕。 本發明可以在電腦可讀出媒介上之電腦讀出碼而執行一 。該電腦讀出媒介是任何一種可儲存在之後可由電腦系統 所度出之資料的資料儲存裝置。該電腦讀出媒介之例子包 含:唯讀記憶體,隨機存取記憶體,CD — ROMs,磁 帶,光學資料儲存裝置等。該電腦讀出媒介可經由連接各 電腦系統之網路而分散以使該電腦讀出碼可以分散之方式 而儲存以及執行。 儘管上述發明爲了明白瞭解之目的而詳細的描述,但 是對於在所做之改變以及修改仍在所附申請專利範圍之範 圍內。應瞭解上述之各種處理功能可以經由如硬體積體電 路之矽或是可自任何適當儲存媒介中所儲存或攫取之軟體 碼。舉例而言,此種儲存媒介包含磁碟機、硬碟機、軟碟 機、侍服器電腦,遠端網路電腦等。 此外*應瞭解上述特色以及功能對於1 0Mb p s乙 太系統以及1 0 0 M b p s快速乙太系統以及相關非同步 傳送模式(ATM)系統係向下相容的。當然,上述實施 例亦可應用至切換以及非切換,以及全/半雙工之網路系 統。接著,本實施例係展示而非限制,且本發明並非限制 於此處所詳述之細節,而可在所附之申請專利範圍之相等 範圍中修改。 ---、------------訂------的- —------- (讳先聞讀汴而之..;1意事β再楨·!<::·本頁) 本紙張尺度適州中®國家標绛(C’NS ) Λ4現格(210X 297公釐) .90 -'1T This paper size is suitable for Sichuan Chuanzhong 111¾¾: Standard (C'NS) Α4 size (210x297 mm) -82- 457 4 4 A7 B7: · -'ϋ; ν 屮 · ν # ^ 局 兵 -T-: .ift fee cooperation " printing * '' clothing V. invention note) information displayed in the mouth or change the characteristics of the information being displayed. Of course, when the transmitting and receiving state is generated in time, the user can stop transmitting properly by selecting a button 1 2 5 or stop receiving function by selecting a button 1 5 2 4. FIG. 15B shows a graphical architecture window 1550. The 1550 is displayed to the user with the selected image 1506 of FIG. 15A. For example, the user may select graph 1 or 2 to draw any information displayed in the packet generation status table 1508 or the packet processor status table 1510. Next, although for the convenience of explanation and explanation, only transmission and reception rates are available, it should be understood that any appropriate information can be displayed in the graphical window of FIG. 15A. Also shown are the "sampling cycles" (seconds) 1 5 5 6 and 1 5 5 8 for graphics 1 and 2 respectively, which can be used to select the appropriate sampling rate for each window combined in Figure 1 5A . Finally, the maximum / minimum amount of a scale can be used by appropriate selection of the appropriate scale image 1550 of Figure 15B. FIG. 16 is a receiving data buffer window 1602, which can be displayed to the user according to the selected receiving data buffer pattern 1570 of FIG. 15A. In a display field 1604, a list of packets received by the receiver is display user information. In this example, the number of packets is 1, the number of packets is 2 'and the number of packets up to N is displayed in the display field 1604. Once an individual packet is selected from the display field 1604, the user can select an individual packet by executing an appropriate selection device. Once a packet is selected, the appropriate packet characteristics are displayed to the user in the packet characteristics field 1640. ----------- ^ ------ Subscribe ------ ^-&l; (" Also read the back ..; 1- 恋 事 ^ 再 堉 3 pages ) This paper uses the Chinese standard 4 * (('NS) Λ4 size (2IOX25 »7mm) -83- 45744. A7 B7 V. Description of the invention π) Packet characteristics field 1 6 0 4 Receiving various characteristics of the packet. For example, the received packet information related to the length 1 6 0, the destination address 1608, the source address 1610, the data address 1612, the CRC 1 6 1 4, and the sequence 1 6 1 6 is used for display Information. Also provided is a check box which confirms whether the received packet has a C R C error, an alignment error, or a short or huge packet. Then, once each packet has been received, the user will only have individual packets in the packet field 160, and all its appropriate characteristics will show the user's simple information. Also shown is a raw memory data dump field 1620, which is used to display the attributes of the packet data received from the receiving side of the traffic-based MA C 1 50 based on FIG. 2. Of course, the received data should include the combined memory address to simplify modification and reference. FIG. 17 is a packet processor architecture window 1702. The 1702 is used to perform a management filtering function for data received by a receiver according to an embodiment of the present invention. For example, a general selection field 1704 display includes: (a) Miscellaneous, (b) Multiple Broadcast, (c) Broadcast, (d) CRC Error, (e) Arrangement Error, (f) Short Packet, and ( g) Huge packet selection characteristics. In this example, the miscellaneous selection check box is used as a filter and checks every part of the received packet (ie, although an error occurs) when performing a diagnostic analysis. The multiple broadcast selection check box is used when a user wants to construct the packet processor to receive and inspect a packet having a multiple broadcast destination address. The broadcast selection check box is used to construct the packet processor to check the packet. t) -84- -bad # 4'- 局 @ 工 consuming cooperatives printed A / ^ —I *, A7 B7 V. Invention explanation) Broadcast to this network (ie, the destination address is a broadcast address) . The CRC error selection check box is used to construct the packet processor to check (i.e., 'filter and check') packets with C R C errors. The alignment error selection check box is used to enable the ‘receive packet containing the alignment error. As is well known, for a system of 10 Mb ps, the permutation error is described as a dribble, and for 100 M bps, the permutation error is described as a four-bit error (4-bit), which is located at 100 For 0 M bps systems (ie, gigabits), permutation errors are described as byte errors. Finally, the short packet selection check box is used so that the packet shown as smaller than 64 bytes is used, and the large packet selection check box is used so that the packet is shown larger than 1518 bytes. Of course, according to an embodiment of the present invention, a user can modify and define the minimum amount of packets and the maximum amount of packets by appropriately setting appropriate registers in the SUPERMAC core 116 of FIG. 3. Alternatively, this setting can be performed through an appropriate software user interface. Modify the filtering part 1 7 6 to provide users with the option of filtering the individual parts of the destination address 1708, source address 1710, and data pattern 1712. For example, by appropriately selecting the portion of the destination address (eg, masking the portion of the destination address selected), and by entering an appropriate corresponding bit pattern, the user can filter out the appropriate information to Perform management and diagnostic operations. Then, the user can mask and correspond to more than one part of the destination address. As shown, the user can mask both the corresponding destination and source address. However, it should be understood that the user interface can be extended to be more detailed ί 1! Γ. N Ini-^-1 I. i 1--I (For the precautions for reading first, then { : (ΐPage) This paper size is applicable to China National Standard (CNS) Α4 specification (mm) -85- 4 4 Α7 __ Β7 ___ 5. Description of the invention (83) It is detailed and corresponds to the operation that meets the needs of users. For A data pattern 1 7 1 2 allows the user to select an appropriate interval from the initial point of the appropriate packet (ie, generally a 16-bit offset) by entering the appropriate information in the corresponding field. Once an appropriate spacing is selected, the user can reconfirm one of the masks and a mapping of the data pattern being filtered. As used herein, references to the IEEE 802.3 standard should be understood to include all current IEEE 802.3 standards. Contains; (a) IEEE 802.3 standard (100 Mbps-fast Ethernet) IEEE std 802.3u-1995; (b) *? Τ IEEE 802.3z standard (1000Mbps-billion-bit Ethernet ): And (c) ISO / IEC 8 8 2-3 'ANSI / ◊ I * -y IEEE Std 802.3 (No. (Sixth Edition 1996). All the standards shown above are incorporated for reference.: R; '" · Ministry of Justice Decision-making Bureau β-τ' · '; β " Cooperative Society Printing Implementation of the invention Use any type of integrated circuit logic or software to drive the operations performed by the computer. For example, a hardware description language (HDL) -based design and synthesis program can be used to design an application according to an embodiment of the invention. A silicon level circuit is necessary for proper execution of data and control operations. For example, a VHD L® hardware description language developed by the New York I EE Ε organization can be used to design an appropriate silicon level architecture .Although any suitable design tool can be used, another price-purchasing tool also includes a hardware description language "Verilog® 'This woodworking paper size is applicable to the Chinese National Standard (CNS) from the specification (297 gigabytes) -86- / 1 Λ Λ Μ Β7 i? &Quot;. Printed by the Ministry of Science and Technology Bureau β-τ Consumer Cooperative Co., Ltd. 5. Description of Invention M) The tool was developed by Cadence Design System, Inc. of Santa Clara, California. This invention uses a variety of Related to storage The computer in the computer system performs operations on the data. This operation is the physical manipulation of some physical quantities. In general, although it is not required, this quantity can be stored, transmitted, combined, and compared; otherwise, it is manipulation, electronic Or in the form of magnetic signals. Further, the execution of such manipulations is usually best in the form of, for example, generation, confirmation, decision, or comparison. Any operations described herein that form part of the invention are generally machine operations. The invention also relates to a device or device to perform such operations. The device may be specially constructed for the required purpose, or it may be a general purpose computer selectively triggered or constructed by a computer program stored in the computer. In particular, a variety of general-purpose machines can be used in the computer programs shown here, or it can be more convenient to construct a more special device to perform the required operations. The structure of one embodiment of the present invention is described below. FIG. 18 is a block diagram of a 1800 embodiment of a computer system to perform the processing of the present invention. The computer system 1 800 includes a digital computer 1802, a display screen (or monitor) 1804, and a keyboard 1806, a floppy disk drive 1808, a hard disk drive 1810, a network interface 1812, and a Keyboard 1814. The digital computer 1 8 0 2 includes a microprocessor 1 8 1 6, a memory bus 1818, a random access memory (RAM) 1820, a read-only memory (ROM) 1822, and a peripheral bus 1824 n ^ p.-in ^ — -HI 1 ^^^ 1 ---- I ^^^ 1 nf ^ i-. J • · · ν *-° (Read the precautions for the back and then " Άthis page} This paper size is applicable to Chinese stores ((,,), 6, 4 gauges (2! 0 > < 297 gongshen) -87- 457444 A7 B7 5. Invention description from 5), and a keyboard controller 1 8 2 6. The digital computer 1 800 can be a personal computer (such as an IB-compatible personal computer, a Macintosh computer or a Macintosh-compatible computer), a workstation computer (such as a Sun Microsystem or an HP workstation) ), Or some other type of computer. The microcomputer 1 8 1 6 is a general purpose digital processor that controls the operation of the computer system 1 800. The microprocessor 1 8 16 can be a A single chip processor may be executed with multiple components. By using instructions obtained from the memory, the microprocessor 1 8 1 6 controls the reception and manipulation of input data Output and display data to the output device. According to the present invention, the individual functions of the microprocessor 1 8 16 are assisted in packet processing and network management. The memory bus 1 8 1 8 has a microprocessor 1 8 1 6 is used to access the RAM 1820 and ROM 1822. The RAM 1 8 2 0 is used by the microprocessor as general storage area and drawing board memory 'and can also be used to store input data and processed data Data. The ROM 1822 can be used to store the instructions or code connected to the microprocessor 1 8 1 6 and other data. The peripheral bus 1 8 2 4 is used to access the digital computer 1 Input, output, and storage devices used in 80.2. In the above embodiments, these devices include: the display screen 1804, the printer device 1806, the floppy disk drive 1808, and the hard disk. Machine 1810, and the network interface 1 8 1 2. The keyboard controller 1 8 2 6 is used to receive input from the keyboard 1 8 1 4 and send each pressed through the network 1 8 2 8 Decode the symbol below to the microprocessor (read the back note against 1) Yiheng Xiang re Mg this page) Chinese paper standard (C'NS) Λ4 specification (210X 297 mm) for the back scale 4 of this paper -88- 457444 A7 B7 ^ # " Central ^ quasi ^ Ma ^ Consumer Hezhu? :! Yin Yang V. Description of the invention) 18 16 ° The display image 1 0 0 4 is an output device, which displays the data through the peripheral bus 1 8 2 4 and the microprocessor in the computer system 1 800 1 8 1 6 Provided or provided by other components to display data. This printer unit 1 800 is designed to supply images on paper or a similar surface when operating with a printer. Others, such as a drafting machine, a style setter can be used in place of or incorporation in the printer device 180. The floppy disk drive 1 8 0 and the hard disk drive 1 8 1 0 can be used to store various types of data. The floppy disk drive 1 8 0 8 can be used to transfer this data to other computer systems, while the hard disk drive 1 8 1 0 allows fast access to stored large amounts of data. The operating system knows that the microprocessor 1816 is operated to execute computer code and generate and use data. The computer code and data can reside in RAM 1820, ROM 1822, or hard disk drive 182. The computer code and data may also reside on a removable program medium and loaded or installed into the computer system when needed. Removable media include, for example: CD — ROM, PC — CARD, floppy disks, and magnetic tape. The network interface 1812 is used to send and receive data via a network connected to other computer systems. An interface card or similar device and appropriate software executed by the microprocessor 1816 can be used to connect the computer system 1800 to an existing network and transmit data according to standard protocols. The keyboard 1 8 1 4 is used to input instructions and other instructions to it (^ read the reverse first. 1 · 1- read the matter 4 " = 1 clever page) This paper standard uses the KS standard (C- NS) Λ4 Regulations U] 0_X 297 Gong) -89- Printed by β-t Consumer Cooperatives of the Bureau of Standards of the tty Ministry 4 4 4 A7 ______B7_ _ 5. Description of the invention $ 7) Computer system 1 800. Other types of user input devices can also be used in the present invention. For example, pointing devices such as computer mice, trackballs, stylus pens, and tablets can be used to control the screen of a general computer. The present invention can be executed on a computer-readable code on a computer-readable medium. The computer readout medium is any kind of data storage device that can store data which can be later read out by a computer system. Examples of computer-readable media include: read-only memory, random access memory, CD-ROMs, magnetic tapes, optical data storage devices, and so on. The computer readout medium can be dispersed via a network connected to various computer systems so that the computer readout code can be stored and executed in a distributed manner. Although the above invention has been described in detail for the purpose of understanding, the changes and modifications made are still within the scope of the appended patent application. It should be understood that the various processing functions described above may be via silicon such as a hard volume circuit or software code that may be stored or retrieved from any suitable storage medium. For example, such storage media include disk drives, hard drives, floppy drives, server computers, remote network computers, and so on. In addition, it should be understood that the above features and functions are backward compatible with 10Mb ps Ethernet systems and 100 Mb ps fast Ethernet systems and related asynchronous transfer mode (ATM) systems. Of course, the above embodiments can also be applied to switched and non-switched, and full / half duplex network systems. Next, this embodiment is shown rather than limited, and the present invention is not limited to the details detailed herein, but may be modified within the equivalent scope of the attached patent application. ---, ------------ Order ------ of--------- (taboo first read and read ..; 1 meaning thing β 桢·! ≪ :: · this page) This paper is in the state of Shizhou® National Standard (C'NS) Λ4 (210X 297mm) .90-